Abstract: The curse of high dimensionality is usually a major cause of limitations of many machine learning algorithms. A novel algorithm called Neighborhood Margin Fisher Discriminant Analysis (NMFDA) is proposed for supervised linear dimensionality reduction...
Abstract: Support vector machine has been applied in many research fields, such as pattern recognition and function estimate. There is a shortcoming in Weighted SVM and Fuzzy SVM, which take the importance of sample into account but neglect the relative import...
Abstract: Coalition generation is a key problem in multi-agent systems. Discrete particle swarm optimization is adopted to solve the problem, and random perturbation of particles is used to avoid premature convergence. A novel two-dimensional binary encoding i...
Abstract: In this paper, a modified model of random walk is proposed, and then a clustering algorithm is developed based on this model. In the algorithm, at first a weighted and undirected graph G(V,E,d) is constructed among data points in a dataset according ...
Abstract: A novel dimensionality reduction method called Local Marginal Discriminant Analysis (LMDA) is proposed in this paper based on spectral graph theory and manifold learning. Based on Neighborhood Preserving Projections (NPP), the reconstruction distorti...
Abstract: As the main prevailing denoising method, how the threshold function works and whats the threshold value are the greatest importance techniques. Consider the dependencies between the coefficients and their parents, a non-Gaussian bivariate distributio...
Abstract: In this paper Haar wavelet is used to construct the simulated natural terrain based on the FBM model and fractal features. Relations between fractal coefficients of truly terrains and wavelet decomposition coefficients of which are anlysised firstly,...
Abstract: Registration of the consecutive frames is quite essential in dynamic video super resolution. In this paper, a multi-scale least square affine-based block-match method is proposed. An index Dmv is defined to evaluate global and local matching performa...
Abstract: The single watermark algorithms always merely have single function. In order to overcome the drawback, a multi-purpose dual watermark algorithm is proposed in the paper, taking advantage of the stability of singular values. It divides the original im...
Abstract: Quantization step is one of the key factors affecting the performances of quantization watermarking. In this paper, a new quantization watermarking algorithm is proposed using the JPEG quantization table to choose the quantization step of dither modu...
Abstract: For the multisensor linear discrete time-invariant stochastic control systems with correlated input and measurement white noises, and with correlated measurement white muses, a weighted measurement fusion steady-state Kalman filtering algorithm is pr...
Abstract: This paper proposes a new image denoising method based on the NonsubSampled Contourlet Transform(NSCT) and the bivariate model under the framework of Bayesian MAP estimation theory. The proposed algorithm uses the NSCTs advantages of translation-inva...
Abstract: A new algorithm is proposed for blind separation of two MPSK mixture signals obtained by a single- channel receiver. The proposed algorithm is based on optimal Bayesian Estimation criteria, and implemented via the particle filtering that is used to s...
Abstract: This paper mainly studies the sufficient necessary condition of linear separability and the essential of soft margin in SVM, which is used in target recognition. In this paper, the sufficient necessary condition of linear separability is proved using...
Abstract: A steering-invariant constant beamwidth beamforming algorithm is proposed. On the basis of main-lobe shape controlling idea, the proposed algorithm uses the main-lobe on some direction as reference main-lobe, and constructs the reference beampattern ...
Abstract: This paper proposes a new system based on DPCA technology for the detection and position of moving target, namely three antennae are placed at a slant angle along airplane flying detection. The echo model of moving target is established based on thre...
Abstract: Micro-dynamics characteristics are related to targets structures and can be used for target classification. Rotation structure of target is modeled as a sum of directional point scatterers. With the directional point scatter model, the micro-Doppler ...
Abstract: This paper presents a method for synthetic aperture radar images target recognition based on wavelet domain non-negative matrix factorization feature extraction. Low-frequency sub-band image is obtained by 2-D discrete wavelet decomposition of a SAR ...
Abstract: According to Doppler centroid shift and Doppler spectrum split, this paper proposes an adaptive Doppler nonuniform bit allocation approach based on one dimension Look-Up Table (LUT). Combined with one dimension quantization and coding LUT this approa...
Abstract: Based on the system characteristics of MIMO radar,two kinds of MIMO radar CFAR detectors(termed OSCA-CFAR and LCIOSCA-CFAR) based on order statistic and mean level are presented. Firstly, formulas of false alarm probability and detection probability ...
Abstract: The motion of the ballistic target in midcourse is very complex, which has high flight speed and micro-motion such as spin, precession and tumble. According to its complex motion, wideband radar echo model after dechirping is firstly built. Then the ...
Abstract: This paper mainly deals with the optimal inteferometric coherence of the residual images in frequency domain in detection and location of moving target with polarimetric SAR. The essential procedure of clutter cancellation in doppler frequency is pre...
Abstract: Based on the character of SAR imaging procedure, this paper proposes a new passive SAR barrage jamming approach, utilizing the rotating angular reflectors. This method makes use of micro-Doppler modulation induced by rotating angle reflectors in orde...
Abstract: To calibrate the channel errors with gain and phase uncertainty for bistatic HF surface wave Synthesis Impulse and Aperture Radar (SIAR), a self-calibration approach for evaluating the gain-phase errors is presented in this paper. The impact of chann...
Abstract: When Ground Penetrating Radar is applied in actual projects, medium parameter (the permittivity is main) is a necessary data for users to position the depth of underground targets and the thickness of medium layers correctly. An inversion algorithm f...
Abstract: This paper analyzes the two scattering models and inversion techniques for bare soil surface, which were proposed by Oh(1992) and Dubois(1995), respectively. A method to validate the parameter inversion results of both two models was developed under ...
Abstract: The reflection coefficient of the receiver load of the feed system model for the cells in the active phased-array antenna is analyzed by S parameters. The scattering field of the active phased-array antenna is analyzed by submitting the reflection co...
Abstract: Through establishing structure model, the relation is presented among radiation power density of radiation source and effective permittivity and effective permeability. Simultaneously, the relations are numerically analyzed between radiation power de...
Abstract: For MIMO system, as an efficient algorithm to replace ML detection, Sphere Decoding (SD) can reduce the detection complexity greatly. Whereas the bad channel with large condition number still aggravates the computation complexity of SD. In this paper...
Abstract: Performance of Discrete Fourier Transform (DFT) based channel estimation for Space Time Block Code-Orthogonal Frequency Division Multiplexing (STBC-OFDM) systems with virtual subcarriers is analyzed. The concise expressions for Mean Squared Error (MS...
Abstract: A semi-blind multi-user constant modulus receiving system for downlink MIMO MC-CDMA system is proposed. The received signals are pre-processed before constant modulus detection, then the MIMO receiving system is transformed into several SISO receivin...
Abstract: In order to tackle the inter-user interference issue of the limited feedback SDMA which uses a fixed number of active beams to simultaneously transmit signal, this paper proposes a novel limited feedback SDMA capable of adaptively selecting the optim...
Abstract: For broadband OFDM systems, Doppler effect induced by high mobility gives rise to the InterCarrier Interference (ICI). By fully exploiting the ICI distribution property and partial channel information, two novel complexity-reduced Minimum Mean Square...
Abstract: Traditional Tomlinson-Harashima Precoding (THP), which leaves all the equalization tasks to the transmitter, prevent from fully utilizing the advantages of MIMO techniques. In this paper, a THP scheme for multiuser MIMO system is proposed. The inter-...
Abstract: In this paper, the relative content is researched for resolving the problem that a lot of wireless resource is expended by feedback information in MIMO-OFDM system. A novel algorithm including cluster, quantization and feedback is proposed. By utiliz...
Abstract: In this paper, a novel synchronization acquisition approach using the early-late gate for FFH/BFSK system is proposed, and it is based on frequency-PN sequence double pattern. Analytical and numerical results show the following advantages: the decisi...
Abstract: In this paper, the generalized orthogonal sequences and N-shift partial length D0 orthogonal sequences with partial correlations are investigated. In particular, the partial correlation properties of Loosely Synchronized (LS) sequences are analyzed i...
Abstract: Cooperative diversity with multi-relay provides dramatic gains in slow fading wireless environments. In terms of average Symbol-Error Rate(SER) at the destination, the performances of multi-relay cooperative transmission with Maximal Ratio Combining(...
Abstract: In order to improve the wavelength utilization in WDM networks, multiple traffic connections can be allowed to share the capacity of a wavelength via TDM technology. The resultant network is a WDM-TDM optical network, where the Routing, Wavelength an...
Abstract: In this paper, a subcarrier grouping approach for Group-wise Full-Diversity Full-Rate (GFDFR) coded MIMO-OFDM systems with virtual and DC subcarriers is proposed. A PDA-SD hard detection algorithm and a neighbor searching soft detection algorithm, wh...
Abstract: In high speed wideband wireless communications, the duration of channels impulse response is about hundreds of symbol periods, which causes the convergence speed of linear blind equalizer to be much slower. Based on subband decomposition technique, a...
Abstract: According to the reality that the need of users is becoming more and more diversified in telecommunication service field, the model of semantic Web services in Internet is tailored and a semantic Web services based intelligent telecommunication servi...
Abstract: The probability of packet delivered in Ad hoc network can be guaranteed by the multi-path scheme, with the analysis on the path numbers, the decision method based on packet drop rate is introduced; furthermore, the segment adaptive multi-path routing...
Abstract: All nodes in Chord can be viewed as being placed into a one-dimensional ring. In this paper, a novel concept of bi-dimensional P2P is introduced for mobile Ad hoc networks, in which nodes are placed into a square, so that more than one configurable r...
Abstract: Peer-to-Peer (P2P) overlays are appealing, since they can aggregate resources of end systems without relying on sophisticated infrastructures. Unfortunately current peer-to-peer systems either offer exact keyword match or provide inefficient text sea...
Abstract: Service description language, metadata storage and service matching algorithm are three critical factors influencing the efficiency and quality of service discovery. This paper presents a prototype system of Chord-based semantic service discovery wit...
Abstract: Mobile Agent(MA) is more suitable for wireless sensor networks than the C/S model in data fusion. In MA based data fusion, the order of nodes visited along the route by MA has a significant impact on the algorithm efficiency and life time of wireless...
Abstract: As RFID becomes more and more popular, it is imperative to design authentication protocols to resist all possible attacks and threats. In order to overcome counterfeits of readers, a new authentication protocol is proposed based on key array. The new...
Abstract: -LFSR is a word-oriented feedback shift register with a good tradeoff between security and efficiency. As an example, using -LFSR in ABC increases its period from 232(2127-1) to 232(2128-1) and, more important, its Hamming weight with the feedback po...
Abstract: Motivated by an enormous amount of storage between DWT and EBCOT in JPEG2000 hardware implementation, a novel memory-efficient scheme based on code block size is proposed. Further reuse of on-chip code block size memories and efficient scheduling of ...
Abstract: The thermal statement of the helical slow wave structure is analyzed in detail in this paper, and an elliptical shell is firstly brought up to replace the conventional circle shell in the slow-wave structure. Then the 3D thermal analysis of the helic...
Abstract: A novel MRF model called SPMRF (Structure Preserving MRF) is proposed for Bayesian despeckling of SAR images. In SPMRF every pixel within a neighborhood is associated with a weighting parameter which determines its contribution to the central pixels ...
Abstract: In this article, an ultra-high speed SAR raw data recorder based on disk array is introduced, including its construct, working principle, and main features. Two kinds of data packet allocating method are proposed: the sequential allocating method and...
Abstract: In this paper, a new transmit beamforming scheme with limited feedback is presented in Multiple-Input Single-Output Orthogonal Frequency Division Multiplexing (MISO-OFDM) systems. By dividing the total subcarriers of an OFDM symbol into a series of c...
Abstract: The common multiple-access schemes for Differential Chaos Shift Keying (DCSK) system have two disadvantages. Firstly, all users share the same slot, only method to decrease multiple-access interference is utilizing the low correlativity of chaotic si...
Abstract: Identifying video stream quickly from the network flow is the foundation and prerequisite of network video surveillance and management. According to the analysis of characteristics of network video streams, a fast recognition and classification algor...
Abstract: Wang et al. (2005) proposed a collision attack on MD5 and gave a set of sufficient conditions to yield a MD5 collision. Yuto Nakano et al. (2006) pointed out that there were 16 redundant conditions in Wang et al.s set of sufficient conditions and exp...