Abstract: This paper presents the sampling criteria for the three-Dimensional (3-D) microwave imaging of the surface of the human body. Then the algorithm based on the wavenumber domain integration along the wave propagation direction at the given ground-range...
Abstract: Specific emitter identification is the key research fields of modern electronic intelligence systems and electronic support measurement systems. Based on the analysis of individual features of radar emitter, a specific emitter identification algorith...
Abstract: Radar emitter sorting rate of current methods is not high and they are sensitive to the Signal Noise Ratio (SNR). In this paper, complexity characteristics are applied to sorting unknown complicated radar signal and a high sorting rate is got. The re...
Abstract: A method of SAR image segmentation based on Multiscale AutoRegressive and Markov Random Field (MAR-MRF) models is presented. MAR models is used to establish mathematic relationship among different image layers, and is combined with Markov Random Fiel...
Abstract: The general relative range model for non-linear trajectory is built firstly, followed by the maneuver induced phase errors analysis. The quantitative conditions of ignoring these errors are deduced later. Then this paper concerns on the issue of miss...
Abstract: Regularization technique can accomplish super-resolution and noise suppression by imposing prior information, which provides high quality image for target recognition. The iterative process of SAR complex imagery domain regularization based on lk nor...
Abstract: In this paper, a new approach based on Taper Scale Transform (TST) is presented for weak ship target detection in the circumstance of strong clutter and noise. By scaling the coordinate of signal instantaneous correlation function, the coupling betwe...
Abstract: To identify with the target images obtained by Synthetic Aperture Radar (SAR), those subspace-based methods for Automatic Target Recognition (ATR) are usually based on the range subspace of the samples. When some similar targets need to be distinguis...
Abstract: Aiming at the problems of the target-aspect sensitivities, the time-shift sensitivities and the initial phase uncertainty in the waveform design for the recognition of broadband radar targets, a novel method termed GASC (Genetic Algorithm and Slide C...
Abstract: In order to meet the needs of traffic information collection in Intelligent Transportation System (ITS), a design of K-band dual mode traffic information collection radar which can work in both Frequency Modulate Continual Wave (FMCW) mode and Contin...
Abstract: Phase-coded signals suffer from Doppler mismatch in pulse compression due to the characteristics of the ideal thumbtack ambiguity function. In this paper, a novel model of measuring velocity-and-range and the corresponding Doppler compensation algori...
Abstract: In the process of ballistic missile penetration, modern active jamming systems can generate decoys resembling true target echoes in aspects of energy, waveform, or even phase modulation. These decoys can share the radar signal processors coherent pro...
Abstract: Fixed step-size Subband Adaptive Filters (SAFs) must carry out a trade-off between fast convergence rate and low steady-state misadjustment. According to the functional relationship between the Mean-Square Deviation (MSD) of the coefficient vector of...
Abstract: Image registration is transformed an unconstrained optimization problem in image mosaic. Parameter optimization model algorithm is proposed by means of quadratic form theory-- orthogonal approximation algorithm. According to properties of best-functi...
Abstract: Due to representing 3-dimensional color vectors as quaternion hypercomplex numbers, a color image sequences is mapped as a quaternion hypercomplex function in 3-dimensional spatial-temporal space. By underlying hypothesis of Color Constant Model (CCM...
Abstract: This paper presents an improved SIFT(Scale Invariant Feature Transform) descriptor for local feature detection and matching in object tracking. Only the local maxima in DOG scale space are detected as candidate interesting points to improve the stabi...
Abstract: Contour features are powerful cues for human vision system to analyze and identify objects. A new method for automatic multi-categorical objects recognition using shape statistical models is proposed to improve the disadvantages existing in most of t...
Abstract: Direct LDA (DLDA) is an extension of Linear Discriminant Analysis (LDA) to deal with the small sample size problem, which is previously claimed to take advantage of all the information, both within and outside of the within-class scatter's null space...
Abstract: Frequency-shaping pulse is one of the essential modulation parameters for the demodulation of Continuous Phase Modulation (CPM), and it is determined by the pulse shape and pulse length. In this paper, based on the features of the auto-correlation of...
Abstract: This paper proposes a Multi-Stage FastICA Algorithm(MSFICA) to solve the problem of error propagation in the traditional successive FastICA algorithm. MSFICA removes the error propagation effect through a two-stage structure. In order to reduce the c...
Abstract: According to the model of sampling in shift-invariant subspace with multiplicity r, this paper proposes a reconstruction method of sampling in shift-invariant subspace with multiplicity r based on least squares method, moreover, obtains the reconstru...
Abstract: The derivation mistake in Caos Fuzzy Fisher Criterion (FFC) based Semi-Fuzzy Clustering Algorithm (FFC-SFCA) is pointed out. Combining Fuzzy Compactness and Separation (FCS) clustering algorithm, a new clustering algorithm, FFC-FCS, is proposed in th...
Abstract: Ranging is one of the most important processes in the mobile WiMAX standard, for resolving the uplink synchronization and near/far problems. In this paper, under WiMAX OFDMA framework, two Carrier-Frequency Offset (CFO) estimation methods for multius...
Abstract: The unbiased Minimum Mean-Square Error-Iterative Tree Search (MMSE-ITS) detector, which is known to be one of the most efficient Multi-Input Multi-Output (MIMO) detectors available, is improved by selectively augmenting partial length paths and by ad...
Abstract: To ensure the reliability of the data transmitting for the Unmanned Aerial Vehicles (UAVs) in dynamic environment, a novel class of fast acquisition algorithm based on Partial Matched Filters and Two-Leveled FFT(PMF-TLFFT) is proposed, which is capab...
Abstract: A modified Vertical-Bell Labs layered space-time (V-BLAST) system is proposed by Shao(2007). However, the ZF detection algorithm proposed by Shao is not the optimum under ZF criterion. In this paper, the optimum ZF detector is directly derived from t...
Abstract: In this paper, detection performance and detection sensitivity with detection duration and noise average power fluctuation in short time is investigated firstly. Performance accuracy and detection sensitivity drop quickly with noise average power flu...
Abstract: This paper proposes a Utility-Based and Channel-resource Borrowing (UBCB) call admission control strategy of mobile satellite system. In order to improve resource utilization probability and integrated performance of satellite system, the borrowing w...
Abstract: The channel feedback requirement of the MISO-SDMA using Zero-Forcing (ZF) precoding in multi- antenna broadcast channels can be considerably reduced by employing more antennas at user terminals and using the related antenna combining technique. In th...
Abstract: In cellular communications, the criteria for Fast Cell Selection (FCS) usually depend on single factor, which is lack of flexibility and fairness. In order to improve FCS performance, a novel algorithm is proposed. Based on extension theory, a flexib...
Abstract: Considering the uplink inter-cell interference in the OFDMA cellular system, an inter-cell power control method based on IoT is proposed. This method gives an amendment on the traditional power control through the exchange of the interference of the ...
Abstract: Added key on modulo 2n operation-Y=X+Kmod2n is a code link which is often used in cipher algorithms, as SAFER++, RC6, Phelix and so on. In this paper, the Y=X+Kmod2n is analyzed with differential cryptanalysis. And the characters of structure, counti...
Abstract: In order to solve the troubles of incomplete reduction tumbled in the realization of R-ate and efficient compute the R-ate, a new technique named m-R-ate, which extend R-ate from Fq to Fqm , is proposed. Furthermore, in m-R-ate a very efficient algor...
Abstract: The goal of password-based authenticated exchange protocol is established secure key by using pre- shared human-memorable password. Most of existing schemes either have computation burden or rely on the random oracle model. A new scheme without rando...
Abstract: In this paper, a new authenticated key exchange protocol is proposed and its security is proved in the stronger version of the well-known CK model revised by Krawczyk. The analysis of the protocol is under standard model instead of Random Oracle Mode...
Abstract: Information hiding is a technique that hides secret messages in some carrier during transmission or storage. Carriers in common use include image, audio, video, text documents and so on. Since there is little redundancy in text documents, particularl...
Abstract: In this paper, an adaptive optimization scheme for IEEE 802.11 DCF is proposed to enhance the throughput and fairness performance. The scheme is based on channel sensing result for network state information and thus it is called CSCC (Channel Sensing...
Abstract: This papar presents a probabilistic logging scheme based on Bloom filter for source tracing. The scheme makes probabilistic sampling of all packets through each router, and uses efficient Bloom filter for storage. The sampling information can stored ...
Abstract: In this paper, we consider the impact of node failure on the monitoring reliability of wireless sensor networks. The quantitative criterions of two basic network monitoring performance, coverage and connection, are proposed from the perspective of no...
Abstract: In order to solve the problem of wireless link instability in sensor network, based on the r-neighborhood graph model, this paper puts forward a robust adjustable topology control algorithm with steady links, named RAWSL. RAWSL algorithm sets the rec...
Abstract: Lack of cache and service time-delay in the media streaming system are considered. PCSPC (Proxy- Caching Scheduler based on P2P Cooperation) is proposed. First according to the principle that more popular data are assigned more cache, corresponding c...
Abstract: A selective registering method is proposed to solve the problem of data loss in readout caused by simultaneously accessing both the read and write ports at the same address of a synchronous dual-port memory IP. Using this method to design an embedded...
Abstract: Analysis of RLC Statistical delay considering process fluctuation is presented in this paper. Construction of parasitic parameters and moments with process variation is first given, and then a statistical delay model based on Weibull distribution is ...
Abstract: MultiLevel Fast Multipole Algorithm (MLFMA) in conjugation with the best uniform approximation is applied to the scattering analysis of an arbitrary shaped perfect electric conductor over a wide frequency band in this paper. The nodes of Chebyshev wi...
Abstract: A new micromechanical electric field sensor system with a closed-loop autonomous driving circuit is designed and simulated. The closed-loop autonomous driving circuit, which uses the principle of auto-gain-control, keeps the micro sensor working in t...
Abstract: A multicomponent LFM signals detection method based on multi-scale chirplet sparse signal decomposition is proposed to overcome the problems of cross-interference and cross-decomposition existed in the multicomponent LFM signals processing based on t...
Abstract: This paper presents a novel decentralized trust management model with reputation. In P2P (peer to peer) network, there is no trusted authority. Trust relations between peers should be established with peers behaviors. There are three main contributio...
Abstract: To solve the tracking problem of maneuver target with acoustic characteristic in wireless sensor network, according to the attenuation model of acoustic energy with distance, an acoustic-energy based target tracking algorithm is proposed based on dyn...