Abstract: The application of Internet is being changed from information exchange to information sharing, along with the durative rapid growing of internet information and demands. However, the study on the network survey indicates that the current network arch...
Abstract: A load-balance approach in distributed QoS registry for Web service is proposed. According to peer load status, different load information dissemination policies are applied which significantly reduce network overhead. A load-balance approach based o...
Abstract: A novel scalable Multiple-Plane and Multiple-Stage (MPMS) packet switching fabric is proposed in this paper. Firstly, the graphic model of the MPMS fabric is built. The neighbouring connectivity and reachability of MPMS are described. Vertexes are cl...
Abstract: Automated negotiation is a key form of interaction in agent-based systems. Firstly, a flexible one-to-many negotiation model is proposed. This model supports continuous, open and dynamic negotiation. Then the coordination strategy based on relative u...
Abstract: Sensor deployment is related directly to the cost and performance of underwater sensor networks. Considering great cooperative capability of sensor nodes, this paper presents a deployment strategy based on detection fusion. Neyman-Pearson criterion i...
Abstract: Cluster-based Topology is an energy-efficient topology control method in large-scale wireless sensor networks. The cluster head depletes energy more faster than cluster member and the rotation of cluster head is needed to balance the energy consumpti...
Abstract: Security of wireless sensor networks has attracted much attention in recent years and key management is a critical issue of it. EBS-based dynamic key management scheme is a new approach for wireless sensor networks. The major advantages of EBS-based ...
Abstract: Bit commitment is a fundamental primitive in secure multi-party computation. It plays an important role in constructions of more complicated multi-party protocols. A new model of bit commitment named three-party bit commitment is proposed in this pap...
Abstract: Two new steganalysis methods for the Least Significant Bit (LSB) embedding technique are proposed based on the analysis of the laplacian statistics of image pixel. The relation between the current pixel and its four-neighborhood pixel average is defi...
Abstract: For application aimed NoC design, this paper proposes an analytical model of communication performance and designs a buffer optimizing strategy and allocation algorithm. The hardware simulation results show that the model can analyze the average dela...
Abstract: Fairness is an essential property in e-payment protocol. An ideal functionality of fair e-payment is defined in the universal composability model. In the hybrid model which aided by ideal convertible signature functionality, ideal registration functi...
Abstract: Digital communication signals of different modulation schemes, with the nonlinearities applied to the complex envelope, always manifest themselves in spectrum line feature. In this paper, a complete theoretical analysis for the square and quartic spe...
Abstract: In this paper, to simplify the computational complexity of intra-frame prediction mode selection for H.264, an improved Intra-frame prediction mode selection algorithm is proposed. Firstly, a new operator is proposed to describe the gray-level info o...
Abstract: In this paper, a statistic channel information-based relay selection scheme is proposed in non-regenerative cooperative networks. Firstly, a parameter named equivalent channel gain is defined based on the statistic channel information under the equal...
Abstract: This paper proposes a novel adaptive tracking metric for precoding matrices in finite feedback precoding MIMO systems with wireless correlated channels. From the statistical point of view, this metric has an optimal property to describe the relations...
Abstract: A spectrum sharing algorithm for downlink cognitive radio systems is proposed to maximize the system capacity under total transmission power and interference constraints. Interference to the licensed users is analyzed, and a method to set interferenc...
Abstract: In this paper, the precise topography-dependent motion compensation for repeat-pass InSAR is studied. The effects of the residual motion errors caused by the flat surface assumption and center-beam approximation are analyzed, which shows the necessit...
Abstract: A Kernel Uncorrelated Discriminant Subspace (KUDS) method based on Generalized Singular Value Decomposition (GSVD) for radar target recognition is proposed. The new method combines with the advantage of GSVD and kernel trick, which can effectively ov...
Abstract: The interpolation for Range Cell Migration Correction (RCMC) is an important step in Range Doppler (RD) algorithm. The Slant Range to Ground Range (SRGR) conversion also needs interpolation approach. The interpolation introduces errors to SAR imagery...
Abstract: This paper proposes a decentralized Image Feature-based Space-Time Processing (IFSTP) algorithm in Airborne Orthogonal Netted radar (AON-IFSTP) for the detection of ground moving targets, and evaluates its detection performance. Firstly, the iso-rang...
Abstract: Monostatic High Frequency (HF) surface wave radar is vulnerable by the threat of electronic disturbance, stealth targets and so on, and the establishment of monostatic-bistatic composite HF radar network is the most achievable way to solve this probl...
Abstract: In stepped frequency radar, the velocity of targets must be estimated and compensated to eliminate the range migration and distortion due to target moving. The conjugation method is presented for velocity measurement in stepped frequency radar. And a...
Abstract: Location of noise-frequency modulation jammer with TDOA(Time Difference Of Arrival) in passive system is studied, a new method of cross-correlation using delta-modulation coding jointed decimation and interpolation is presented in this paper,and loca...
Abstract: An existing approach for beam synchronization, which is based on antenna steering on both sides, can not be applied to Spaceborne/Airborne hybrid Bistatic SAR (SA-BSAR) systems using sources of opportunity since the transmitter beam can not be steere...
Abstract: In this paper, the space-frequency instantaneous polarization characteristics of the specific radar target is analyzed, and its successful application to the retrieval of targets geometrical structure is also proposed. The concept and derivation of s...
Abstract: In this paper, a novel method,i.e., the equi-amplitude tracing method applicable to the detecting of vital signal is presented based on the analyses of the principle of vital signal detecting by means of base-band UWB radar. The self-developed UWB ra...
Abstract: ESA radar can distribute space power and time as required by flexibly controlling the direction and stare time of the beam, which enables the ESA radar to provide the capability of implementing multiple targets Tracking And Searching (TAS). Tow criti...
Abstract: Layer picking is the base of doing geological explanation correctly in geodesic aims of GPR. A layer picking based on hidden Markov model and Bresenham algorithm is presented in this paper. After tracking Time Of Delay (TOD) of GPR echoes, edge detec...
Abstract: The relativity between hyperspectral images of different waveband is differ from each other, contraposing this characteristic, this paper presents a lossless compression algorithm of hyperspectral image which is based on searching the optimal couple ...
Abstract: SAR target detection and recognition is sensitive to targets azimuth. To solve the problem, based on correlation theory and kernel feature analysis, a kernel correlation filter which is strongly robust to targets azimuth distortion is proposed. The n...
Abstract: For present analog Loran C receiver, it is very complicated and takes a long time to complete cycle identification. Moreover, estimate error when arriving time of sky-wave and ground-wave is less than 50 under algorithms presented by some relative do...
Abstract: In order to improve the precision of RBF regression, this article advances a novel RBF regression modeling method using fuzzy partition and supervised clustering. The proposed method first splits the training data into several subsets using supervise...
Abstract: A new pitch detection of noisy speech signal for lower SNR is proposed in this paper, which is based on Reverse CAMDF Autocorrelation Function (RCAF) and searching tentative smooth measurement. The algorithm can estimate noise during speech presence,...
Abstract: As the noise spectral estimation based on the minimum statistics introduces significant tracking latency when the noise spectral rises, an improved algorithm based on the weight minimum statistics is presented. Analyzing the influence of weight on th...
Abstract: An automatic optic nerve head localization method in the fundus images based on cross-network is studied in this paper. To describe the space properties of the retinal vessel, a new conception cross-network and measures of the network are proposed. B...
Abstract: Blind CFA interpolation detection, which identifies the demosaicing method used in digital camera by analyzing output images, provides an efficient tool for digital image forensics. This paper proposes an approach of blind CFA interpolation detection...
Abstract: Steganography is the technology of hiding a secret message in plain sight. The goal of steganalysis is to detect the presence of embedded data and to eventually extract the secret message. Current blind steganalytic methods, which relied on two-class...
Abstract: Due to the dynamic nature of contexts in pervasive computing, a context reasoner has to support real-time scheduling of reasoning jobs. Due to the fact that reasoning results remain fresh within a period of time, the concept of reasoning result reuse...
Abstract: The curse of dimensionality is a central difficulty in many fields such as machine learning, pattern recognition and data mining etc. The dimensionality reduction method of characteristic data is one of the current research hotspots in data-driven ca...
Abstract: One related key issue in Content Based Image Retrieval (CBIR) is the representation of image visual content. However, traditional image features such as color, shape and texture are not capable of representing the visual content completely. So as to ...
Abstract: In this paper, a new neighborhood adaptive image denoising method is proposed using dual-tree complex wavelet transforms. It is an improvement of the existing denoising method NeighShrink. The optimal thresholds and neighboring window sizes are deter...
Abstract: In this paper, a time delay estimate algorithm based on analysis of cross-correlation sequence of model error and input signal is proposed, and a method to build behavioral model of power amplifiers dynamically depend on the new delay estimate algori...
Abstract: An application-specific bus scheduling scheme was proposed in this paper. Two-fold optimization was considered in this scheme based on the communication events collected by system modeling and simulation. The first one, which had higher priority, was...
Abstract: Fast implementation of CDF9/7 wavelet is strictly retained for its complex coefficient. This paper constructs a new biorthogonal and lifting-based wavelet model with parameters. The new wavelet basis of rational number proposed is adapted to shift op...
Abstract: Based on the single-mode and multi-mode space charge wave theory, the analytical expressions for the electronic conductance in a double gap coupling MBK cavity are derived. The analytical theories show that the single-mode theory is sufficiently accu...
Abstract: Distributed wireless communication system can suppress the interference and enlarge the capacity. This paper proposes a novel orderly distributed hexangular cell system to introduce the gain of distributed system into the existing cellular system. It...
Abstract: With respect to channel coded Multiple-Input Multiple-Output (MIMO) systems, a novel soft-output MMSE V-BLAST detector is derived by considering both the channel estimation error and decision error propagation. Compared with the conventional detectio...
Abstract: Practical maximum SJNR-precoding based adaptive resource allocation schemes are proposed for multi-user MIMO OFDM systems. According to the SJNR value, incremental and decremental algorithms are presented for user selection on each subcarrier that mu...
Abstract: In this paper, based on the analysis of the existing encapsulation schemes, Generic Stream Encapsulation (GSE) is chosen to transmit IP-based service in the Terrestrial-Digital Multimedia Broadcasting (T-DMB) system. As a new emerging technology, no ...
Abstract: A concatenated hybrid decoding algorithm for convolutional codes is presented. The algorithm is complemented by using two-stage decoding, where the first stage uses the Belief-Propagation (BP) algorithm, while the second stage uses the Modified Viter...
Abstract: Most available Identity-based Authenticated Key agreement (ID-AK) protocols require expensive bilinear pairing operation. This paper proposes a pairing-free ID-AK protocol from additive elliptic curve group. The new protocol eliminates the pairing op...
Abstract: Based on the social psychology idea behind the Particle Swarm Optimization (PSO) algorithm and the feature of adaptive FIR filter, the proper expressions for the inertial, cognitive and social parts are designed and applied to the optimization of the...
Abstract: The compensation for space-variant motion errors is one of the main issues in ultra-high resolution airborne SAR imaging. This paper first discusses the characteristics of space-variant motion errors of airborne spotlight SAR, and deduces the quantif...
Abstract: A Tapered Slot Antenna (TSA) is investigated in view of Ultra Wide Band(UWB) applications. Simulation and measurement results show that, bandwidth of the antenna is 12-20GHz, half-power beamwidths are over 40 degrees, and distortions of the radiation...
Abstract: In order to cover the shortage of the current antenna for high power microwave weapon, the idea of a magnetized plasma channel used as antenna for radiating electromagnetic pulse is proposed. The normal modes of Magnetized Plasma Channel Antenna (MPC...
Abstract: This paper demonstrates a design of bandgap voltage reference with high precision and low temperature coefficient. A dual-differential input operational amplifier is used for high-temperature coefficient compensation. The chip is simulated by using C...
Abstract: This paper models and analyses differential inductors and series-connected inductors from SMICs 0.18m CMOS process, and then proposes a design rule of inductors in RF CMOS differential circuits. This paper also presents a new model of series-connecte...
Abstract: The high-frequency method for solving the scattering of electrically large conductive targets in half space is presented in this paper. Consider the environmental impact of half-space, the half-space physical optics integral equation is deduced by in...
Abstract: Analyses of two nominative proxy signature schemes proposed by Seo et al.(2003) and Huang et al. (2004) are given in this paper. The results show that neither the scheme has the property of strong unforgeability. A forgery attack on the two schemes i...