Abstract: Code Division Duplex (CDD) is a novel duplex technique for next generation mobile communication systems. It supports the transmission for uplink and downlink at the same frequency band and the same time interval. As the power levels of uplink and dow...
Abstract: Iterative Tree Search (ITS) is an efficient M-algorithm based soft MIMO detection scheme. However, ITS often faces the problem that Log-Likelihood Ratio (LLR) values of some detected bits can not be evaluated. Although it can be somewhat solved by se...
Abstract: Cooperation between Base Stations (BSs) and collaborative transmission between Mobile Terminals (MTs) are two promising techniques for the next generation wireless communications. This paper studies the per-cell achievable uplink sum-rate and minimum...
Abstract: For improving the bandwidth efficiency, a sinusoidal modulated method based on Prolate Spheroidal Wave Functions(PSWF) is proposed. The basedband modulated orthogonal waveforms is designed based on PSWF, which is time-limited and band-limited approxi...
Abstract: A cross-layer TCP fairness optimization model in mobile WiMAX is proposed, under which a TCP protocol, cross-layer TCP, is designed. The rate information from link layer of the mobile nodes and the strategy of preallocation bandwidth for ACK packet a...
Abstract: This paper utilizes the Karush-Kuhn-Tucher condition of convex programming issue and proposes a minimizing power scheme with low feedback overhead for multiuser MIMO-OFDM systems based on trellis coded modulation. Firstly, the scheme designs the code...
Abstract: In the presence of heterogeneous traffic flows generated by services with different QoS requirements in Low-Earth-Orbit (LEO) satellite networks, a framework of Call Admission Control (CAC) and handover management scheme is proposed based on Optimal ...
Abstract: A performance analytic model for underwater acoustic networks is presented in this paper. This model is established by the characteristic of underwater channel propagation and networking. Numerical simulation results indicate that the bandwidth effic...
Abstract: A joint source-channel decoding approach is developed to improve the reliability of image transmissions. The source coders used is the discrete wavelet transform coding, and channel coders used is the RCPC (Rate-Compatible Punctured Convolutional) co...
Abstract: JPEG2000 is a new still image compression standard based on wavelet transform. Compared with previous compression standards, it has a lot of advantages. However, in JPEG2000 the image distortion evaluation criteria is MSE, and MSE can not correlate v...
Abstract: A knapsack-type public key cryptosystem is proposed. The proposed knapsack cryptosystem has the following advantages. The encryption and decryption only need addition and modular minus operations, so the encryption and decryption speed is high; The c...
Abstract: Grid portal is playing an important role in grid computing area. However, with the large-scale diverse resource need to be dispatched and coordinated, the portal shows its insufficient ability to deal with this complex situation and can not bear the ...
Abstract: In applications like event detection, a Wireless Sensor Network (WSN) may be required to satisfy various detection latencies. In this paper, the lower bound of average detection latency is first analyzed for point coverage in a WSN. Then a polynomial...
Abstract: To eliminate the affect of the distribution of deployed sensor nodes on the coverage of effective communication signals in deployed areas for wireless sensor networks, an algorithm of Distributed Deployment of Coverage Probability (DDCP) is proposed ...
Abstract: Mobile Ad-hoc Networks (MANETs) have their fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. Due to the anonymous and self-organization nature of mobile nodes in the network, inte...
Abstract: In high-speed network, identifying heavy hitters precisely in time serves as great significance for both network security and network management. In order to circumvent the deficiency of the limitted computing and storage abilities in traditional tra...
Abstract: Uncertain time-delay for transmitted information is often induced from local sensors to fusion node across wireless sensor networks with network constraints, and it easily results in the out-of-sequence phenomenon. Accordingly, the conventional infor...
Abstract: Track association of multitarget is one of the key and difficult issue in the space-based optical tracking system. Traditional distributed track association methods rely on three dimension information of the tracks, are no longer applicable to the tw...
Abstract: The scale self-adaptive mechanism is one of the promising research directions in the object tracking issue based on mean-shift. A typical method is to adopt Lindebergs scale-space theory to obtain the scale information of the target. However, the 2-D...
Abstract: There are two primary ways to process multi-target tracking problem. One is data association method, whose deputies are PDA and JPDA. The other is direct method without the data association, whose deputies are random sets theory and GM-PHD. Two repre...
Abstract: Based on energy-aware mapping algorithm for NoC regular architectures, a new method, MM-Map is proposed, which can automatically map a circuit of realtime digital signal processing system onto the NoC platform with the minimum critical delay for the ...
Abstract: Traditional multibeam bathymetry system based on FT beamforming method can not achieve high accuracy seafloor bathymetry estimation of outer beams area, while interferometric multibeam bathymetry system based on phase detection method can estimate th...
Abstract: A new algorithm based on Split-Symbol Moments Estimator (SSME) is provided in this paper to estimate blindly the chip rate of Direct Sequence Spread Spectrum (DS/SS) signal. The effectiveness of this algorithm is verified by analyzing the relationshi...
Abstract: In the processing of Synthetic Aperture Radar (SAR) image speckle noise reduction, maintaining the edges and textures of image are very important. This paper proposes a fractional-order multi-scale Partial Differential Equation (PDE) model by modelin...
Abstract: A parameter estimation method by imaging with the Keystone-Wigner Transform (KWT) for fast moving target is proposed. The radial velocity of fast moving target can cause the range walk and azimuth Doppler shift, so the accurate Doppler center can not...
Abstract: High resolution wide swath SAR requires high power aperture product under the limit of small antenna. It also needs generating and receiving wideband signal. According to these problems, a space-time-frequency coding method based on crossed receiving...
Abstract: A 3-D inverse synthetic aperture radar imaging method based on stepped-frequency waveforms for high speed spinning targets is proposed in this paper, aiming at the signal with narrow-bandwidth. Assuming the motion compensation is completed, single-ra...
Abstract: For the urgent need of the waveform for Multiple-transit and Multiple-receive SAR, three kinds of waveforms are researched and compared, which are the representative waveforms for the Multiple-transit and Multiple-receive SAR, and evaluate the practi...
Abstract: Clock jitter is one of the most importation factors that affects the Signal-to-Noise Rate(SNR). Based on Gaussian random process model and continuous-time system in time domain ,this paper analyzes the effect on baseband and intermediate frequency sa...
Abstract: In this paper, the multi-static ISAR three-dimension turntable model and imaging algorithm are proposed. Furthermore, the multi-static ISAR three-dimension turntable imaging constraints are analyzed. Based on the range projection equations and azimut...
Abstract: One of the tough task that airborne bistatic radar faced is the extensive existing non-stationary of bistatic clutter which will degrades the performance of STAP remarkably. A novel bistatic modified technique named Improved joint Space-Time INterpol...
Abstract: A new algorithm of IF noise simulation for a multichannel direct spread-spectrum system is proposed. The influences between each channel of spread-spectrum signals are treated as noise in this algorithm. A new algorithm of proportional divisor that i...
Abstract: In passive millimeter wave image restoration, L-R algorithm is a simple and effective nonlinear method. However, when the noise can not be neglected, it is difficult for L-R algorithm to get good restoration. As a novel signal processing method, adap...
Abstract: In the field of image segmentation, the image segmentation approach based on discrete level set can not accurately segment an image with low SNR value, and the speed of image segmentation is lower. In order to solve these problems, an alternative app...
Abstract: The linear theory together with the self-consistent nonlinear theory are applied to systematically study the stability of a Ka-band TE11 mode ultra-high gain gyrotron Traveling-Wave Amplifier (gyro-TWA). The analysis reveals the differences between t...
Abstract: The field in helix TWT (Traveling Wave Tube) is studied with numerical analysis. By Numerical field analysis, neglected in the theorys, the phenomenon is that, the master and slave face setting decides the wave propagation direction, and the helix ro...
Abstract: In this paper, 3D second-order finite element method for electron optic system is presented. And it is implemented in Electron Optics Simulator (EOS). The results are compared between first-order finite element method and second-order finite element ...
Abstract: A large amount of computation of particle filter limits its engineering application. According to this problem, Quasi-Monte Carlo (QMC) sampling is used to replace Monte Carlo (MC) sampling, reducing the required computation. Quasi-Monte-Carlo Gaussi...
Abstract: Motion compensation is essential for wide-beam High Resolution Airborne Glacier Penetrating Radar (HRAGPR). This paper proposes a motion compensation algorithm for wide-beam airborne nadir-looking glacier penetrating radar. Based on frequency divisio...
Abstract: This paper gives the bandwidth under different signal to noise ratios by precisely analyzing the atan phase detector, proved the result by simulation. It is concluded that the bandwidth of the loop under very low signal to noise ratio is triplicate o...
Abstract: A new prescaler based on new Source Coupled Logic(SCL) latch is proposed in this paper, supplying Local Oscillator (LO) for receivers. Compared to traditional static SCL latch, a clock-controlling transistor is added to reduce the time constant at se...
Abstract: In order to solve the intra-class blind recognition problem of IFFT-based multi-carrier modulation signals under the conditions of multi-path fading background, a blind identification algorithm of multi-carrier modulation signal is proposed based on ...
Abstract: An out loop power control algorithm based on continuous fuzzy control is presented in this paper. The variation value of the block error rate is processed by fuzzy control, and the output value which is obtained by fuzzy control rules and defuzzifica...
Abstract: This paper presents a strongly secure certificateless signature scheme without pairings, which is existentially unforgeable against adaptive chosen message and ID attacks. The complete security proof is given under random oracle model, assuming that ...
Abstract: The access delay of Enhanced Distributed Coordination Function (EDCF) in WLAN under error-prone channel is studied. Utilizing the Markov chain model, a model for analyzing the access delay of different priority traffic under error-prone channel is pr...
Abstract: Challenges of designing reliable and efficient Medium Access Control (MAC) protocols are posed for underwater acoustic sensor networks, because of hostile seawater channel condition. For hexagonal grid topology networks, this paper presents G-TDMA pr...
Abstract: Signcryption is a cryptographic primitive that simultaneously performs the functions of both digital signature and encryption in a way that is more efficient than signing and encrypting separately. Multi-signcryption is an extension of signcryption s...