Abstract: How to allocate power to antennas and carriers is a key problem when adaptive power allocation method is used to multi-antenna and multi-carriers Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system. In this paper, a novel algorithm for allo...
Abstract: For Orthogonal Frequency-Division Multiplexing (OFDM) communication systems with high mobile speed, the frequency offset caused by Doppler frequency offset and the frequency differences will introduce Inter-Carriers Interference (ICI), which degrades...
Abstract: Based on the analysis of OFDMA system capacity, a stochastic model, M| M| m| n Markov queue model, is proposed. According to the model, the call admission control strategy is presented, where the number of call connections into the network is limited...
Abstract: In this paper, a computationally efficient algorithm for transmit power and bit allocations in wireless OFDM communication system is proposed, the aim is to minimize total transmit power under the constraints of data rate and max Bit Error Rate (BER)...
Abstract: Aiming at mobile frequency nonselective fading MIMO channels, this paper proposes the 3D statistical channels model and a new space function for receive antennas. The effects of space distance parameters on the correlation and capacity are given by c...
Abstract: A novel fast recursive V-BLAST detection algorithm is proposed in this paper. Since a simple recursive relationship of computing pseudoinverses is exploited in the algorithm, the Zero-Forcing (ZF) weight matrix and the ZF weight vector at each iterat...
Abstract: The main impairment for location of terminals in wireless communications system is the Non-Line Of Sight (NLOS) condition. This paper presents a robust location tracking architecture for a NLOS situation. It mitigates NLOS error in the raw measuremen...
Abstract: The implementation of mobile location utilizing only the service base station is relatively easy and the probability of positioning is higher. But the major challenge is poor accuracy. A single base station mobile tracking technique is proposed based...
Abstract: A real-time smoothing scheme of MEPG-4 video for CDMA systems is proposed in this paper. Due to the high peak rate and frequent rate variations nature of MPEG-4 video, it is a challenge to transmit real-time variable bit rate video on CDMA systems. I...
Abstract: The TDD-CDMA system with unbalanced slot allocation between uplink (UL) and downlink (DL) will cause the cross-slot interference which may be inferior to system. In order to decrease the interference, a Dynamic Channel Allocation (DCA) based on path ...
Abstract: A FFA and TFA based interception of LPI frequency hopping signal is presented in this paper. the algorithm can detect the frequency hopping signal effectively in low Signal to Noise Ratio (SNR); By selecting the range of the folding period and resolu...
Abstract: In 2000, Tang, Fan and Matsufuji presented the theoretical bound of an (L, M, Zcz)-ZCZ sequence family is ZczL/M-1. In this paper, for given positive integers n and L, a construction algorithm of interleaved ZCZ sequence families is proposed, by whic...
Abstract: m-sequence is one of the most widely used codes in spread spectrum communications. The triple correlation function(TCF) of m-sequence, the partial triple correlation function of m-sequence and its peak feature are studied and described in this paper....
Abstract: This paper focus on the research of LUT based digital pre-distortion techniques in OFDM systems. The defects of the conventional LUT based pre-distortion techniques are pointed out with the improved method proposed. The performance of the algorithms ...
Abstract: OFDM system is very sensitive to time-varying channel, which may cause inter-carrier interference. In this paper, a layered inter-carrier interference cancellation scheme is proposed for time-varying channel, with detailed analysis of inter-carrier i...
Abstract: By using the Minimum Mean Square Error (MMSE) criterion, the design of two improved Belief Propagation (BP)-based, i.e., the scaled BP-based and offset BP-based algorithms is presented, for decoding of short Low-Density Parity-Check (LDPC) codes on t...
Abstract: The main problem of decoding Turbo TAST code is to reduce its dimension. Performance of different reduction methods varies greatly. Null space method is no longer valid for TAST code. Reduction to single input single output with MMSE equalization ach...
Abstract: This paper presents eight problems of video encoding and decoding subsystem design in H.323 video conference system, such as motion estimation, rate control etc. For each problem, after introducing their background, the paper finds their solutions an...
Abstract: This paper presents a new modeling method of microwave VCO( Voltage Control Oscillator). Based on this model a novel board bandwidth microwave noise generator , which is composed of a digital algorithm part and an analog modulation part, is simulated...
Abstract: In environment with coherent interferences, performance of adaptive array will decline dramatically, and the general solution is spatial smoothing. However, adaptive array utilizing conventional Uniform Spatial Smoothing (USS) has poor ability to sup...
Abstract: A parallel allocation algorithm is proposed, which is a modification of CSGC (Color Sensitive Graph Coloring)algorithm. Under constraint of maximizing system utilization, the parallel algorithm obtains the same allocation matrix as CSGC, while reduci...
Abstract: iRGRR(iterative Request-Grant-based Round-Robin) is a scheduling algorithm for input-queued crossbars, which has many good features, such as simple, scalability and fine performance. This paper proposes a new packet scheduling scheme based on iRGRR, ...
Abstract: Previous capacity estimation techniques can not measure path capacity and available bandwidth simultaneously. In this article an asymptotically-accurate available bandwidth estimators is obtained through a stochastic analysis of a single congested no...
Abstract: According to the disadvantages of the existing AODV and AODV-BR schemes in Ad hoc networks, a cache bypass and local recovery based route reconstruction scheme is proposed in this paper. The mobile node listens in all frames including data packets an...
Abstract: In large scale P2P networks, it is difficult to deal with different type of attacks issued by malicious peers. A novel trust model based on reputation and risk evaluation is proposed in this paper to solve this problem, in which the uncertainty betwe...
Abstract: Combining the delivery of query messages with the setting up of data transmitting structure, a novel distributed data collection scheme for wireless sensor networkTBDCS (Tree Based Data Collection Scheme) is proposed in this paper. Using a flooding a...
Abstract: This paper describes how to reduce the complexity of particle filter in order to make good use of the energy of sensor nodes. First, a structure is proposed for distributed particle filter. Second, how the particle number impacts on the performance o...
Abstract: Recently, Xie et al. proposed a multi-secret sharing authenticating scheme based on double secret shadow. In their scheme, the participant must use his two secret subshadows to prove his honesty in the secret reconstruction stage. This article, howev...
Abstract: Signal can be decomposed sparsely and power-focally in an over-complete dictionary with Matching Pursuit (MP). This paper proposes a modified MP method to decompose signal more sparsely. In the iteration procedure of the modified MP, the over-complet...
Abstract: In multiscale product coefficient hard thresholding, how to determine the optimal threshold is the main problem due to the discontinuity of MSE. Here a semi-soft thresholding function is constructed in the product form of shrinkage coefficient functi...
Abstract: The gain and phase error calibration for Linear Equi-spaced Arrays (LEA) is considered in this paper. The analysis of the covariance matrix perturbation along different diagonal lines due to finite snapshot is first considered, and an apparent formul...
Abstract: A blind Signal-to-Noise Ratio (SNR) estimator based on the modified PASTd (Projection Approximation Subspace Tracking deflation) algorithm is proposed in this paper for Intermediate Frequency (IF) signals in the Additive White Gaussian Noise (AWGN) c...
Abstract: A novel approach of Ground Moving Target Indication (GMTI) based on subapertures and masking is developed in this paper. At first, Range Compressed and Azimuth Unfocused (RCAU) complex SAR image is split into two subapertures symmetrically in azimuth...
Abstract: Due the presence of multiplicative and speckle noise, the method of registering InSAR image is more difficult than traditional image registration methods. In this paper , an automatic InSAR image registration method is presented, based on B-spline cu...
Abstract: Motion Compensation is essential for wide-beam airborne Synthetic Aperture Radar (SAR). This paper proposes a motion compensation algorithm for wide-beam airborne SAR based on phase correcting in frequency domain for azimuth blocks. With the relation...
Abstract: One of the major problems in continuous wave bistatic radar is direct-path interference. Conventional solutions to this problem is the use of an adaptive antenna, steering null towards the interference. Unfortunately the null depth obtained by this t...
Abstract: In general, Doppler parameters are the main reason that leads to degrading of the SAR (Synthetic Aperture Radar) imaging quality. Now the algorithms to estimate Doppler parameters mainly are Mapdrift, Phase Gradient Autofocus (PGA) algorithms and so ...
Abstract: Traditionally, in the simulation of radar network, the aircraft is regarded as a point, whose RCS(Radar Cross Section) is constant; In fact, the RCS is a function of the frequency of radar and the angle between the aircraft and radar. Radar targets c...
Abstract: This paper gives the geometry of bistatic radar DPCA(Displaced Phase Center Antenna) technique based on two-antenna .The computer simulation results are also given. The bistatic radar DPCA technique requires that the spacing between the phase centers...
Abstract: In this paper a new method is proposed to solve the geo-referencing problem of satellite SAR imagery without GCPs by considering the consecutive imaging parameters. That is, the imaging parameters of consecutive imagery are calculated based on GCPs i...
Abstract: This paper presents a Waveform Interpolation (WI) speech coder, which characteristic waveform extraction rate is adaptive to the feature of the input frame. Efficient pitch estimation algorithm is based on the principle of maximizing double weighted ...
Abstract: This paper proposes an algorithm for voice conversion based on mixtures of linear transformation which avoids the need for parallel training corpus inherent in conventional approaches. In maximum likelihood framework, the EM algorithm is used to comp...
Abstract: Voiced/unvoiced decision is an important component in speech signal processing. In this paper, different topological structures in Recurrence Plots (RPs) are described for the different physical models of speech production. By statistically analyzing...
Abstract: Nonlinear methods perform well in the multiple classifier fusion. However, the nonlinear methods used for the multiple classifier fusion have poor comprehensibility. As a nonlinear method, the fuzzy rule-based pattern recognition has good comprehensi...
Abstract: In this paper, the ill-posed inverse problem of super-resolution reconstruction is concerned. Firstly, the mathematical model of super-resolution reconstruction is given, and the ill-posed property of the least square estimation is analyzed. Then, th...
Abstract: The detection errors undermine the credibility of a watermarking system. An optimum image blind watermark detector is designed in this paper in discrete wavelet domain, which adopts a dual channel detection using bispectrum detection and energy detec...
Abstract: To solve the nonlinear problem in the Bearings-Only Tracking (BOT), an Unscented Particle Filter(UPF) tracking method is proposed. Based on the Unscented transformation, the UPF is used to incorporate the most current observations and to generate the...
Abstract: Data-based machine learning is exploring the rule to predict new data from the observation data. In this paper, a novel classification decision method, called as Cover Algorithm (CA), is presented. In the training procedure, some representative sampl...
Abstract: The standard Kernel Fisher Discriminant Analysis(KFDA) may suffer from the large computation complexity and the slow speed of feature extraction for the case of large number of training samples. To tackle these problems, a fast algorithm of KFDA is p...
Abstract: Harris corner detection is a classical algorithm, but has not the property of scale invariant. In this paper, the multi-resolution idea is introduced into the Harris algorithm, and the wavelet-based formula for measuring the image intensity variation...
Abstract: Skin color detection is an important problem in computer vision. A new elliptical model based on KL transform for skin color detection is proposed in this paper. As to the proposed algorithm, firstly, the training skin color samples are made to distr...
Abstract: Margin plays an important role in research of machine learning. Margin-based feature selection methods choose the weights of features from the view of classification. This paper analyzes different types of margin and proposed methods to improve the S...
Abstract: On-line identification and following control of nonlinear uncertain Chuas chaotic system using dynamic neural networks are studied in this paper. The passive technique is applied to access properties of neuro-identifier that the gradient descent algo...
Abstract: A adaptable T-S fuzzy model which membership functions , structure and parameters optimized by the algorithms of GA-Annealing strategy is proposed to identify chaotic system . Based on this, the asymptotic stability algorithm of fuzzy control having ...
Abstract: The CLEAN algorithm is introduced from non-instant u-v coverage aperture synthesis in radio astronomy to instant situation in 2-D airborne mm-wave imaging, to remove the bad influences of the undersampled u-v plane coverage to image quality so as to ...
Abstract: Reusability is the key element in todays VLSI design. Open-source hardware provides a more thorough and effective way for design reusability than traditional charged closed-source IP by sharing its design documents and IP modules. And open-source har...
Abstract: The phenomenon of stochastic resonance of an over-damped linear oscillator stimulated by an amplitude-modulation signal and a random telegraph noise is investigated. The exact expressions of the Output-Amplitude-Gain (OAG) of the Upper Side-frequency...
Abstract: An important characteristic of the beam-wave interaction in traveling-wave tube is that the velocity modulation and bunching of electron beam, also its energy exchange with the RF field, happen continuously and simultaneously along the whole slow-wav...
Abstract: In the paper, a new general optimal design method of stable high-order interpolative - A/D modulator is presented. The design principle and process in detail are given by using an interpolative structure in state space and the transfer function conve...
Abstract: Wang XM proposed a group signature scheme and claimed that it can resist all kinds of forgery attacks(2003). However,it was carefully analyzed, and there were defects in it: First, It cannot revoke group member effectively. Second,It cannot resist fo...