Abstract: According to the character of Passive Radar based on DTTB illuminator, spatial filtering is used to suppress the direct-path interference. The adaptive beamforming algorithms combined with broad null are adopted in echo receiving channel. To referenc...
Abstract: Research of asymmetric spaceborne-airborne bistatic SAR imaging algorithm is one of difficult issues in field of bistatic SAR. In this paper, a fast numerical Range Migration Algorithm (RMA) is proposed for GPS signal based continuous wave spaceborne...
Abstract: This paper focuses on the translation-invariant bistatic SAR Doppler ambiguity resolving by using Single-Transmitter-Multiply-Receivers (STMR) mounted on different platforms. The range dependent Doppler in the bistatic configuration is analyzed, base...
Abstract: The signal model of MCF-MIMO (Multi-Carrier-Frequency MIMO) Radar are constructed first in this paper. Then an equivalent array with NtNr antennas is formed after the signal preprocessing, where Nt and Nr are respectively the transmitted and received...
Abstract: The go-stop assumption applied to the conventional SAR can not be used in the SAR system using step frequency waveforms. For the reason that the time spent on the coherent processing is too long. Accordingly the fast-time Doppler effect induced by th...
Abstract: Two new methods to compensate clutter range dependence for bistatic airborne radar are proposed in this paper. These methods are called DBU (Derivative Based Updating). The receiving slope distance and receiving elevation angle cosine in the directio...
Abstract: The novelty of MIMO radar is to improve the performance of radar utilizing spatial diversity and waveform diversity. To achieve full diversity, this paper considers the problem of spatio-temporal signal design for MIMO radar based on channel estimati...
Abstract: Spinning-rate estimate is the base of rapidly spinning target imaging. A new spinning-rate estimating method is proposed in this paper. Base on the characteristic of rapidly spinning target in the range-time image, a primary estimate using Fourier tr...
Abstract: Double threshold detection based on constraint judgment is proposed for weak signal detection. The improvement effect on Probability of False Alarm (PFA) and influence on Probability of Detection (PD) are quantitatively analyzed with constraint judgm...
Abstract: To deal with the parameter uncertainty in emitter recognition problem, this paper presents a viable recognition method based on cloud model. First, for getting the degree of membership of the measurement parameter, it applies this theory to model the...
Abstract: This paper de-noises in image by diffusion filter. And a method of finding optimal stopping time is proposed. The criterion of stopping time is that the variance of image smoothed out is bigger than the variance of noise smoothed out. In order to est...
Abstract: To solve the problem of the passive tracking of the space objects with perturbation in space-based optical surveillance, the hybrid coordinates SPKF method is put forward. The Unscented Transformation (UT) and hybrid coordinates are introduced to avo...
Abstract: A method of analyzing the lightning pulse interference into the carbon fiber cabin in airplane is developed based on FDTD. The lightning channel is equivalent to be a linear antenna which is vertical on the conductor ground. Therefore the conception ...
Abstract: Using the principle of minimum variance, this paper computes the optimal weight coefficients for the phase estimation algorithm of the multi-frequencies signal, which is based on the phase weighted average of the partitions windowed-DFT. The variance...
Abstract: This paper defines analogy measure of two random variables, and discusses the principle and algorithm of maximizing non-Gaussianity of observed data with a linear transformation to estimate independent components serially. It also proves the non-poly...
Abstract: This paper introduces a steering-invariant constant beamwidth beamforming algorithm with Second-Order Cone Programming (SOCP) constraints. The optimizing criterion of the proposed algorithm is suppressing the designed sidelobe level utmost while keep...
Abstract: A basic model is established for mixtures of two co-frequency modulated signals with error-control codes, then an M-PSP based algorithm is proposed to exploit the error-control codes in its single-channel blind separation, with special emphasis on th...
Abstract: A novel intelligent DOA estimation technique for broadband signals is proposed, which transfer the problem of DOA estimation into a large mount of data intelligent learning and recognition problem. The upper triangular half of the correlation matrix ...
Abstract: Asynchronous fusion is common in processing multisensor data fusion problems and the asynchronous track fusion which adopts distributed fusion architecture has an extensive application among asynchronous fusion. In current asynchronous track fusion a...
Abstract: The stability control problem is considered for a class of Fuzzy Bilinear Systems (FBS) with time- varying delay in both state and input. Based on the Parallel Distributed Compensation (PDC) method and free-weighting matrices,some sufficient conditio...
Abstract: A non-coherent demodulation algorithm of CPM signal based on composite trellis processing is proposed in this paper. This algorithm figures out composite trellis diagram by combining root trellis diagram and multiple component trellis diagrams which ...
Abstract: Accumulated-Crossover Parallel-concatenated SPC (A-CPSPC) Codes, which have good bit error rate performance and simple encoding structure, is a class of novel error-correcting codes. A Maximum A Posteriori (MAP) algorithm based on the Sum-Product Alg...
Abstract: Cyclic shift permutation structure is an important part of partial parallel decoder for quasi-cyclic LDPC codes. When the information is exchanged, a connecting law of basic switch units in Reverse Banyan network is researched and proved. Then a nonb...
Abstract: A sequenced-based Block Decision-Aided Equalizer (BDAE) for turbo equalization is proposed, which can overcome the deficiency of symbol-by-symbol detection equalizers that the A Posteriori Probability (APP) of each symbol is calculated individually b...
Abstract: In high data rate Transmitted-Reference (TR) Ultra-WideBand (UWB) systems, the conventional autocorrelation receivers introduce the second-order Inter-Symbol Interference (ISI). This paper demonstrates that, through multiple antennas receive and Equa...
Abstract: In Time-Division Duplex (TDD) system, it is possible to obtain downlink channel metrics at the transmitter due to the channel reciprocity. However, there has a disposal delay between uplink channel and downlink channel in TDD systems, the delay will ...
Abstract: Carrier synchronization is one of the most important parts in communications. This paper makes analysis on PLLs phase error during EBPSK carrier recovery. Firstly, under the narrow band Gauss noise condition, PLL linear model is established and outpu...
Abstract: In wireless Multiple-Input Single-Output (MISO) systems with limited feedback of channel information, transmit beamforming can provide both transmit diversity gain and array gain with simple implementation. Most of prior research includes several ide...
Abstract: To solve the cooperative spectrum sensing problem under constrained control bandwidth in cognitive radio systems, the maximum likelihood cooperative spectrum sensing algorithm based on contracted information is developed in this paper. The contracted...
Abstract: A new antenna selection criterion for Vertical Bell Labs layered Space-Time (V-BLAST) systems based on Zero Forcing (ZF) Successive Interference Cancellation (SIC) detection, which is named minimizing the maximum row norm of the channel matrix, is pr...
Abstract: A low rate CSI (Channel State Information) feedback scheme based on linear prediction is proposed for closed-loop multi-user MIMO-OFDM systems. The subcarriers in OFDM system are divided into several sub-bands according to the coherence bandwidth. MS...
Abstract: An energy-efficient adaptive cooperative node selection scheme is proposed for energy-constrained wireless sensor networks. It determines the candidates of the Cooperative Node (CN) based on predetermined energy threshold, and then chooses the best n...
Abstract: In this paper, based on localized subcarrier allocation in frequency domain and cyclic-shift allocation in time domain, a kind of ranging time and frequency structure for SC-FDMA system is designed, and adaptive detection thresholds computing method ...
Abstract: Linear complexity is one of the most important indexes for measuring the randomness properties of sequences. Based on Whiteman-generalized cyclotomy, a new class of generalized cyclotomic sequences with length qp and order 2 is constructed. It is pro...
Abstract: The paper proposes a mode-adaptive OFDM parameters design method for Digital Frequency Modulation (DFM) radio used in the VHF-FM, and designes two transmission modes according to the Doppler shift range under different channel profiles. In order to e...
Abstract: To overcome the multi-channel hidden terminal problem in distributed cognitive wireless networks as well as improve the performance of the network, a general convex programming model is formulated. The access probability of each cognitive user can be...
Abstract: With operation and maintenance mode of telecommunication network changing from network oriented to subscriber oriented, network performance management should also be changed from passive monitoring to proactive monitoring. Proactive Performance Monit...
Abstract: Based on the estimated link lifetime, a novel routing mechanism is proposed in this paper to establish the reliable end-to-end path in Ad hoc networks. In order to describe the received signal strength continuously in time domain, the Newton Interpol...
Abstract: The optimizing problem of content distribution which minimizes the blocking probability and storage consumption on clustered streaming media system is discussed, in the case of knowing every programs unchanged popularity. Firstly, the queuing theory ...
Abstract: In this paper, a secure error-correcting network coding is proposed using a metric on the space of all subspaces of a message vector space. It shows that a minimum distance decoder for this metric can correct errors of a limited dimension. On the oth...
Abstract: This paper investigates the strategies of relaying based on network coding over wireless communication context with two users and one relay sending data to the base station. Differing from the assumption that the channels from users to relay are reli...
Abstract: Authentication is critical to secure communication in Ad hoc networks. This paper discusses the shortcomings of distributed authentication schemes in Ad hoc networks with flat structure and the advantages of adopting clustering structure. A zone auth...
Abstract: In many literatures, Synthetic Aperture Radar (SAR) data is usually supposed to obey the unimodal distribution, unsuitable in the applications. To overcome the limitation, an Improved Clustering-based Discriminant Analysis (ICDA) method is proposed, ...
Abstract: This paper takes the -stable distribution as the noise model and works on the Direction of Arrival (DOA) estimation problem of the cyclostationary signals in the impulsive-noise environment. Since the conventional algorithms based on the classical se...
Abstract: A FastICA blind multi-user detection algorithm based on negentropy is proposed, which is based on independent component analysis combined with CDMA receiver in this paper. The non-quadratic function in FastICA algorithm is revised as function with po...
Abstract: The machining quality of reflector antenna panels includes machining accuracy and surface quality, both of them will effect electrical performance of the antenna. For the surface quality which is studied less, surface texture is modeled by fractal fu...
Abstract: As a generalization of Bent functions and Partially Bent functions, Plateaued functions can achieve trade-off among many cryptographic criteria. Based on the relationships between the Walsh transform of a given function and the Walsh transform of its...
Abstract: The goal of the ubiquitous convergent network is to provide the dynamicly adaptive and context- awareness pervasive services. However, the existing telecommunication service opening architecture based on the traditional distributed computing technolo...
Abstract: According to the structure properties of CLEFIA , new 8-round distinguishers for Square attack are presented, and the wrong 8-round distinguishers originally found by the designers are pointed out. Based on the new distinguisher, the square attack on...