Abstract: An efficient image fusion algorithm for polarization images based on Directionlets transform is proposed. Firstly, the several of polarization images are decomposed using Directionlets transform, which have multi-scale, multi-direction characteristic...
Abstract: This paper presents a suppression method based on Blind Signal Separation (BSS) to counter deception jamming in the single channel. First, the received signal is cut into 3 sections. Next, the mixed one is separated into two parts by the Joint Approx...
Abstract: Due to suppression the influence of impulsive noise spikes (outliers) from desired signal direction of arrival in Global Positioning System (GPS) signals, the Householder-based multistage minimal module cascaded canceller is proposed. The method subs...
Abstract: Synthetic bandwidth technique provides an effective way to achieve the ultra high range resolution of airborne SAR. But in the real synthetic bandwidth system, the correlation is badly distorted by the phase error. If it is directly synthesized, the ...
Abstract: Joint calibration is a method to calibrate interferometric parameters of several adjacent scenes simultaneously, which needs less Ground Control Points (GCPs) and can realize the elevation continuity among the adjacent scenes. As the biases of the pa...
Abstract: In order to improve the Ambiguity-to-Signal Ratio (ASR) of spaceborne SAR, an adaptive Genetic Algorithm (GA) is proposed in this paper. By using the algorithm, ASR and antenna pattern are optimized simultaneously. Firstly,the ambiguity areas are det...
Abstract: Existing methods for suppressing transient interference suffer from high computation cost due to that most of them rely on clutter suppression. To solve this problem, a novel method based on Complex Empirical Mode Decomposition (CEMD) is proposed to ...
Abstract: Automatically extracting the Homologue Points (HPs) is a key step to achieve the automatic mapping of InSAR. Subjecting to constraints of the interferometric phase, a quality-map-oriented approach is proposed to extract HPs from the view of detecting...
Abstract: A novel algorithm for feature extraction of the precession angle and real length of the ballistic target using multi-aspect observed High Range Resolution Profile (HRRP) sequences is proposed. Taking the cone-shaped ballistic target into consideratio...
Abstract: The feature of the ground clutter in Wide Area Surveillance (WAS) mode of SAR/GMTI system is studied. Based on this feature, the clutter plus noise spectral density matrix of one Doppler cell can be estimated from another Doppler cells clutter plus n...
Abstract: A method of joint estimation of angle and Doppler frequency for bistatic MIMO radar in spatial colored noise is presented. Utilizing the cross-correlation matrix which is formed by the adjacent outputs of match filters in the time domain, a new matri...
Abstract: The Compressive Sensing (CS) based SAR imaging method can reduce the sampling time, the data volume and save signal band width. However, the CS based methods are sensitive to noise and clutter. In this paper, a new imaging modality based on Bayesian ...
Abstract: Radar High Range Resolution Profile (HRRP) plays an important role in target detection and recognition. For the properties of radar scattering response at high frequencies, a novel radar high-resolution imaging method using sparse signal representati...
Abstract: A new algorithm to jointly estimate the DOD-DOA of bistatic MIMO radar is proposed based on transmit beamspace-parallel factor. For the problem of the power being transmitted dispersedly in traditional MIMO radar, the optimizing criterion for designi...
Abstract: Single-image zooming is an ill-posed problem. Using the self-similarity feature among local structure in an image which can be maintained in the scale space and the advantage of NonSubsampled Contourlet Transform (NSCT), a single image super-resoluti...
Abstract: In order to solve the problem of beamformers performance degradation caused by signal steering vector and sample covariance matrix mismatch errors, a robust adaptive beamforming algorithm based on Super-Gaussian Loading (SGL) is put forward in this p...
Abstract: An object detection algorithm based on shape feature of combined regions is presented. Object candidates are first extracted by combining segmented regions, and then their feature vectors which contain angle chain and ratio of arc-chord distance to c...
Abstract: Information transferring process in sensor network will appear delay, out-of-sequence even dropout. How to make full use of such information is extremely important to improve state estimation accuracy. In order to further overcome the problems in the...
Abstract: In order to avoid the condition that most of the segmentation based recognition methods have relied too much on the quality of image segments, a new object recognition method is proposed based on Multi-Level- probabilistic Latent Semantic Analysis (M...
Abstract: To improve the performance of proxy re-signature schemes, the schemes of on-line/off-line proxy re-signature are proposed in this paper. The main idea is to split the re-signing procedure into two phases: the off-line and on-line phases. Most of the ...
Abstract: In an Identity-Based Encryption (IBE) scheme, an users public key can be derived from his identity directly, which eliminates the cost of the certificate management in Public Key Infrastructure (PKI) systems. However, the IBE has the key escrow issue...
Abstract: According to the fact that security against Selective-Opening Attack (SOA) is confined to the case of Public-Key Encryption (PKE) but is difficult to yield solutions in Identity Based Encryption (IBE) in resent years, a novel identity-based broadcast...
Abstract: Full diversity Low Density Parity Check (LDPC) codes construction is the hot spot in LDPC field at present. Traditional construction algorithm designs column full rank check submatrix to realize full diversity LDPC codes under ML decoding algorithm. ...
Abstract: This paper presents a high-throughput encoding method for IEEE 802.16e-like Low-Density Parity- Check (LDPC) codes. It is based on a fast double-recursion pipeline method, and can significantly improve the encoding speed. For more parallelism and les...
Abstract: Satellite mobile channel can be described as a fading channel model based on Markov process. Firstly, the predictability of satellite mobile channel is analyzed in this paper. Then a long term prediction method is proposed based on weighting predicti...
Abstract: A resource scheduling cross-layer design scheme in FDD-OFDMA mobile communication downlink system about the issue of limited interference is proposed. A mathematical formulation of optimization issue is provided with the objective of maximizing syste...
Abstract: An inter-relay interference suppression method is proposed at the relay based on the Autocorrelation Matching (AM) theory in the two-path relay cooperative system. The new approach takes three steps at the relay. Firstly, the new method is used to re...
Abstract: A network selection algorithm for CDMA/OFDMA heterogeneous networks using periodic load measurement scheme, which is named as Minimizing SIR Outage Probability (MSOP) network selection. In this algorithm, the best access probability is derived throug...
Abstract: In cooperative communication, the relay node is used to retransmit the data packets of the source. However, helping other nodes transmitting packets may decrease the performance of the relay, it is less efficient from the point of the relay, which is...
Abstract: A three-node Amplify-and-Forward (AF) cooperative diversity network model is proposed in the paper. The randomness of feedback delay analysis is presented for the proposed model which the source transmits a frame over Nakagami-m fading channel. The f...
Abstract: Energy-saving routing is one of the important topics in Wireless Ad hoc NETworks (WANETs), which is significant for prolonging network lifetime. Under convention routing, the data delivery paths, with each used by a pair of nodes, may intersect at so...
Abstract: Two subspace distance calculation algorithms are proposed for codeword search of limited feedback precoding multi-user MIMO systems. The equivalence of subspace distance and chordal distance are first proved, then the complexity of chordal distance c...
Abstract: Co-channel interference is serious when multiple Bluetooth piconets coexist in a limited area. Therefore, a co-channel interference suppression method based on the channels switching is proposed. With the method, channels may switch from one to anoth...
Abstract: To solve the personalized information content and services recommended issues in mobile communication network, a collaborative filtering algorithm based on users social relationship mining in mobile communication network is proposed with the social n...
Abstract: To lessen the impact of multicast member with the worst link quality on multicast rate in single source multicast, static and dynamic alternative scheduling algorithms are presented for reliable multicast with two sources. Through transmitting encode...
Abstract: Considering the characteristics of attack decision-making issue in the domain of network attack and defense, the network attack graph model is extended from the view of attacker. Atomic attack is built by instantiating the attack pattern according th...
Abstract: Since the PMIPv6 can not be efficiently operated, an improved fast handover scheme based on network- performed prediction is proposed. Without changing the decision-maker, the handover experience is generated to train the learning system. The k-dista...
Abstract: A fast mapping algorithm, named Topology Partition Based MAPping (TPBMAP), is proposed considering the energy consumption and traffic balance for the Network-on-Chip (NoC). The proposed algorithm not only generates topology automatically by taking th...
Abstract: A fully-integrated SiGe BiCMOS Power Amplifier (PA) is presented for the 2.4 GHz 802.11b/g wireless LAN application. The linearization is improved by the simple HBT-capacitor structure in the adaptively biasing circuit, without additional DC power co...
Abstract: Why a layer of Os film with high work function can increase the emission ability of impregnated cathode notably? This is an undecided important problem for a long time. In this article, based on the emission test and scanning electron microscope anal...
Abstract: Owing to the better security, dynamic and extensibility, Exclusion Basis Systems (EBS) based key management applies to security of heterogeneous sensor networks, but it suffers from the collusion. This paper introduces a Minimum Spanning Tree (MST) b...