Abstract: Utilizing the Shim's identity-based signature scheme, a new identity-based verifiably encrypted signature scheme is proposed. As a building block of the fair exchange protocol, this approach does not use any zero-knowledge proofs to provide verifiabi...
Abstract: Key-Dependent Message (KDM) security was introduced to address the case where message is a function of secret key of encryption scheme. By using universal hash function, this paper presents a stateless symmetric encryption scheme that is information-...
Abstract: The efficiency of contact probing has an important impact on the performance of Delay-Tolerant Mobility Sensor Network (DTMSN). An Adaptive Contact Probing Scheme (ACPS) of DTMSN is proposed, which is based on the study of stochastic properties?of Ra...
Abstract: To improve network performance in dynamic traffic load conditions, an adaptive polling periods MAC protocol called AA-MAC is proposed. Based on short preamble sampling technology, after receiving messages rather nodes in AA-MAC perform some additiona...
Abstract: As mobile ad hoc networks have become increasingly intricate and intelligent, selfish mobile nodes with different global goals need to be stimulated to cooperation and share resources. Emotion has a crucial impact on an agent's cognition and behavior...
Abstract: How to construct Virtual Networks (VNs) which satisfies users demand efficiently under the situation of limited resources is a hot issue. Mathematics model of VN construction is analyzed. Under some important principles of VN construction,balanced li...
Abstract: With the rapid growth and wide application of Web services, the research on how to accurately, efficiently and rapidly find the desired Web services has become a challenging subject. In order to improve the efficiency and precision for Web service di...
Abstract: Classical trust model of P2P networks calculates the global trust value by iteration of local trust value. Every transaction will cause iteration throughout the whole networks resulting in computational complexity, huge communication traffic. These a...
Abstract: Although the Feedback-based Two-stage Switch Architecture (FTSA) shows excellent performances in simulation, it can not be realized under present technology condition because of the time restrictions on the scheduling algorithms. To relax the time co...
Abstract: Considering the characteristic of high energy consumption in underwater acoustic sensor networks, an Energy-efficient Routing protocol Based on Spatial Wakeup (ERBSW) is presented. It divides three dimensional network space into wakeup layers and sle...
Abstract: To solve the problem of Motion Compensation (MC) for multiple standards efficiently, a modified hardware-efficient computing architecture of MC interpolation for multiple standards is developed with the proposed Rounding Last (RL) and Diagonal Two St...
Abstract: Conventional Rate Control (RC) schemes take mostly objective metric as distortion measurement, which can not acquire optimal subjective quality. This paper applies Structural SIMilarity (SSIM) based subjective distortion to Rate Distortion Optimizati...
Abstract: Present adaptive predistortion structures make against the utilization of efficient least-square algorithms in the parameters update of Hammerstein predistorter. In order to solve the problem, a novel adaptive structure is proposed. Using the structu...
Abstract: The optimum design of the cooperative precoding matrix is investigated for the system consisted of cooperative multi-antenna base stations and one multi-antenna mobile terminal. A mathematical model is first established for the cooperative precoding ...
Abstract: This paper addresses the waveform adaptation issue of multiple competitive Multiple-In Multiple-Out Cognitive Radios (MIMO-CR) respectively maximizing their information rates under the interference-temperature constraint of primary users. This issue ...
Abstract: In order to design precise and feasible ranging method with Impulse Radio Ultra Wide Band (IR-UWB) signal during energy detection, two new Time Of Arrival (TOA) estimation algorithms based on optimal and suboptimal thresholds are respectively propose...
Abstract: In order to overcome the disadvantages of the traditional spectrum sensing methods in Cognitive Radio (CR), a novel cooperative sensing algorithm based on the maximum eigenvalue and average energy of the received signal covariance matrix is presented...
Abstract: In the wireless fading channel environment, cooperative relaying is an effective way to increase additional diversity gain, and network coding can be used to increase network throughput. Network coding uses XOR (exclusive or) to mix packets from two ...
Abstract: A new algorithm for jointly estimating multi-parameters (the frequency, Direction Of Arrival (DOA) and range) of sources is proposed. The proposed algorithm does not require spectral peak search, and can be applied to arbitrary Gaussian noise environ...
Abstract: This paper considers detection of a signal in underwater colored noise on small aperture array, and an Adaptive Matched Filter based on Maximum Likelihood (ML-AMF) is proposed. The Direction-Of-Arrival (DOA) of signal is firstly estimated, and then e...
Abstract: The detection of the number of space signals is one of the key issues in array signal processing. In view of the poor performance of traditional detection methods at low signal-to-noise ratios, a new method called Detection Technique based on Approxi...
Abstract: One equivalent definition of Discrete Time Fourier Transform (DTFT) is introduced in this paper. The relationship and differences between DTFT and Chirp-Z transform are analyzed. It is pointed out that DTFT, with spectrum zoom character, is a special...
Abstract: As for the inhomogenous images, it is difficult and ineffective to segment Regions Of Interest (ROI). In order to solve these problems, this paper proposes an image segmentation algorithm based on the active contour model. Different from the ones in ...
Abstract: A novel super-resolution reconstruction method based on non-local simultaneous sparse approximation is presented, which combines simultaneous sparse approximation method and non-local self-similarity. The sparse association between high- and low-reso...
Abstract: Human pose estimation is an essential issue in computer vision area since it has many applications such as human activity analysis, human computer interaction and visual surveillance. In this paper, 2D human estimation issue in monocular images and v...
Abstract: During the downward movement for missile-borne SAR, the assumption that echo signal invariance in azimuth is not accurate, which is caused by high vertical velocity and acceleration, making SAR imaging difficult to process. Due to this reason above, ...
Abstract: In order to solve the registration problem of sequence images in forward-looking imaging radar, this paper proposes an image registration algorithm, which is based on combination of imaging theory of forward-looking array radar and Hausdorff distance...
Abstract: There are two main problems through the implementation of Polar Format Algorithm (PFA). First, the error of Residual Video Phase (RVP) arises after the dechirp operation. Second, the interpolation has influence on the computation efficiency and imagi...
Abstract: High resolution and wide swath Synthetic Aperture Radar (SAR) imaging increases severely data transmission and storage load. To mitigate this problem, a compressive sensing imaging method is proposed based on wavelet sparse representation of scatter ...
Abstract: A bistatic Frequency Scaling (FS) algorithm is proposed based on an exact analytical bistatic Point Target (PT) spectrum obtained with a Geometry-based Bistatic Formula (GBF) method in TanDEM configuration. Since numerical calculation is no longer ne...
Abstract: The Doppler parameters of missile-borne SAR received signal vary much with slant range due to missiles high speed and non-ideal movements. Thus applying the classical wave-number domain algorithm can hardly achieve high precision for missile-borne SA...
Abstract: The impacts of Keystone formatting on SATP are first analyzed. Conclusions are obtained from the study that Keystone formatting degrades the performance of STAP by broadening the clutter ridge and increasing the number of clutter degree of freedom. B...
Abstract: In the high-resolution, wide-swath imaging application of spaceborne SAR, the technique of Digital Beam-Forming (DBF) can be employed to receive and process echo data with multiple channels on elevation, increase the receive gain and Signal-to-Noise ...
Abstract: A novel compact Tapered Slot Antenna (TSA), which is used for high resolution polar ice penetrating radar (0.5 GHz-2 GHz), is proposed. This antenna is fed by a CoPlanar Waveguide (CPW) to slot-line transition. The lateral edges of the antenna are co...
Abstract: The amount of data increases rapidly, and the types of data need to be handled become more and more various, a new algorithm with better generalization performance and higher classification accuracy is indispensable. In this paper, a new hybrid algor...
Abstract: Interconnect delay and power consumption are two of the main issues in deep-submicron meter technology and nano-meter technology. This paper proposes a long chain design method which takes power consumption and delay into consideration. This paper pr...
Abstract: This paper analyzes the issue of calculating the threshold for energy detection when an estimated noise power is used. The corresponding closed-form detection performances of energy detection are derived in the terms of Q function. To achieve the exp...
Abstract: To solve the optimization locations of base station in Wideband Code Division Multiple Access (WCDMA) network, a solution?of optimization locations based on immune algorithm is proposed. The cell area subject to cell capacity is expounded, the framew...
Abstract: For undistorted images, the wavelet coefficients of between-scale coefficients in the same orientation are correlated, while compression coding reduce the correlation. Cosine similarity is used in this work to model the correlation of between-scale s...
Abstract: For catadioptric imaging may arise mirror effect between omnidirectional image and perspective image, and scale invariant feature transform algorithm is not invariant to image mirroring. This paper proposes flip horizontally perspective image, and th...
Abstract: In this paper, a objective evaluation method for synthetic aperture radar jamming effect assessment is proposed, by which it can achieve an index consistent with perceptual property of Human Visual System (HVS). This method acts according to the Cont...
Abstract: This paper studies the principle of realizing wide swath of space-borne SAR by using range Digital Beam-Forming (DBF). Then the effect of the time domain DBF processing on the amplitude and resolution of spaceborne SAR image is summarized based on th...
Abstract: The detection of presence of decoy is the foundation of countering the Towed Radar Active Decoy (TRAD) and deciding the effect of ECCM. Based on the distinction of the amplitude characteristic on the condition of the decoy is present or not, the cond...
Abstract: In order to realize the multi-fault diagnosis for wide-deviation analog circuits, this paper designs a classification model based on Self-Organizing Map-Learning Vector Quantization(SOM-LVQ) network, and also presents an Enhanced LVQ (ELVQ) algorithm...