Abstract: To achieve infrared image denoising and edge enhancement, a method based on wavelet forward and backward diffusion is introduced. Wavelet forward and backward diffusion is based on wavelet diffusion theory. It not only inherites iterative noise reduc...
Abstract: Based on the fractional lower order theory a novel fractional time delay estimation algorithm referred to as EFMML (Explicit Fractional lower order Mix Modulated Lagrange) under stable distributed noise environment is proposed. The convergence condit...
Abstract: In this paper, a low complexity ESPRIT algorithm based on power method and QR decomposition is presented for direction finding, which doesnot require the priori knowledge of sources number and the predetermined threshold in separation of the signal a...
Abstract: Extracting the most discriminant low-dimensional face feature is an extremely critical step in Face Recognition (FR) systems. Linear Discriminant Analysis (LDA) is one of the most popular linear classification techniques for feature extraction. An op...
Abstract: A Transcendental Information Based (TIB) triphone model tying structure adaptation strategy is delivered, and this strategy can improve the triphone model tying structure to suit the target co-pronunciation features with small amount of adaptation da...
Abstract: This paper proposes a new speech enhancement algorithm to improve the quality of speech in low SNR environment. The algorithm estimates the noise spectrum in the form of prior SNR according to its Gaussian statistical model firstly. Then it estimates...
Abstract: Machine intelligence requires convenient and effective estimation mode for sound localization. According to the tight relation of Head Related Transfer Function (HRTF) and location, this paper studies a sound localization method based on HRTF. Using ...
Abstract: Phoneme lattice based Confidence Measure (CM) is proposed in this paper. It makes use of phoneme lattices generated by a phoneme recognizer. Acoustic Model (AM) based CM is also introduced. For a decoded speech frame aligned to an HMM state, the CM b...
Abstract: With fast development and boosting of stream media applications, automatic classification of audio signals becomes one of the hotspots on research and engineering. Since mood classification of music is involved with integrated representation and clas...
Abstract: Kalman filter is a recursive filtering method based on minimum variance estimation, but it assumes that the signals state model is exactly known, which restricts its application in practice. Nevertheless the systems state equation can be obtained thr...
Abstract: To the questions of Threat Assessment (TA), a technique for TA based on intuitionistic fuzzy reasoning is proposed. First, the major factors of effects of attacking targets from space or air on TA in joint air defense operations, nondeterminacy to TA...
Abstract: In order to process large-scale real text, a method of building Chinese parser based on lexicalized model is proposed. First, a unified approach for segmentation and part of speech tagging is proposed based on hidden Markov model. The method not only...
Abstract: The theory and its implementation on the adaptive window length in the analysis of time frequency are presented in this paper. This method is used to analysis the in-pulse characteristics of pseudo-code fuse signals such as Pseudo-Code Phase Modulati...
Abstract: This paper firstly studies the characteristic of the UWB radar frequency response and presents a parameterized method to extract the poles of UWB still target. This method regards the high frequency echo as an ARMA model and poles of this ARMA model ...
Abstract: The bistatic SAR overall slant range history of target response is essentially different from the monostatic slant range history; hence, bistatic SAR imaging processing can not be achieved by purely monostatic approaches. To address the problem, a wa...
Abstract: To the big squint mode of bistatic SAR system,based on the echo model of bistatic SAR and range equation in RD area, properly to with the NCS algorithm of conventional SAR, this paper proposes NCS algorithm for squint-looking bistatic SAR, and carefu...
Abstract: The wide swath synthetic aperture radar (SAR) method basing on elevation multi-receiver is proved to be a high precise and feasible wide swath SAR method by theory and simulation. The SNR of this method has been analyzed by the matrix condition, and ...
Abstract: ROI extraction is the essential technology for target recognition in SAR image. This paper firstly analyses the difficulties of ROI extraction for vehicle in SAR image, presents its key steps and flow chart. And then an adaptive CFAR method for SAR i...
Abstract: The most important specifications of space-borne Synthetic Aperture Radar (SAR) are resolution and swath width. But in conventional SAR, there is a well known trade-off between them because of the pulse mode. In this paper, a new method of multiple a...
Abstract: This paper studies a correction method for saturated Synthetic Aperture Radar (SAR) raw data based on optimal quantization theory. The method counts the standard deviation of the data and adjusts the data using a certain gain function. The results of...
Abstract: In this paper, the combination of the phase coded stepped frequency and the m-sequences is applied to the distributed space-based radar system using the mode of multi-emitter and single-receiver, and the system achieves excellent range resolution and...
Abstract: EKF and UKF are often used in target tracking, but the required PDF is approximated by a Gaussian, which may be a gross distortion of the true underlying structure and may lead to filter divergence, especially in the situations where the uncertainty ...
Abstract: A new algorithm of signal decompositionModified Adaptive Chirplet Decomposition(MACD) is presented to overcome the deficiency of basis functions with linear time-frequency relations. The chirplet atom is extended to quadratic frequency modulated sign...
Abstract: The filterbank without good stopband attenuation will cause the narrowband interference power diffusing in more subbands, and the interference suppressing in transform domain may become less effective and more difficult. Accordingly, a interference s...
Abstract: In this paper, two fractionally-spaced space frequency equalization schemes for the downlink of broadband single-carrier multi-user MIMO-CDMA system are proposed. In the first scheme, the fractionally-spaced space frequency equalizer is used to comba...
Abstract: This paper proposes a new scheme that introduces cyclic delay diversity into Grouped Linear Constellation Precoding(GLCP) in an OFDM-based systems. By using cyclic delay diversity, a virtual delay spreaded channel can be get, and multipath diversity ...
Abstract: A communication system With Cooperative Communication based on Space-Time Block Coding (WCC-STBC) is proposed in this paper. A closed-form expression of bit error ratio for WCC-STBC system is also derived. The results through computer Monte Carlo sim...
Abstract: Two universal bounds for pure additive quantum error correcting codes are obtained by using of Krawtchouk polynomials, and it is proved that the quantum Singleton bound and the asymptotic quantum Hamming bound are just the special cases of those two ...
Abstract: In Communication systems, code rates are usually adapted to different channel environment, while puncturing is an effective solution to this strategy. Based on Gaussian approximation, the message-passing decoding algorithm for punctured Low-Density P...
Abstract: To analyze quickly the motion information of videos, a fast optical flow estimation algorithm for compressed domain is proposed. Firstly the spatial partial derivatives of image luminance are estimated by using two AC coefficients, and then the predi...
Abstract: In this paper, a novel slotted-ALOHA algorithm based on Code division is presented for solving the RFID anti-collision problems. Its advantage to the system throughput is analyzed based on its mathematical model and the condition for systems stabilit...
Abstract: The noncoherent receiver is attractive for UWB system implementation in lower data rate applications due to its simplicity for implementation, which, however, is accompanied with the performance degradation. There are some factors that affect the per...
Abstract: The non-coherent receiver is attractive for UWB system due to its implementation simplicity, which, however, is also accompanied with its performance degradation. As an effective optimization method, the integration interval selection is usually perf...
Abstract: Multiple antenna wireless systems can provide larger channel capacity and better ability to combat fading. The capacity can be further increased by feeding back some channel state information to the transmitter and implementing antenna subset selecti...
Abstract: A new postfixing scheme for OFDM is proposed, where PP (Pilot Postfix) is inserted in the guard interval after OFDM symbol, and PP-OFDM system is constructed with BICM-ID(Bit-Interleaved Coded Modulation with Iterative Decoding). PP is generated by I...
Abstract: In this paper, the properties of doubly stochastic matrices and doubly stochastic Markov chains are researched from the viewpoints of the classification of states and equilibrium distributions. These properties are applicable to the analysis and mode...
Abstract: Based on the discrete-time signal processing, the representation of Doppler effect on code acquisition performance is analyzed and the principle of combining partial-matched filter with FFT is given in this paper. A fast code acquisition architecture...
Abstract: Fast Frequency Hopping (FFH) communications is an important technology of anti-jamming in military applications. In this paper, anti-jamming performance and implementation of Ultra-Fast Frequency Hopping (UFFH) test-bed are described. The test-bed ca...
Abstract: A blind space-time Multi-User Detection (MUD) algorithm is proposed for multi-antenna Code Division Multiple Access (CDMA) systems. The proposed algorithm exploits the signal structures in both time domain and spatial domain for interference rejectio...
Abstract: In this paper, an improved multiple-symbol differential sphere decoding for differential unitary space-time modulation is presented. According to this algorithm, the sphere decoding process only search the trial symbols with less Maximum Likelihood (...
Abstract: In this paper, adaptive modulation and power allocation techniques are investigated for MIMO-OFDM systems. A computationally efficient optimal joint bit and power allocation algorithm is proposed. For implementation simplicity, a simplified sub-optim...
Abstract: GLST is usually used in the downlink of multi-antenna wireless communication systems to increase receiving diversity. In this paper, the transmission orthogonality is analyzed on the base of the system model. Considering that the complexity of the op...
Abstract: Based on the positive bias property of the Time-Of-Arrival(TOA)measurement error caused by Non- Line-Of-Sight(NLOS)propagation in the mobile communication environment, a simple geometrical position location method is presented. Some sites are determi...
Abstract: Application layer mobility is important for IP application under mobile environment. The support of under layer mobility guarantees the smooth of data transaction in handoff, while application layer mobility guarantees higher layer application can tr...
Abstract: The linear complexity and the k-errorlinear complexity of a periodic sequence are two important standards to scale the randomicity of keystreams. For a pn-periodic sequence over Fp, the possible values of the 1-error linear complexity and the number ...
Abstract: A steganographic method is proposed for embedding secret information in digital speech signals. Depending on the PCM A/ law compression/decompression characteristics and mutual conversion between the two laws, appropriate bit planes are chosen in mod...
Abstract: In this paper, the Transient Chaotic Neural Network(TCNN) is used to solve the Channel Assignment Problem(CAP), and a new method named two-stage annealing method in TCNN is proposed. The neural network gradually convergences, through the transient ch...
Abstract: As continuing growth in traffic volume from users with varying degrees of mobility in wireless networks, a Hierarchical Cellular Structures (HCS) has been suggested. In this paper, the performance of a two-tier microcell/macrocel1 cellular system wit...
Abstract: By taking the popularity character of the media program and the cost of the transmission network into consideration, a novel caching utility function is proposed. A Network Cost Based streaming media cache allocation and replacement (NCB) algorithm i...
Abstract: A novel adaptive data fusion routing algorithm based on genetic algorithm is proposed in order to solve the problem of mobile agent collecting correlated data with energy validity. When selecting the data fusion routing, mobile agent moving to every ...
Abstract: Current user behavior models in streaming application ignore user interactivity, a new model is proposed for interactive user behavior in steaming-on-demand. Simulation results show that it can generate synthetic traces with different interactivity d...
Abstract: A theoretic analysis is proposed which indirectly proves how vanishing moments influence on estimation Hurst parameter of self-similar traffic, and a lots of experimental results show the Hursts value changes periodicity with the vanishing moments, b...
Abstract: When nodes are organized as clusters, data packets can be transmitted from cluster members to head in either single hop or multi-hop communication mode. Using maximum energy dissipation of cluster members as evaluation criterion, energy efficiency of...
Abstract: The Higher-Order Method of Moments (HO-MoM) is frequently used to calculate the electromagnetic scattering, because of its high efficient and accurate. Several issues are analyzed in this paper for using the HO-MoM. Firstly, multi-dimension numerical...
Abstract: The method combined IPO, FMM, RPFMM, FaFFA can rapidly solve the scattering of three-dimensional cavity. In this paper, the Generalized Reciprocity Integral(GRI) method is applied to treat the cavities with termination. The cavity is divide into two ...
Abstract: In the modeling of CoPlanar Waveguide (CPW) by a quasi-static Finite Difference Method (FDM), to resolve the problem of too much simulation time with equidistant discretization in the 3D FDM simulation and improve the non-equidistant discretization i...
Abstract: Multi-capture composition is a valid method on extending the dynamic range of CMOS image sensor (CIS). In this paper, multi-capture composition using in real-time control is studied. By acquired the average value of all pixels, the number of saturate...
Abstract: The crosstalk of T-shaped microstrip is the important component in signal integrity of a high-speed circuit. In this paper, the fullwave analysis of the crosstalk is carried out by adopting the Perfectly Matched Layer Finite-Difference Time-Domain (P...
Abstract: At present some Intrusion Detection Systems (IDS) use the features of TCP/IP data packets for analysis and modeling, but due to the different contribution of TCP/IP features to the detecting process a favorable impact may be made on the promotion of ...