Abstract: In this paper, the optimization of cooperative spectrum sensing mechanisms in cognitive radio networks is investigated to improve the sensing efficiency and spectrum utilization. The optimization algorithms and strategies of detection period, detecti...
Abstract: Shortwave communication works with frequency-selective fading channel, of which coherence bandwidth is an important parameter describing the flat channel bandwidth to be used by single carrier system. As has been known, increasing the coherence bandw...
Abstract: A new concept of orthogonal matrix pair is presented, which is the extension of orthogonal matrix, and especially the binary orthogonal matrix pair is not restricted by the fact that the order of matrix should be the power of 2. Based on the binary s...
Abstract: In this paper, a new throughput-maximizing transmit beamforming scheme with limited feedback is presented in Multiple-Input Single-Output Orthogonal Frequency Division Multiplexing (MISO-OFDM) systems. By dividing the total subcarriers of an OFDM sym...
Abstract: Hybrid Automatic Retransmission reQuest (HARQ) is an error control method for reliable communications. Combining HARQ with Multiple-Input-Multiple-Output (MIMO) systems using spatial multiplexing can provide reliable high data rate transmission. In t...
Abstract: In this paper, a suboptimal user selection method is proposed based on Block Diagonalization (BD). Firstly, an upper-bound of sum-rate capacity is deduced, and is used as the selection criterion of proposed algorithm. Secondly, the upper-bound is use...
Abstract: In this paper, a downlink precoding scheme is proposed for the Quasi-orthogonal Space Time Block Coded Multi-User MIMO (QSTBC-MU-MIMO) system. Based on the SLNR (Signal-to-Leakage-Noise Ratio) maximization, this scheme minimizes the co-channel interf...
Abstract: A non-sufficiently guaranteed handover scheme for multiple services is proposed in this paper. Under this scheme, the channels will be allocated and reserved for the arriving calls to be served when an interval is less than the maximum cell residence...
Abstract: In this article, a universally composable group key exchange ideal function is proposed and realized using witness indistinguishable proof of knowledge with partially isolated party based on the tamper-proof hardware token. Compared with protocols un...
Abstract: Nowadays, IP networks are suffering many faults and malicious attacks which greatly threaten its security and survivability. So it is an important issue that how to make the IP networks to be more robust under faults and attacks, i.e., to improve the...
Abstract: An algorithm of reliability indexes is proposed in this paper for evaluating the reliability of the distributed tightly-coupled virtual private networks with multi-QoS requirements, which is constructed in the environment of interconnection network. ...
Abstract: According to the characteristics of tree-topology aggregating traffic of wireless mesh network, this paper proposes a channel assignment strategy based on topology-division. Considering the effect of interference on different links, wireless interfer...
Abstract: Regional partition packet classification algorithm is one of the most effective algorithms. To solve the unsymmetrical distribution problem of regional partition for packet classification, a heuristic lookup partition algorithm is proposed after anal...
Abstract: Due to the limited energy, small storage room and so on, the traditional network key management scheme is challenged. Based on the transerval design,bivariable polynomial and threshold strategy, a new pairwise key establishment scheme and multi-path ...
Abstract: To improve MSE performance in steady-state and convergence rate of blind equalization, a hybrid blind channel equalization algorithm is proposed in this paper. With decision feedback equalizer, the proposed algorithm applies the error item of DD-LMS ...
Abstract: Multi-view Video Coding (MVC) demands high compression rates, temporal random access, spatial random access, as well as view scalability, which based on inter-view prediction structure. Joint Multi-view Video Coding (JMVC) proposed the fixed view-tem...
Abstract: For protecting directional geometric structure information, a novel basis function called multibandelets is presented in this paper. And then an image compression algorithm is proposed based on the multibandelet transform and Shannon encode. Experime...
Abstract: There are many analysis algorithms for frequency rate of LFM signal, but those algorithms have some drawbacks, such as highly computational complexity, long time for searching, and cross-term in multi-LFM signal. In this paper, a new analysis algorit...
Abstract: At present, there exist a lot of algorithms of blind separation, among which there are few algorithms focusing on blind separation of digital signals and estimating source number. To solve the problem, this paper proposes a novel algorithm to solve t...
Abstract: Contour detection from natural scenes is a tough task in computer vision. This paper proposes a visual model of contour detection based on compound receptive field. By inducing dis-inhibition mechanism to traditional model that was based on inhibitio...
Abstract: In order to deal with the uncertainties in feature extraction and decision-making, an information fusion algorithm of fault diagnosis is presented based on random set metrics of fuzzy features and evidence reasoning. Firstly, membership functions are...
Abstract: The Probabilistic Data Association Filter (PDAF) and the Joint Probabilistic Data Association Filter (JPDAF) are theoretically analyzed and their shortages in theory are pointed out. Based on the probability theory, a New Probabilistic Data Associati...
Abstract: According to biological attention mechanism, a region of interest detection based on visual attention model and evolutionary programming is proposed in this paper. Candidate image regions are segmented with evolutionary programming algorithm. The int...
Abstract: Mammography is a conventional early detection method for breast cancer. A novel Computer-Aided Diagnosis (CAD) method for the masses is proposed in this paper. Two characteristic models are built up to represent the masses with various backgrounds, a...
Abstract: This paper presents a multi-frame stepped-frequency signal processing method to detect moving targets, and a Doppler bin alignment method is proposed to compensate the image aliasing caused by moving targets. This method makes use of the relationship...
Abstract: The direction finding cross localization using bistatic MIMO radar system is studied in this paper, and a fast multi-target localization algorithm based on propagator method is proposed. The new method avoids the estimation and SVD (Singular Value De...
Abstract: When using Tomography SAR combined with spatial spectrum estimation to solve layover effect, the number of signals should be estimated in the elevation direction first. The accuracy of number of signals is directly related to the following estimation...
Abstract: This paper investigates an implementation of Polar Format Algorithm(PFA) in Bistatic SAR imaging based on the principle of Chirp Scaling(CS). PFA realizes datas Polar Coordinate Transformation by two 1-D interpolations, which is computationally expen...
Abstract: Based on the current research on bistatic SAR image, a new algorithm to process data of repeated trajectory bistatic spotlight SAR system is proposed. The algorithm first suppress azimuth aliasing with an azimuth preprocess step, and focus image with...
Abstract: To solve the problems of the self-signature interference and the nonuniformity of image background existing in the vehicle-mounted Forward-Looking Ground Penetrating Synthetic Aperture Radar (FLGPSAR) detection system, an adaptive method is proposed ...
Abstract: A method of interferometric phase estimation based on the robust beamforming is proposed. The method can provide the accurate interferometric phase estimation, by correcting the spatial steering vector and by taking advantage of the coherence informa...
Abstract: The multi-frequency MIMO radar uses sparse-array to transmit the FMCW signals of multiple carrier frequencies, and an array to receive the echoes. The signal model of multi-frequency MIMO radar is analyzed in this paper. A new method is proposed to r...
Abstract: To overcome the Doppler dispersion of the wideband radar return, a method of subband implementation for wideband radar clutter suppression and target High Resolution Range Profile (HRRP) enhancement is presented in this paper. The return is decompose...
Abstract: This paper is for the identification from the RCS sequence of the Mid-course missile. On the base of analyzing its motion and electromagnetic scattering characteristic, a new method using RCS magnitude changes with respect to the object gesture angle...
Abstract: In order to correctly estimate the variance of noise in iteration, a pure synthesis noise as an image is synchronously iterated with the observation image in de-convolution, and it takes variance of pure noise image as the estimation of the variance ...
Abstract: Based on nonsubsampled Contourlet transform and SAR image statistical property, a SAR image enhancement method is proposed. A speckle noise variance estimate algorithm is given using nonsubsampled Laplace Pyramid decompose, and a wake edge enhancemen...
Abstract: The electron-optical system of an L-band multi-beam klystron is designed. The 2-D simulation for the system is conducted first and the 3-D simulation is done in succession. Confined-flow uniform magnetic fields focusing system with multi-lenses is ad...
Abstract: Fast algorithms for solving the 2 order nonlinear diffusion equations in image processing are presented. A linear finite difference scheme incorporating the explicit scheme and the implicit scheme is given. The stability condition of the scheme is al...
Abstract: In order to solve the modulation classification problem of detecting illegal or jamming signal in normal communication, a new modulation classification algorithm for the same channel jamming signal is proposed. Firstly, the effects of unknown paramet...
Abstract: A novel method to estimate the parameters of 1/f-type fractal signal is proposed according to characteristics of the wavelet coefficient variance versus scale of 1/f-type fractal signal in white noise, and namely, after the wavelet coefficient varian...
Abstract: Because of the multiplicative nature of the speckle noise in SAR images, it is difficult to solve SAR image segmentation problems using general image segmentation technique. A novel SAR image segmentation algorithm based on an artificial immune syste...
Abstract: In this paper, a new signcryption scheme called CPK-SC is proposed based on Combined Public Key (CPK) to resolve the authentication and non-repudiation problem. CPK-SC discards the pairings and solves the restriction that the traditional identity-bas...
Abstract: A novel Passive Optical Network (PON) model is proposed. By exploiting this architecture, an efficient Quantum Key Distribution (QKD) protocol with Quantum Identity Authentication (QIA) is designed. In this scheme, both the QIA and QKD between optica...
Abstract: Channel estimation for MIMO-OFDM systems is investigated, and a chain weighted averaging LS channel estimation algorithm is proposed. Based on the FDM circular pilot sequence, the new algorithm obtains a temporal channel estimation using LS algorithm...
Abstract: To combat fading in wireless channel, an Opportunistic Relaying scheme based on Physical-layer Network Coding (PNC-OR) is proposed, which not only improves the network throughput by network coding ideas, but also achieves the multi-user diversity gai...
Abstract: The Radio Frequency Interference (RFI) makes the most performance degradation for the Synthetic Aperture Imaging (SAI) and the object detection of Stepped-Frequency Ground Penetrating Radar (SFGPR). This paper proposes a random phase-coded method to ...
Abstract: The conventional coarse-grained reconfigurable analog circuits have bad flexibility, and the reConfigurable Analog Block (CAB) structure is complicated. In order to solve such problems, a new OTA-based reconfigurable analog circuit is presented in th...
Abstract: The security of the three convertible ring signature schemes proposed by Zhang-Liu-He (2006), Gan-Chen (2004) and Wang-Zhang-Ma(2007) is analyzed, and it is found that these convertible ring signature schemes are susceptible to convertibility attack ...