Abstract: An adaptive thresholding algorithm for natural image denoising is proposed in this paper, which is based on Stationary Wavelet Transform (SWT) and multiscale products. Different from traditional thresholding denoising algorithm, this threshold is imp...
Abstract: To overcome the limitation of traditional image denoising algorithms, a Novel Nonlinear Image Enhancement Method based on NonSubsampled Contourlet Tansform (NNIEM-NSCT) is proposed in this paper. The method not only preserves the details of image edg...
Abstract: A novel denoising model for texture images is proposed, which is the soft threshold algorithm depending on both the smoothing parameter in Besov spaces and the scales of wave atoms. This model well considers the good properties of new multiscale geom...
Abstract: A new method which using Gaussian scale mixtures model in the nonsubsampled Contourlet domain is proposed for image denoising. First, a Gaussian scale mixture model is introduced in order to capturing the correlation of nonsubsampled Contourlet local...
Abstract: One-dimensional minimum error thresholding method assumes that the histogram distributions of object and background are governed by a mixture Gaussian distribution. Considering the affects of noise and other factors on image quality, based on the ass...
Abstract: In this paper, a Multi-Atoms rapid Matching Pursuit (MAMP) algorithm for signal sparse decomposition and its application to image coding are proposed. The MAMP algorithm decompose signal sparsely by selection several atoms at each iteration. A multis...
Abstract: Uncorrelated space algorithm is a fast method for the uncorrelated discriminant vectors extraction,but it may encounter the small size samples problem when it is applied to face recognition task. In addition, it is only a linear feature extraction te...
Abstract: In this paper, an improved Mean Shift face tracking algorithm based on Local Ternary Patterns (LTP) of texture and color features is proposed to improve the robustness of the Mean Shift algorithm. Based on the study of LTP texture features, an LTP ke...
Abstract: A method of spectrum analysis is proposed using recursive least square algorithm to train the weights of Fourier Basis Functions (FBF) neural network. Its main idea is that the weights of the FBF neural network are trained with recursive least square...
Abstract: Meeting to the need of coherent signal direction-of-arrival estimation, applying particle swarm optimization algorithm, a Generalized Maximum Likelihood algorithm Based on Chaos Adaptive Mutation PSO (CAMPSOGML) optimization is proposed, the arrays g...
Abstract: To lower the high requirements of both the accuracy of the edge gradient and the integrity of the ellipse, a fast ellipse detection method using only 1-D accumulation array in parameter space based on symmetry points searching is presented to effecti...
Abstract: It is difficult to get effective group member matching by their position or attribute measurement separately when the sensors position measurement noise level is high and their identification performance is relatively poor or the members types are no...
Abstract: Supervised Locality Preserving Projection (SLPP) is a generalization of Locality Preserving Projection (LPP) in the case of supervised learning. In this paper the drawback of SLPP in the high-dimensional and small sample size case is pointed out, and...
Abstract: A modified flocking model with virtual leaders is proposed, and then a clustering algorithm based on it is developed. In the algorithm, firstly a weighted and undirected graph is established by all data points in a dataset according to the model, whe...
Abstract: This paper proposes one new method of integrating intuitionistic fuzzy conditional reasoning with conditional entropy based on the hypothesis of an equilibrium state of supportability and opposability of neutral evidences indicated in the intuitionis...
Abstract: In this paper, an improved 2D Fourier domain simulator is presented, which can take the effects of baseline oscillations into account accurately. The phase error caused by baseline oscillation is separated into the azimuth time-variant term and the r...
Abstract: A new method of SAR jamming is proposed: the 2-D cosinusoidal phase modulation repeater jamming. This jamming method makes SAR echo extend both in range frequency domain and azimuth?Doppler domain via 2-D cosinusoidal phase modulation, and achieves t...
Abstract: In subarray level phased array, it requires digital beam scanning at subarray level in many applications, for instance, multiple beamforming. In this case, the suppression of pattern sidelobe is critical, and the key is construction of the weighting ...
Abstract: To solve the problem of too much time spending on calculating the distribution of radar detection range over sea, firstly ,the method characteristic of calculating radar detection range in condition of evaporation duct is described, the influence of ...
Abstract: The method of moving target detection based on eigen-decomposition of the covariance matrix is proposed for single-antenna airborne SAR. First the paper points out that the sub-image is obtained through frequency processing. The imaging difference of...
Abstract: Based on Fractional Fourier Transform (FrFT) and clutter suppression interferometer techniques, a method of detecting slow-moving ground targets with Geosynchronous Earth Orbit (GEO) spaceborne-airborne bistatic three-aperture Synthetic Aperture Rada...
Abstract: Since the sidelobe suppression of a random signal is a difficulty in research, it has realistic meaning to suppress the sidelobe in a simple and effective way. A continuous time model of random frequency modulation signal is developed in this paper. ...
Abstract: A feature vector extraction method to the envelope function in rotation angledomain of radar signals based on FRFT is proposed in this paper, because extracting the novel radar signal parameters is an effective method to solve the complex radar emitt...
Abstract: In this paper, the characteristic of FRFT modules about LFM signal and monochromatic signal is researched. Based on this characteristic, two new methods based on difference of FRFT modules for moving target detection are proposed. One is based on dif...
Abstract: In order to improve the anti-interference performance and system capacity of cognitive Frequency Hopping Code Division Multiple Access (FH-CDMA) communication systems, a kind of time-frequency sequence with three no hit zone, which can be made reconf...
Abstract: In this paper, a practicable user traffic satisfaction evaluation model of the VoIP traffic and the real-time video traffic is proposed. This method calculates the users traffic quality of experience according to the packet loss rate and the packet l...
Abstract: In this paper, an iterative precoding method is proposed, which successively in turn optimizes the precoding matrix at base station or relay station for suppressing the multiuser interference of multiuser multi-relay MIMO system. Firstly, the multi-r...
Abstract: In this paper, the power control problem is studied for secondary users to share primary users spectrum. The joint power and rate control under minimal-maximal fair criterion is formulated as a quasi-concave optimization, and an algorithm is proposed...
Abstract: Spectrum sharing of Cognitive Radios (CRs) has broad application prospects to the new generation of wireless communication networks. In multi-cognitive-user circumstance, using tools from asymptotic random matrix theory, a new cooperative scheme for ...
Abstract: Adopting the hybrid MLSE (H-MLSE) on each MISO subsystem firstly, and then combining the -selection of survival states, a complexity-controllable sequence detention method with adaptive channel tracking is proposed for Multi-Input Multi-Output (MIMO)...
Abstract: Dynamic resource allocation algorithms are investigated for multi-cell Orthogonal Frequency Division Multiple Access (OFDMA) systems based on noncooperative game theory where the maximal power of each Base Station (BS) is assigned equally to all subc...
Abstract: In multi-user multi-antenna downlink system, when the channels are Rician channels, the performance of those limited feedback strategies designed for uncorrelated Rayleigh Channels will result to the waste of feedback overhead. To solve this problem,...
Abstract: In order to design a low-computational Time Of Arrival (TOA) estimation algorithm for the Ultra WideBand (UWB) based wireless sensor network, a new TOA estimation method which focuses on the Direct Path (DP) component based on weighted energy detecti...
Abstract: The spread-spectrum system usually works in the multipath environment, along with the additive noise there always be some multiplicative noise. In order to solve the pseudonoise (PN) code acquisition in multiplicative noise channel, a new detector is...
Abstract: To enable the practicability of the low density parity check codes, a QCE-PEG algorithm is presented, followed by the description of the implementation approach and a design case in detail. The algorithm divides the construction into two processes, c...
Abstract: For the high power amplifier pedistorter using memory polynomial, a novel fractional order memory polynomial predistorter is proposed. The proposed predistortion polynomial is achieved by changing the even order term to fractional order term in the m...
Abstract: In this paper, two novel methods called EAIC (Extended Active Interference Cancellation) and EAIC-H (EAIC-Hybrid) for spectral sculpting of OFDM signal are proposed. In EAIC and EAIC-H, cancellation signals are added to OFDM signal to cancel interfer...
Abstract: In the service invocation mechanism of current IMS (IP Multimedia System) network, the Serving-Call Session Control Function (S-CSCF) invokes each Application Server (AS) sequentially to perform users service profile. This mechanism makes SIP request...
Abstract: In this paper, a Dynamic Layered-Graph(DLG) routing model based on Cognitive Radio(CR) mesh networks is proposed .The channel which Cognitive Radio node can sense is modeled by a two states discrete time Markov chain and a model depict Cognitive Radi...
Abstract: In interconnect modeling, an exact original model is needed, whether in considering frequency-dependent or process variation or in model reducing. An exact original model is not only a precise start-point in model reducing, but also is the basis of e...
Abstract: In multisensor tracking systems that operate in a centralized manner, there are usually different time delays in transmitting the scans or frames from the various sensors to the center. This can lead to situations where measurements from the same tar...
Abstract: The Ultra-WideBand Through-Wall Radar (UWB TWR) has become a keen research topic in recent years because of the urgent needs of counter-terrorism and calamity rescue, etc. Conventional UWB imaging algorithm can not meet the demand in the capability o...
Abstract: A dynamic multi-frequency digital lock-in algorithm is presented in this paper. By this algorithm, the amplitude of the signal composed of the fundamental and the harmonics can be obtained. And in addition, the problem of frequency drift is solved by...
Abstract: Based on EXIT chart and APSO algorithm, a new method to optimize the degree distributions of irregular LDPC codes is proposed in this paper. An overall cost function is first designed to measure the matching extent of EXIT curves. Then the degree dis...
Abstract: Multimedia encryption algorithms are widely studied in recent years. However, the performances of those algorithms are usually checked by qualitative analysis and simulations. In this paper, the compression performance of a sort of encryption algorit...
Abstract: A cross-layer transmission and scheduling scheme of average power minimization in cognitive radio networks under the constraint of packet drop probability is addressed. The scheme is formulated by constrained Markov Decision Process (MDP). Lagrangian...
Abstract: A transmit diversity scheme, called Labelled Delay Space-Time Spreading (LDSTS) is proposed for communication systems in underwater acoustic(UWA) channels with propagation delays and multipath spreading. The scheme eliminates the propagation delays a...
Abstract: Searching for files in popular unstructured P2P file-sharing systems contributes to much of internet traffic. While existing mechanisms can locate popular files easily, studies show they fail to find rare files exiting in the system. In fact the bene...
Abstract: To verify the high spectral efficiency of VWDK, the principle of the modulation is introduced in detail. The simulation results of VWDK modulation and demodulation confirm that UNB is not what is generally called. Moreover, through calculating the an...
Abstract: Key derivation is an essential part of key agreement protocol. In 2007, Wang et al. presented an identity-based authenticated key agreement protocol in standard model. However there exists serious fault in key derivation of the protocol. In this pape...