Abstract: It will create the problem of great degradation in video quality, when the digital video is compressed by using lossy video compression algorithm more than once. That will reduce the rate of reusing the digital video. Thus a new lossless video compre...
Abstract: In the traditional CBR rate control algorithm, the skipping method is adopted to combat the overflow of video buffer , in which the motion compensation error and picture distortion are increased with the number of skipping frame. To deal with the dis...
Abstract: This paper presents a blind detection method for the IPR-OFDM (Interleaving and Phase Rotation- Orthogonal Frequency Division Multiplexing) system. The proposed method is used to recover the interleaving order and detect the received data in the rece...
Abstract: A combined time and frequency acquisition algorithm for OFDM systems is derived in this paper. The proposed technique estimates the symbol beginning and the fractional frequency offset with the periodicity of Cyclic Prefix (CP), and simultaneously ac...
Abstract: In Elliptic Curves Cryptosystems (ECC), the optimal extension fields is preferable to others method, whether concerns performance or memory request. But, it is very difficult to choose pseudo-Mersenne prime numbers, and satisfy the condition that p j...
Abstract: Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full bl...
Abstract: In this paper the authors first present a related-key attack on chaotic stream ciphers. Combining the idea of linear cryptanalysis and divide-and-conquer attack on chaotic ciphers, the attack uses the output sequences created by multiple related keys...
Abstract: In this paper a new method of OFDM channel estimation with noise reduction, based on wavelet transform, is given. The channel estimation algorithm is divided into least-squares estimation and noise reduction. The method does not need any statistical ...
Abstract: Cooperative relaying can combat multi-path fading and shadowing effect in wireless networks to enhance communication quality and bandwidth efficiency. A two-hop relaying system model is provided in this paper, and the analytical evaluations of non-re...
Abstract: An adaptive receiver scheme employing the training sequences of flexible length is proposed for DS-UWB systems. By fully exploiting the NLMS algorithms robust behavior on convergence rate, complexity and stability, the proposed scheme is capable of p...
Abstract: In this paper, a method of time synchronization of 2D Spread Spectrum (2DSS) system in multipath fading channels is proposed. The detection probability and false-alarm probability are analyzed and also the numerical results on condition of different ...
Abstract: As adaptive MIMO-OFDM system can greatly improve the spectral efficiency, many people are studying it. The imperfect Channel State Information (CSI), which is caused by two major factorschannel estimation error and CSI delay, and their impacts on the...
Abstract: This paper presents a NON-coherent Antenna Selection (NON-AS) algorithm for multi-antenna transmission system. The combination of Generalized Likelihood Ratio Test (GLRT) and Antenna Selection (AS) is applied to Unitary (U)signal transmission system,...
Abstract: The impact of Doppler on the receivers BER performance of TDD pre-equalized OFDM systems is investigated. The analytic BPSK BER expressions of amplitude and phase pre-equalized OFDM systems in multi-path Rayleigh fading environment are given, which u...
Abstract: There is problem of channel congestion caused by the increased channel contention in satellite communication system with Packet Reservation Multiple Access (PRMA) protocol when the payload (amount of user terminals) goes up, and the long propagation ...
Abstract: Under the construction of optical networks, in order to reduce construction cost, several links may pass through a duct. In many cases, fibers fail due to duct failures. It is required to provide protection against duct failures. The paper investigat...
Abstract: Focusing on Turbo-coded dual N-ary orthogonal spread spectrum system, this paper proposes an algorithm for computing bit soft metric based on Maximum a Posteriori Probability (MAP) criterion, and then presents a simplified MAP algorithm. Meanwhile, t...
Abstract: This paper studies the narrowband interference suppression algorithm based on threshold detection in transform domain, and a novel adaptive multi-threshold narrowband interference detection algorithm is proposed. Theoretical analysis and simulations ...
Abstract: The proposed new fusion algorithm is based on the improved Pulse Coupled Neural network(PCNN) model, the fundamental characteristics of multi-focus images and the properties of human vision system. Compared with the traditional algorithm where the li...
Abstract: In this paper, a kind of new Independent Component Analysis (ICA) method based on 2-dimensional wavelet transform is proposed. According to the research, the steady-state error of the Natural Gradient Algorithm (NGA) is inverse proportional to the qu...
Abstract: The vector hydrophone is composed of three spatially co-located but orthogonal oriented velocity hydrophone plus another co-located pressure hydrophone. To understand the performance of DOA estimation using vector hydrophone array in a reflecting bou...
Abstract: The performance of the speech recognition systems is deteriorated dramatically under noise condition for variation of speech signal. According to the auditory tests, this paper proposes a new nonlinear sub-band Maximum A Posteriori (MAP)statistical m...
Abstract: A method for watershed image segmentation based on morphological scale-space and gradient modification is proposed to avoid over-segmentation and the drawbacks of some improved watershed segmentations. Firstly, morphological hybrid opening and closin...
Abstract: A new approach based on two-dimensional Gabor wavelets transform for face recognition is presented. The Gabor wavelet representation of an image is the convolution of the image with a family of Gabor kernels. A set of vectors called nodes, over a den...
Abstract: Detail entropy is proposed which can indicate the image clarity much accurately in the case of that image has slowly changed part. A technique based on detail entropy minimization principle is developed for fusing netted radar data. For complex radar...
Abstract: The optimal polarization filtering is investigated, which can be described as optimization with a nonlinear restriction. The nonlinear restriction is removed through an intermediary variable. According to the extremum necessary condition, the optimiz...
Abstract: This paper studies image algorithms and analyses imaging quality of air-borne Synthetic Aperture Radar (SAR) in large squint mode. Based on the spatial geometry model of squint mode air-borne SAR and echo response, a method to improve RD algorithm is...
Abstract: This paper presents a new SAR raw data compression algorithm named Normalized Adaptive Predictive Vector Quantization (NAPVQ). The normalized SAR raw data are firstly processed with vector linear predictor, and then the error vectors are compressed w...
Abstract: In this paper, the ambiguity function is defined and derived from the character of formation flying satellites SAR. The results of the computer simulations demonstrate the efficacy of the proposed function. Further, by analyzing the ambiguity functio...
Abstract: For the polarimetric and high-resolution radar system, a novel method is proposed, where the polarization and high resolution range profile are integrated for radar target recognition. The physical-statistical non-Gaussian model is used to model for ...
Abstract: Distributed satellites bistatic SAR can be considered as a kind of bistatic/multi-static SAR system, whose transmitters and receivers move in parallel. Based on this, in this paper, the geometry resolution of distributed satellites SAR is analyzed us...
Abstract: In this paper, a new technique about long distance source localization with passive synthetic aperture sonar array is presented. At first, a sound field receiving equation for synthetic aperture sonar is derived. Then, this new method is described in...
Abstract: For the shortage of plan recognition method presented by Kautz(1987) in controlling mechanism, a plan recognition method based on planning knowledge graph is discussed in detail. Using first-order predicate logic as formal language, an instance of ta...
Abstract: This paper presents a quantum public-key cryptosystem by using quantum Calderbank-Shor-Steane(CSS) error correcting codes and the NPC problem related with decoding general linear codes. It uses classical key to encrypt quantum message, and its securi...
Abstract: Further research on the construction of public-key cryptosystem based on Linear Feedback Shift Register (LFSR) is provided, and the LFSR higher (non) residuosity problem is defined. Based on new intractability problems a new public-key encryption pri...
Abstract: Since the introduction of Mobile Agent (MA), security is always an important issue for its restriction to the MAs wide-application. As the extension of distributed Client/Server computing, the present idea of multiple mobile agents gives a new way fo...
Abstract: A new method combining the protocol conversion methodology and the Petri nets theory is proposed to study application layer protocol conversion. According to the procedure proposed by the protocol conversion methodology, the Click-To-Dial (CTD) servi...
Abstract: QoS supports of multiclass data service in IP network includes generally packet delay, throughput and loss rate, while the majority last research focus on either minimizing packet delay and loss or maximizing user throughput. In this paper, an algori...
Abstract: Directed diffusion is a classical data propagation protocol for wireless sensor networks. In directed diffusion routing, the diffusion of exploratory data can inevitably lead to heavy traffic periodically. Then the performance of data propagation may...
Abstract: Aiming at the uneven routing results and much noise, this paper presents an improved method for multichip module routing that based on the four-via routing algorithm. By using the PST(Priority Search Tree) and LEA(Left Edge Algorithm) algorithms to r...
Abstract: Mobile Ad hoc NETworks (MANET) are an ideal technology in future civilian and military applications and it will become necessary to communicate across MANET and the wired Internet. In this paper, It is investigated that the effect of some key issues,...
Abstract: As the velocity of signal switch becoming fast, the crosstalk in high-speed circuit design is becoming worse than ever. The performance of guard traces in reducing the crosstalk between microstrips is analyzed and simulated with FDTD method in this p...