Abstract: Ground Based Synthetic Aperture Radar (GB-SAR) is an effective tool for regional deformation detection, it has the ability of continuous monitoring for a certain area day and night regardless of the weather condition. ASTRO (Advanced Scannable Two-di...
Abstract: The micro-Doppler (m-D) effect is introduced for the Multi-Input Multi-Output (MIMO) radar techniques in the paper. Taking rotating target for an example, the m-D effect is analyzed and the parameterized expression is deduced in MIMO radar which tran...
Abstract: Traditional approaches, such as the Displaced Phase Center Antenna (DPCA) and Along Track Interferometer (ATI), fail to mitigate the negative impact on the detection of?a target and the estimation of the parameters due to the defocus problem associat...
Abstract: With the sparistiy of the target space, a novel migration imaging algorithm for the stepped-frequency GPR based on compressive sensing is proposed in this paper. The new imaging algorithm removes the direct wave in frequency domain in advance, estima...
Abstract: Template-based ATR algorithm needs the storage of massive templates of the targets, which cause a heavy burden of system design and algorithm optimization. On the contrary, model-based algorithm can overcome this drawback and become a promising solut...
Abstract: Based on general MUSIC algorithm, an elevation angle and multipath fading coefficient of the target joint estimation algorithm is proposed in VHF multipath environment. In this algorithm, a virtual multipath fading coefficient is derived from the arr...
Abstract: Owing to its fixed revisit period, space-borne SAR is suitable for dynamic monitoring the ground information, and change detection is the key processing technology. In this paper Edgeworth approach is used to fit the statistical distribution model of...
Abstract: The high resolution imaging of near field targets are interesting for security, non-destructive control and biomedical application. In this paper, high resolution near field ISAR imaging is implemented using Ultra Wide Band (UWB) time domain radar sy...
Abstract: Because of large pixel value change between multitemporal UWB SAR images caused by different imaging geometries, the performance of change detection algorithm based on pixel value difference declines quickly. In order to deal with this problem, a new...
Abstract: Two-dimensional fusion of multi-radar signals is a new parameterized imaging method. It can remarkably improve image resolution. In the case of wide bandwidth and small angle observation, scattering of target dependents on frequency. Traditional fusi...
Abstract: In some applications, a target needs to be located by a small-sized mobile platform, such as plane or ship. In this paper, the target is located by a small-sized mobile platform assisted by an array in the base station, which could work together unde...
Abstract: In order to identify the circular oil depots from remote sensing images, a developed Hough transform method based on gradient information is proposed to extract circular oil tanks firstly. Then, the depth-first graph search strategy is employed to gr...
Abstract: An algorithm of real-time detecting and correcting cycle slips for Precise Point Positioning (PPP) is presented. Based on dual-frequency pseudorange and carrier-phase observations, the algorithm can be used for static positioning and dynamic navigati...
Abstract: This paper presents a fast real-time multi-target detection algorithm based on line target clustering. Adaptive threshold is applied to image segmentation; And then enclosing rectangle prosthetics, line target extraction and clustering merger are uti...
Abstract: In order to improve side-lobe performance, traditional filter banks have to increase order number. In this paper Generalized Side-Lobe Canceller (GSC) is introduced to cancel strong jamming signals from side-lobes of filter banks, which can place zer...
Abstract: A numerically robust and low-complexity method of signal subspace estimation is proposed in the paper. The transform matrix to tridiagonalize the covariance matrix of observation data is constructed in the forward recursion of multistage Wiener filte...
Abstract: A fourth-order cumulant-based DOA estimation method is presented, considering contradictions between direction finding precision and phase ambiguity in using non-uniform linear array to estimate the Direction Of Arrival (DOA). The new algorithm uses ...
Abstract: With the analysis of the ambiguity function for Discrete Frequency Code Waveform (DFCW) signals, the optimized model for DFCW design is established and the Micro swarm Particle Swarm Optimization (MicPSO) algorithm is proposed to design orthogonal di...
Abstract: Based on simplified electromagnetic vector-sensor array, a new Dimension Reduction Quaternion MUSIC (DR-QMUSIC) algorithm is proposed. In this paper, the quaternion algebra is first introduced since the orthogonality of quaternion is suitable for des...
Abstract: Practical speech emotions as impatience and happiness are studied especially for evaluation of emotional well-being in real world applications. Induced natural speech emotion data is collected with a computer game, 74 emotion features are extracted, ...
Abstract: This paper proposes a novel object detection method, namely the BPSO-SVM-based detection algorithm that combines Binary Particle Swarm Optimization (BPSO) and Support Vector Machine (SVM) techniques to cope with feature selection issue for object det...
Abstract: Time series approximation representation and similarity measurement is one of the fundamental tasks in time series data mining, and the key to similarity matching. In view of shortcomings of various existing PLR (Piecewise Linear Representation) base...
Abstract: Question retrieval plays important role in question and answering systems. The main problem is how to measure the similarity between candidate questions and query question. This paper presents a tree kernel based method, named weighted tree kernel, t...
Abstract: In order to reduce the staircasing error of Yees leap-frog meshing and accurately model three- dimensional curved conducting objects, a new Conformal MultiResolution Time-Domain (CMRTD) method based on Daubechies scaling functions is proposed by comb...
Abstract: The reciprocity of Wuhan-Wanning and Wanning-Wuhan ionospheric HF channel is firstly analyzed by using Wuhan Ionospheric Oblique Incidence Sounding System (WIOISS). The WIOISS is a new type ionospheric oblique sounding radar based on the GPS time and...
Abstract: In this article, based on a coupled cavity TWT design software, Orprogr code, the simulation design of a X band coupled cavity TWT is performed for realizing the expected electric characteristics. Under the condition of the above-mentioned design res...
Abstract: The sheet beam with a large width-high ratio is nonaxisymmetrical, which is very suitable to the formation of the electron beam in high power microwave and millimeter wave vacuum devices. In this paper, a 2D macroparticle model is proposed for develo...
Abstract: With the widespread use of mobile devices, issues like roaming authentication and identification privacy become increasingly prominent. This paper analyses the shortcomings of existing protocols of roaming authentication in term of anonymity and secu...
Abstract: By changing sharing and recovering ways of the verification image, a verifiable Visual Cryptography Scheme (VCS) based on iterative algorithm is proposed in this paper. Since the verification image is shared with special algorithms, and the verificat...
Abstract: Web service selection based on QoS is still challenging because the multiple QoS registration centers and heterogeneous QoS models make decision-making hard. Based on Multi-Attribute Group Decision-Making (MAGDM) theory, this paper presents a novel M...
Abstract: Semiring algebra can be used to compute the trustworthiness between nodes, for it is a good description of the trustworthiness calculation rules issues. However, the existing semiring trust model does not define dynamic issues based on time. A semiri...
Abstract: The large scale and high speed networks create massive data and have low detection accuracy. To address the problems, the idea module is brought from complex network into anomaly detection area. Firstly, the relations between network partition strate...
Abstract: In this paper, the definition of joint k-error 2-adic complexity is first proposed, as well as joint k-error 2-adic complexity is used to measure the stability of 2-adic complexity of periodic multisequences. Then some enumeration results are derived...
Abstract: A new distinguishing attack is presented on Shannon algorithm. The distinguish attack is built by using linear approximations of both the non-linear feedback shift register and the non-linear filtration function, and 32 distinguishers are derived whi...
Abstract: Impossible differential attack should be launched with the construction of impossible difference. This paper investigates the construction method of impossible differences for(2n,r,t)_GFNSP overall structure. A kind of (4n+1)-round impossible differe...
Abstract: An Incremental Coded Bi-directional Relaying (ICBR) scheme based on network coding and space-time cooperation is proposed, which utilizes the feedback information from nodes in the system. Cooperation in this way could improve resource efficiency and...
Abstract: Channel capacities and sensing parameters for Secondary Users (SUs) based on Opportunistic Spectrum Access (OSA) technique are studied in this paper. First, characteristics of the Signal-to-Interference-and-Noise Ratio (SINR) of SUs are discussed, fr...
Abstract: Making use of the advantage of classical Low Density Parity Check (LDPC) codes based on Balance Incomplete Block Designs (BIBD), a novel construction of quantum LDPC codes is proposed in this paper. The constructed check matrix satisfies the requirem...
Abstract: Trivium has successfully been chosen as one of the final ciphers by eSTREAM. It has a simple and elegant structure. Although Trivium has attached a lot of interest, it remains unbroken. By finding more linear approximations, a linear cryptanalysis of...
Abstract: The amount of information and the bit error rate caused by eavesdropper are analyzed while the BB84 quantum key distribution protocol is attacked with intercept/resend attack using different measurement bases. The bit error rate threshold that legiti...
Abstract: Since the bitrate of the whole block is determined by its maximum prediction error and much redundancy exists in the scalar coset coding based compression method for hyperspectral images,a lossless compression method based on classification and coset...
Abstract: The aichitecture for the Beyond 3rd Generation or 4th Generation wireless nerworks aims at integrating various heterogeneous wireless access networks over an IP backbone. To provide seamless mobility, one of the design issues is the vertical handoff ...
Abstract: Frame aggregation is one of the efficient methods to improve wireless channel utility of MAC (Media Access Control) and spectral efficiency. Aiming at multi-services, this paper adopts two-level buffer mechanism and polls each queue for aggregation a...
Abstract: Navigation message is an important component of satellite signal. Its design will not only influence the systems performances including timeliness, integrality, flexibility, reliability, extendibility, etc., but also users use-cost. The design of var...