Abstract: The research of source number detection is still open and challenge issue in array signal processing. The accurate estimation may be very essential to those high resolution direction finding algorithms. However, the traditional methods are sensitive ...
Abstract: A new algorithm to estimate jointly the Direction-Of-Arrival (DOA) and range of near field sources is presented. Firstly, the whiten matrix is constructed by use of the second order statistics, and then the array steering matrix of near field sources...
Abstract: Based on the characteristics of cyclostationarity of Continuous Phase Modulation (CPM) signals with integer and half integer modulation index, a novel method of detecting CPM signals under the condition of unknown code sequence, carrier frequency, ch...
Abstract: Based on symbol dynamics in 1-D piecewise linear mapping chaotic systems, an arithmetic method processing chaotic signals is studied in the paper, including addition, subtraction and multiplication. The operational rules are calculated and proved acc...
Abstract: Two methods of rapid code acquisition based on FFT are presented, one method is based on fractional multiple sampling rate convertor, and the other is based on decimation. To reduce hardware resource, two rapid code acquisition circuits utilizes dupl...
Abstract: Mutual information has been used as a similarity metric in medical image registration. The probabilities of mutual information may be estimated by normalization of the joint intensity histogram, which is obtained by binning the intensity pair of the ...
Abstract: An effective and robust speech feature extraction method based on pitch frequency and harmonic structure is proposed by means of short-time spectrum analysis of clear and noisy speech. Experimental results indicate that the new feature is relatively ...
Abstract: To the predicate calculus on Intuitionistic Fuzzy Logic (IFL), a symmetric synthetic method for finding the truth of IFL propositions using membership and hesitancy degree is proposed on the basis of the hypothesis of an equilibrium state of supporta...
Abstract: Image fusion principles have been widely used in application of imaging remote sensing as an effective means of synergistic combination of information. Image fusion applied for target recognition should be modeling for each different task. A kind of ...
Abstract: In this paper, a technique for compressing Synthetic Aperture Radar(SAR) raw data using block lifting wavelet transform is considered. Due to the statistical properties of SAR signal, a proper subband bit allocation strategy is presented. At high bit...
Abstract: A method fused by Extended Fractal (EF) feature and local contract feature is proposed for target detection in SAR image. The paper mainly discussed the size sensitivity behavior for the EF feature and the second-order statistics for the EF feature i...
Abstract: Because of the multiple-beam scanning strategy in swath, the intrinsic periodic scalloping exists in ScanSAR, which affects the radiometric property of ScanSAR. Based on the character of ScanSAR, the mechanism and property are studied, radiometric er...
Abstract: The active deception jamming is paid much attention in SAR ECM. So how to deal with the active deception jamming is a problem in SAR ECCM. This paper presents that InSAR can recognize the active deception jamming and suppress it. The interferometric ...
Abstract: Wideband-high-resolution SAR background clutters affect the target detection and classification seriously. Aiming at SARs weakness , the paper puts forward a new matching jamming, which is time, frequency and Doppler fields multidimensional-matching-...
Abstract: Firstly, the working principle of pseudo-random code phase-modulation fuze is described in the paper. The scheme of spot and deception jammer of pseudo-random code phase-modulation fuze is given. The circuit principle of each part and its hardware im...
Abstract: An audio watermarking scheme which embedded robust and fragile watermark at the same time in lifting wavelet domain is presented. Robust watermark is embedded in the low frequency range using mean quantization. It has great robustness and imperceptib...
Abstract: In Orthogonal Frequency-Division Multiplexing (OFDM) system, when using the partial power training sequence to synchronize, the received data signals will be seriously interfered by the training sequence. Due to the imperfect channel estimation, even...
Abstract: Noise threshold of Low Density Parity Check (LDPC) codes ensemble could be calculated by density evolution of the decoding messages. According to the threshold, performance of the decoding algorithm could be evaluated and degree distribution pairs of...
Abstract: In this paper, a new approach is presented for optimizing the approximation of tanh rule based on Minimum Mean Square Error (MMSE) criterion under the Gaussian approximation. New concepts of anti-symmetric distribution and isomorphic generalized symm...
Abstract: An adaptive NarrowBand Interference (NBI) suppression approach is proposed for DS-UWB systems. Based on the equivalence between the objective function optimization and linear equations, the proposed scheme translates the optimization model into linea...
Abstract: The stochastic bridge methods are employed in the current research for the modeling of UWB indoor multipath channel. Stochastic bridge processes are first introduced, and a physical fundament of UWB indoor multipath channel is analyzed. Then the dist...
Abstract: This paper presents a methodology to accurately predict link error performance based on capacity equivalence for a wide variety of channels. A metric based on Shannons channel capacity is introduced and combined with a new penalty factor Q relating t...
Abstract: A novel frequency offset estimation algorithm for Orthogonal Frequency Division Multiplexing(OFDM) signals transmitted over frequency-selective channels is analyzed. The algorithm is discussed with channel zeros and arbitrarily assignment of null-sub...
Abstract: A novel multi-rate MB-OFDM ultra-wide band (UWB) system is proposed, in which users are distinguished from their unique time-frequency codes (TFC). Also an adaptive TFC allocation algorithm is given to minimize total transmitting power with the const...
Abstract: In this paper, a novel adaptive Interference Cancellation Decision Feedback Equalization algorithm based on Recursive Least Squares (RLS-IC-DFE) is proposed for Multi-Input Multi-Output (MIMO) wireless communication systems under frequency selective ...
Abstract: Clipping is usually applied to decrease the high peak-to-average power ratio caused by OFDM with interference both inside and outside the signal bandwidth. To resolve this problem, an iterative estimation and cancellation of clipping non-linear disto...
Abstract: In this paper the concept of random permutation table is presented from F table in Skipjack block encryption. The probabilities and the expected values of closed state evolutive ring numbers and the average length of state evolutive rings are studied...
Abstract: Intra-prediction is one of the new techniques adopted by H.264. Compared with the previous video coding standards, H.264 improves coding performance greatly. However, the computation load of H.264 video coding increases drastically. This paper invest...
Abstract: It is very common that the packets may be lost over IP networks during transmission. The scheme proposed in this paper involves a novel erasure correcting code, a packet sending order and error concealment method. The [9,5,3] erasure correcting code ...
Abstract: Interframe video coding mode decision algorithm is one of the most complex part in H.264 encoder. In this paper, the theory of variable block-size motion compensation in H.264 is given and the best mode statistical law of inter-frame video coding is ...
Abstract: During transmitting encoded digital video sequences over noisy communication channels, the information of the images will be lost. An error concealment method based on robust optical flow is proposed, as a post-processing tool at the decoder side to ...
Abstract: This paper investigates the outage performance of the cooperative diversity systems for multi-hop wireless networks over Nakagami fading channels. Their closed-form expressions of the regenerative outage probability are derived, and the diversity ord...
Abstract: Threaded Algebraic Space Time (TAST) code achieves the full diversity gain without the loss of code rate, and fits the high-rate transmission. In this paper the Zero-Forcing (ZF) detections performance of the full-rate full-diversity TAST code is ana...
Abstract: This paper presents an approach for modeling and solving the problems of intelligent fault identification and alarm correlation in large telecommunication networks. The network is initially divided into its constituting sub-networks. Different correl...
Abstract: A dynamic multi-rate routing scheme is presented. It can increase the throughput and decrease the ETE transmission delay of the Mobile Ad hoc NETworks (MANETs). The scheme divides routing function into two parts, the wide routing function and the loc...
Abstract: There are four traffic classes in wireless multimedia network, including conversational class, streaming class, interactive class, and background class, while three of them are Variable Bit Rate (VBR) traffic except conversation class. It will fall i...
Abstract: This paper presents a topology aggregation algorithm for asymmetric networks, which can keep all the asymmetric topology information, so that topology information distortion can be reduced. The algorithm constructs three spanning tree aggregated topo...
Abstract: IEEE 802.16 broadband wireless access system adopts TDMA (Time-Division Multiple Access) and contention-based reservation of resource in its uplink MAC layer. Thus there are contentions and collisions between SSs(Subscriber Stations), and the perform...
Abstract: Available bandwidth is one of the important network resources, but it difficult to measure in practice. In this paper, SSP(SRdeg and SRdet parameters), an active end-to-end available bandwidth estimation algorithm based on delay trend model, is propo...
Abstract: It is important to maximize the saturated throughput of 802.11 DCF for fully utilizing wireless bandwidth. The saturated throughput of 802.11 DCF is related to minimum contention windows, maximum backoff stage and the contending nodes in the networks...
Abstract: QoS is one of the hot points among the network study fields. Currently , because of Low Speed Network (LSN) occupying a very big specific weight among the whole networks, how to provide the real-time services with QoS guarantee for the LSNs customers...
Abstract: Enhancing Active Queue Management (AQM) algorithms self-adapting and overcoming network delays poor effect are research emphases. After analyzing traditional PID control algorithms limitation, a novel active queue management algorithm for delay netwo...
Abstract: The output signal model of optical fiber Surface Plasmon Resonance (SPR) sensing systems is presented in which the noise is proved as Gaussian distribution by adopting skewness and kurtosis test, so signal averaging method has been used and the stand...
Abstract: Signal-adapted institute of filter banks are an important subject in the theory and applications of the multirate filter banks.Since the frequency responses match the statistics of the underlying signals very well, these filter banks achieve the larg...
Abstract: Based on boost converter, a new mode named PSM is modeled and analyzed using space state average method. Some useful formulae such as output voltage ratio, relationship between modulation factor and load, conversion efficiency are given in this paper...
Abstract: The effect of track distribution on chip area is investigated in this paper. Several typical distributions in math (Gaussian, Sine and Trigonal) are introduced to realize FPGAs architectures with routing channel width varying randomly on software pla...
Abstract: Based on the conducted emission measurements for the power line , the measurement uncertainties which affect the Electro Magnetic Compatibility(EMC) test are analyzed. This paper investigates the type A and type B uncertainties and the systemic error...
Abstract: Boundary Element Method(BEM) is applied to simulate electron optics system of multi-beam klystron with PRPM focusing in this paper. The function of importing 3D magnetic fields from MAFIA is added to TAU. Magnetic induction distribution along Z axis ...
Abstract: The effects of thickening the cavity wall and constructing a pair of drift tube in a new complex cavity on the operating mode stability for engineering design are analyzed in this article. Some compensating methods for alleviating the effects are dis...
Abstract: According to a set of analytic equations based on adiabatic compression theory and angular momentum conservation, a single-anode Magnetron Injection Gun(MIG) with a nose-shape accessorial focus pole is studied in this paper. The parameters of the sin...
Abstract: Being a new research area in radar imaging remote sensing, information extraction using Polarimetric Interferometric SAR (Pol-In-SAR) data, which emerged in late 90s, has gained more and more attention and will become trend and hotspot in remote sens...