Abstract: Media synchronization puts forward determinate requirements on end-to-end delay and delay jitter. The jitter buffers at the destination site can eliminate the effect of the delay jitter but increase the end-to-end delay. Then, the requirements of med...
Abstract: Reliability and stability are essential to Media-on-Demand (MoD) system. Based on the node reliability and QoS assessment, a Peer-to-peer MoD architecture (RP2MoD) is proposed in this paper. In the proposed system, the reliable degree of each client ...
Abstract: The current practical scheduling algorithms supporting unicast and multicast traffic in high-speed crossbars are generally based on a request-grant-accept process, such as ESLIP. But there is a phenomenon called Grant blocking between unicast and mul...
Abstract: Sensing range is the maximum range within which a sensor node can detect a target. This paper proposes an energy-efficient scheme for area coverage in wireless sensor networks with adjustable sensing ranges. The scheme assigns reasonable sensing rang...
Abstract: In this paper, a distributed intrusion detection approach is proposed based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only mak...
Abstract: The key management schemes bsaed on Distributed Certificate Authority resolve the difficulty to adopting concentrating key management in space networks, but result in some new threats of authenticated key. Based on discribing and analyzing the threat...
Abstract: The existing periodic broadcasting schemes mainly support CBR-encoded videos. A modification of recursive frequency-splitting (RFS) scheme, called v-RFS, is presented in this paper to support VBR-encoded videos. In v-RFS, the maximum number and the p...
Abstract: A novel cooperative Hybrid-ARQ protocol is presented on the basis of network coding. Two users communicate with the base station with the assistance of a relay node. Relay node responds the repeat request and processes two users incremental redundanc...
Abstract: Compared with OFDM system with Cyclic Prefix (CP-OFDM) which satisfies strictly complex field orthogonality, OFDM/Offset QAM system (OFDM/OQAM) only satisfies the real field orthogonality. Therefore, in present of multipath fading channel, the Inter ...
Abstract: Being different from previous spectrum sensing research for single-antenna cognitive users, a spectrum sensing algorithm based on optimal power allocation and cooperative diversity under multi-antenna scenario is proposed. It used Sigular Value Decom...
Abstract: This paper proposes a new limited feedback approach based on tree-structure codebook. As the temporally-correlation across adjacent frames, the quantized channel vector codeword can be modeled as a first-order finite-state Markov chain. The channel v...
Abstract: A cooperative communication and wireless relay techniques based convergence mechanism for the heterogeneous wireless communication system is presented to fulfill the functionalities of convergence and interworking. In order to maximize the capacity o...
Abstract: A construction scheme of sequences with good properties for multi-carrier code division multiple access communication systems is presented. The proposed method is based on sequences with Zero Correlation Zone (ZCZ), and a novel kind of sequences with...
Abstract: A novel proportional fairness algorithm based on the application time window for multiuser MIMO- OFDM systems with delay channel state information is presented in this paper. With the goal of maximizing overall data throughput in a finite time window...
Abstract: In this paper, An analysis method of effects of frequency offset on the property of pulse shaping multicarrier system is presented. The method first divides demodulator output into signals and interference, and then based on the cross-ambiguity funct...
Abstract: A new conic fitting code discriminator is proposed for the traditional discriminator gain decreasing in bandwidth-limited environment. According to the correlation property, conic fitting code discriminator gets the conic equation with the early and ...
Abstract: Adaptive equalization is an effective way to cope with intersymbol interference caused by multipath propagation in underwater acoustic coherent communication. An experiment is carried out to verify the coherent underwater acoustic communication techn...
Abstract: MF-TDMA has been widely applied to the up-link of broadband communication satellites, and the timeslot allocation strategy is the key to guarantee the efficient utilization of the system resources. In this paper, the timeslot allocation technology wi...
Abstract: Aiming at access security aspect of 3G-WLAN heterogeneous wireless network, this paper abstracts each entities of heterogeneous wireless network, thereby establishes a general authentication model. Then based on this general authentication model, a n...
Abstract: Ring signature is a new kind of anonymous signature which can provide unconditional anonymity of the signer. Proxy ring signature is the combination of proxy signature and ring signature. Previous proxy ring signature schemes are constructed based on...
Abstract: This paper proves that the noise functions produced by six kinds of macrocosm approximations of exclusive or with addition modulo 2n have the same probability distribution values. Then, the relations between the six noise functions are given. Moreove...
Abstract: In this paper, based on output linearization feedback control,the nonlinear function of the chaotic system is linearized, then the complex synchronization of the nonlinear chaotic system is converted into the stable problem of the linearization syste...
Abstract: Whether the algorithm noise can be effectively wiped off decides the success or loss of the power analysis attack. This paper offers a new differential power analysis attack algorithm, which is based on the consumed power differences between two neig...
Abstract: For k-redundant multicast network, the maximum multicast rate can be achieved with network coding. The minimal finite field which is enough to implement network coding for different multicast rate in k-redundant multicast network is obtained, by usin...
Abstract: It is difficult to recovery carrier at rather low SNR (2 dB). An iterative carrier recovery via soft decision metrics of LDPC decoding is proposed. By maximizing the sum of the absolute value of the soft decision metrics of LDPC decoding with search ...
Abstract: BP (Belief Propagation) decoding based on reliability updating schedule reduces the computational complexity and improves the decoding efficiency. However, the poor Bit Error Rate (BER) performance of the decoding appears due to the low accuracy of r...
Abstract: The iterative channel decoder of joint source-channel decode has the transform of log-likelihood and probability, also the multiplication and accumulation operation, which improves the computation complexity of channel decoder. In order to reduce the...
Abstract: The performance loss of conventional Grassmannian codebook is analyzed. According to the analysis of unitary perturbations effects on channel capacity as well as the BER, a novel hierarchical codebook consisting of a Grassmannian main-codebook and a ...
Abstract: A new method is proposed in this paper to accomplish the carrier frequency estimation of non- cooperative underwater acoustic DSSS-BPSK signal. The carrier frequency estimated using the method is accurate even under low-CNR and signal distortion cond...
Abstract: A new algorithm named as M-elitist Evolutionary Algorithm (MEA) is presented with low complexity and high performance to approach the performance of Maximum-Likelihood(ML) detection, for solving the problem of the high complexity of ML detection in r...
Abstract: The information within different cyclo-frequencies about the wideband cyclostationary signals may be complementary to each other, whether and to what degree can they be exploited synthetically to improve the Direction-Of-Arrival (DOA) performance wit...
Abstract: A time-domain Multi-Stage Algorithm (MSA) based on the second order statistics for blind source separation of convolutive mixtures is proposed. Whitening procedure is adopted to transform the mixing matrix into a unitary matrix. The unitary matrix is...
Abstract: The located text regions need to be binarized for accurate recognition in automatic textural extraction. Due to the complex backgrounds, traditional thresholding methods can not segment the character image effectively from natural scenes. A novel app...
Abstract: A novel method of extracting affine invariant feature is proposed using the theory of Generalized Canonical Correlation Analysis(GCCA). First, a new kind of transformation named MSAE is constructed based on MSA. Second, MSAE is proved to be affine in...
Abstract: Calculating methods of normal vector, principal curvatures and principal directions at each triangular mesh vertexes are researched. Types of vertexes on surface are analyzed. A method for mosaicing broken objects based on fractured faces matching is...
Abstract: In order to solve the low accuracy diagnosis of metastases and non-metastases tumid lymph nodes in the lung cancer N stage with chest CT images, effective image features of lymph nodes need to be found for quickly and accurately differentiating metas...
Abstract: This paper presents an algorithm to select the optimal Gaussian filtering scale. First, it estimates the SNR of image to evaluate the noise degraded intensity of image. Second, it obtains the optimal Gaussian filtering scales by using optimal criteri...
Abstract: A detector based on order statistic for range spread target in white Gaussian noise is derived in this paper. With the fact that the power of wideband radar target return is concentrated in several range bins, the data in the detection window is re-a...
Abstract: When distributed Space-borne SAR measures the ground moving target velocity using along track interferometry, larger baseline leads to serious velocity ambiguity. On the basis of exploring robust Chinese remainder theorem, this paper analyzes the met...
Abstract: In order to solve the problem of recognition to the ground-based radar station using an active radar seeker, the fusion recognition algorithms are put forward. Firstly the electromagnetic scattering model of the phased-array antenna is established. T...
Abstract: The cross-range scaling is the base of the pattern matching and target characteristic extraction. Using the approximately proportional relation between the Doppler frequency in cross range and the transverse coordinate position, and based on the orth...
Abstract: The construction of available fusion models, such as that based on color space transform, on statistical, on multi-scale analysis is mostly based on the experience. These models have the problem that the parameters are subjectively chosen and can not...
Abstract: Considering the antenna mutual coupling problems on electrically large platforms, a fast algorithm of Time Domain Integral Equation (TDIE) based on the Geometry Theory of Diffraction (GTD) is proposed. On the basis of classical Marching-On in Time (M...
Abstract: A -TM610 mode double-gap coaxial cavity loaded by a coaxial line is proposed as the output circuit of X-band multi-beam klystron. Its main performances, such as bandwidth and power capacity, are studied. The results show that characteristics impedanc...
Abstract: Based on the theory of finite polynomial ring, a novel code design method for Quasi-Cyclic Low Density Parity Check (QC-LDPC) codes with continuously variable length is proposed. When the cardinal number of the ring is larger than a certain threshold...
Abstract: A Luby Transform (LT) encoding algorithm based on parabolic map by using chaotic scrambling method is proposed. Firstly, chaotic sequences are produced by using parabolic map and then transformed into uniform-like sequences. The degree distribution a...
Abstract: A type of baseband GMSK signal correlator is presented in this paper. From the phase probability density function of demodulated GMSK signal and the probability distribution function of the sums of independent identical distribution random variables,...
Abstract: It is obtained that every formant can be traced and found out by studying and analyzing the Chinese speech in the way of experiment in this paper, combining with the generally articulation feature of the Chinese speech, a speech enhancement algorithm...