Abstract: In this paper, the issue of robust protection is investigated in WDM networks under the hose uncertain traffic model. Based on Valiant Load Balancing (VLB) and shared protection, a segment protection algorithm called VLB-SSP (VLB-based Shared Segment...
Abstract: An adaptive dynamic spectrum allocation scheme among multi-cells in cognitive radio system is proposed. Firstly, the method presents the predicting scheme of idle period of each licensed spectrum units that can be used by cognitive radio, based on th...
Abstract: For wireless sensor networks, the energy of sensor node is very limited, and there are a lot of redundant nodes when it is densely deployed. Therefore, a 3D coverage scheme based on hibernation of redundant nodes and phased waking-up strategy for wir...
Abstract: Broadcast is a common operation in multi-hop wireless networks. However, previous schemes either have much transmission redundancy or cost too much overhead. In this paper, the minimal number of forwarding nodes needed to cover a network is analyzed....
Abstract: In this paper, a distributed moving horizon state estimation approach is presented based on multi-bit quantized data. Each sensor node preserves a list of thresholds which are used to quantize observations into multiple bits. After receiving these bi...
Abstract: Inter Symbol Interference (ISI) will increase when transmission rate of an Impulse Radio-Ultra Wide Band (IR-UWB) system is getting larger, which will worsen Bit Error Rate (BER), restrict the highest realizable transmission rate. In order to suppres...
Abstract: The performance in cooperative communication depends much on efficient resource allocation such as relay selection and power control. In this paper, a game-theoretical power control algorithm with relay selection is proposed. A payoff function is def...
Abstract: The residual frequency and phase offset will make obvious degradations on the Turbo decoding performance under low SNR conditions, and it must introduce some coded-aided carrier synchronization algorithm for the phase estimation. In this paper, an im...
Abstract: The design of transceivers in relaying systems is studied with full Channel State Information (CSI) or partial CSI at the relay. Based on the acquired CSI,the relay filters and retransmits its received signals and the destination recovers the origina...
Abstract: Traditional power spectrum detector is based on the assumption that mean and variance of background noise spectrum do not vary with frequency. However, actual noise spectrums generally do not meet the hypothesis in non-cooperative satellite communica...
Abstract: Stepped Frequency Chirp Signal (SFCS) is one of usually used signals in high-resolution radar. It is a combination of chirp signal and stepped frequency continuous waveform, and has advantages of the both signals. In the design of real radar system, ...
Abstract: In this paper, the frequency domain characteristic and time-varying characteristic of the RCS (Radar Cross Section) of aircraft wake vortices in clear air are analyzed. A LMP (Locally Most Powerful) detector is introduced for detection of aircraft wa...
Abstract: Considering issue of target-aspect sensitivities in the waveform design for the recognition of broadband radar targets, a novel method termed Multi Eigen-Subspace (MES) is proposed in the additional of colored noise. The optimization is done via sele...
Abstract: The midcourse missile imaging method is the key technology for the missile-defense system. Conventional ISAR imaging methods require a uniform function to compensate the phase of the echo. The function is difficult to acquire in the wideband case, so...
Abstract: A novel criterion for thinning array optimization based on optimal polarization (minimization of the cross-polarization level) is proposed to suppress the cross-polarization level and solve the problem of grating lobes arisen from thinning array in m...
Abstract: Mode S signals are exposed to heavy A/C fruits when used in multilateration and ADS-B systems. Current decoding methods will lead to many decoding errors and low confidence declaration. Mode S decoding techniques are introduced in this paper. There a...
Abstract: In all the algorithms of the ship detection of SAR images, two parameter CFAR detector uses three moving windows: target window, protect window and background window, the sizes of the three windows and the moving step need to be trained, So it is qui...
Abstract: In this paper, a new image fusion approach is presented based on correspondence analysis to sharpen the multispectral images with the panchromatic image. First, the original multispectral images are transformed into component space by correspondence ...
Abstract: This paper proposes a denoising method of hyperspectral super-dimensional data based on Contourlet transform and principal component analysis. At first the sparse representation of images is accomplished with Contourlet transform. Then the Contourlet...
Abstract: Linear complexity is an important parameter of sequences security. In this paper, the linear complexity properties of primitive -LFSR sequences are studied. Firstly, the bounds of the linear complexity for one n stages primitive -LFSR sequence is giv...
Abstract: In this paper, the Chrestenson spectrum and the autocorrelation functions of Rotation Symmetric(RotS) functions are researched. The polynomials of RotS functions have special properties, by constructing matrixes, the relationship of the truth table, ...
Abstract: Arithmetic code on parallelized MPS(Most Probable Symbol) not only avoids complex operation of classical parallelized arithmetic code, but also does not inflect its basic probability estimation rule since utilizing statistic law of multidimensional b...
Abstract: For the issue of transmitting nonsinusoidal signal in radio frequency and improving the energy efficiency and bandwidth efficiency in nonsinusoidal communication systems, designing method of orthogonal pulse set in time domain based on Prolate Sphero...
Abstract: A concatenated coding scheme is proposed in this paper, which uses Reed-Solomon (RS) product code for outer code and convolutional code for inner code. The interleaving pattern, which is generated according to congruential sequence, is used to rearra...
Abstract: Quantum error-correcting codes play an important role in not only quantum communication but also quantum computation. Previous work in constructing quantum error-correcting codes focuses on code constructions for symmetric quantum channels, i.e., qub...
Abstract: Effective feature extraction is very important when building the smart DOA estimation model. Based on analyzing the correlation function of the array signal, this paper firstly presents using the angles of contiguous array signals correlation functio...
Abstract: Since standard Capon beamformer is susceptible to the steering vector mismatches of the Signal Of Interest(SOI), robust Capon beamforming based on steering vector error uncertainty set is investigated. In the cases that the practical steering vector ...
Abstract: An adaptive method of fractional Fourier transform based on Least Mean Square (LMS) algorithm is proposed and is used to detect and estimate parameters of multicomponent chirp signals. Through the discrete sampling of continuous inverse fractional Fo...
Abstract: A novel method based on Least Squares Support Vector Machine (LSSVM) is proposed to extract the Fetal Electrocardiogram (FECG) signal from the abdominal composite signal of the pregnant woman. The Maternal Electrocardiogram (MECG) component in the ab...
Abstract: Compressed Sensing is a research focus rising in recent years. On the basis of the signals sparse representation in the KLT domain, this paper proposes an approximate KLT method using template matching and studies on the corresponding compressed spee...
Abstract: In this paper, the characteristic of approximate backbone is analyzed and an Approximate Backbone guided Reduction Algorithm for Clustering (ABRAC) is proposed. ABRAC works as follows: firstly, multiple local optimal solutions are obtained by an exis...
Abstract: 2-Dimensional Kernel Discriminant Analysis (2DKDA) can not be performed since its scatter metric matrices are too large. This paper combines the sampling and regrouping images with 2DKDA and gives three kinds of Sampling and Regrouping 2-Dimensional ...
Abstract: Generally blind watermarking schemes are more secure in various applications because the cover meshes are absent in the watermark extraction stage, even if they are less robust than non-blind ones. But higher robustness of the blind watermarking sche...
Abstract: This paper describes and compares web-based unsupervised translation disambiguation word model and N-gram model. For acquiring knowledge of disambiguation, both two models put differents queries to search engine and statistic page counts which it ret...
Abstract: A linear feature extraction method is present with information discriminant analysis, it is based on a feasible computationally feature extraction matrix used mutual information gradient. Firstly, this paper analyzes the limitation for current linear...
Abstract: As the size of VLSI circuits keeps growing, the quality of circuit partitioning for parallel simulation is becoming increasingly crucial. In view of the fact that the present algorithms cannot guarantee the size balance and minimize the cut-signals a...
Abstract: The data processing in complex cepstrum domain can restrain the echo-like multi-reflection wave. The TDR (Time Domain Reflectometry) waveforms are analyzed in complex cepstrum domain in this paper. By filtering in complex cepstrum domain, the multi-r...
Abstract: All the current mobile beacon-assisted localization algorithms do not make full use of the practical node distribution information and let the mobile landmark travel the entire network, which causes large path length and low beacon utilization ratio....
Abstract: A method based on chaos theory is presented in this paper, to evaluate large-scale network performance using massive traffic measurement. As the periodicity of long-term link utilization measurement and the chaotic nature of short-term link utilizati...
Abstract: Attacks based on flow may bring tremendous damage to complex networks. In existing works, the cases of nodes attacking are mainly concerned, however, few work is involved to the edges. In this paper, the frangibility of complex networks is discussed ...
Abstract: Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs with hand are prone to errors. This paper introduces the game-based approach of writing security proofs and its au...
Abstract: Considering the defects in the adaptive Chase algorithm, a novel decoding algorithm for block Turbo codes based on the adaptive quantized testing sequences is proposed. This algorithm is employed to investigate the number of testing sequences, select...
Abstract: In order to synthesize real video sequence, a visual speech synthesis algorithm based on Chinese visual triphone is proposed. According to Chinese pronunciation principle and the relationship between phoneme and viseme, conception of visual triphone ...
Abstract: A novel, effective and synthetic analysis method is developed for studying the heat dissipation capability of slow-wave structure. This method, based on some theoretical and experimental research, is applicable to analyze the thermal conduction preci...