Abstract: The network lifetime optimization issue is investigated for bidirectional two-hop cooperative Orthogonal Frequency Division Multiplexing (OFDM) systems recruiting multiple relays. Since direct treatment for the network lifetime maximization formulati...
Abstract: The detection time required to reach a decision in sequential detection is a random variable. Although the sequential detection has a high average detection speed, very long detection time may be required in some specific cases. In order to improve t...
Abstract: The data transfer is defined as connection-oriented and two-phase activation model is employed to set up connection in IEEE 802.16 networks. Considering that free resource is exhausted but some resources is reserved for those admitted service flows, ...
Abstract: Noise-Normalization Combining (NNC) is applied in Differential Frequency Hopping (DFH) receiver to improve the performance of DFH system in rejecting Partial-Band Jamming (PBJ). Symbol Error Rate (SER) performance of this receiver over Nakagami fadin...
Abstract: In this paper, the Frequncy Domain Equlization (FDE) algorithm for partial response Continuous Phase Modulation (CPM) signals is studied. A new framework of CPM transmitted signals is designed, and a novel low-complexity iterative detection approach ...
Abstract: Cooperative communication and cognitive radio are the key candidates for the future mobile communication technologies. Focusing on the resource allocation issue in OFDM-based cooperative cognitive radio networks, an efficient cross-layer scheduling s...
Abstract: A spectrum assignment scheme for cognitive radio networks is proposed by means of combining graph theory with immune optimization algorithm. A binary matrix coding scheme is introduced to represent antibody population. Two operators Random-Constraint...
Abstract: Considering at the characteristic that the energy of node is limited in wireless sensor networks, an energy-efficiency optimizing model both considering transmission energy consumption and its equilibrium characteristic is build in this paper. To mak...
Abstract: Different from traditional networks, there is often no contemporaneous end-to-end link between the source and destination in Delay/Disruption Tolerant Networks (DTN). So traditional security mechanism that based on central server is not suitable to D...
Abstract: Signcryption is a cryptographic primitive that combines both the function of digital signature and encryption in a logical single step. However, in some occasion there are conflicts of interest between the two entities, so concurrent signature is pro...
Abstract: In this paper, a new method based on Peak-to-Average Power Ratio Threshold (PAPRT) is proposed by combining the eigenvectors with the binary hypothesis testing. The eigenvectors are employed to weigh the received data and then the peak-to-average pow...
Abstract: An improved fast algorithm is proposed for cyclic spectral estimation, which decreases the requirement of data quantity, without reducing the performance. The windowed overlapped data processing, which is used in time smooth method, is introduced int...
Abstract: A novel blind detection algorithm of multi-valued square/non-square QAM signals using complex Continuous Hopfield-type Neural Network (CHNN) is proposed. The blind detection issue of multi-valued QAM signals is transformed into solving a quadratic op...
Abstract: A new fast algorithm based on subset partition for prime-length 2D Discrete Cosine Transform (DCT) is proposed. The rule of subset partition is put forward, and the frequency data of DCT output are separated into several irrelevant subsets according ...
Abstract: Considering the variation of illumination, expression and pose, a new face recognition algorithm is proposed based on factor analysis and data mining. The consistence of factor analysis model based on content and style with linear discriminant analys...
Abstract: Very recently, the sparse representation theory in pattern recognition arouses widespread concern. In this paper, the sparse representation-based face recognition algorithms are studied. In order to make the representation coefficient vector sparser,...
Abstract: Corresponding feature extraction is a key stage in infrared-visible image registration, fusion, and change detection, etc.. Considering the difficulties in correct extraction of related features between infrared and visible images of the same scene, ...
Abstract: A new kernel logistic regression model based on two phase sparsity-promoting prior is proposed to render a sparse multi-classifier and enhance the run-time efficiency. For accelerating the building of the model, the bottom-up training algorithm is ad...
Abstract: The main problems of the Particle Filter (PF) are the sample degeneracy and impoverishment phenomenon. To deal with the problems, a new PF based on Differential Evolution (DE) is proposed. Firstly, the Importance Distribution (ID) which contains the ...
Abstract: An effective adaptive imaging method using cross-correlation weight of dual robust beamforming is proposed for UltraWideBand (UWB) through-the-wall imaging radar. Dual constrained Robust Capon Beamformings (DRCB) is applied to these 2 subarrays which...
Abstract: A method of joint estimation of angle and Doppler frequency for bistatic MIMO radar in spatial colored noise based on temporal-spatial structure is presented. In this method, based on the assumption of temporally Gaussian white noise, the cross-corre...
Abstract: The regularized constrained total least square algorithm for near space radar network is discussed in this paper. Firstly the nonlinear equations about range and angle are transformed into linear equations. The influence of error is analyzed by expan...
Abstract: Synthetic Aperture Radar (SAR) targets detection and identification technology is one of the choke points for SAR practical application. Extraction of effective feature is the key of SAR targets detection and identification. The information of SAR ta...
Abstract: Theory, characteristics and shortcomings of traditional wind vector algorithm are analyzed in the beginning of this paper, and then, a new wind vector algorithm in scanning mode is delivered. The correlation of ocean wave in two neighboring scanning ...
Abstract: The detection performance of the four different kinds of network radar models on Rician model of pulse-to-pulse fluctuation is analyzed when the total power of single pulse of the transmitters is definite. The simulated and analyzed results show that...
Abstract: A novel Compressive Sensing (CS) based high resolution target range imaging method for Frequency- Coded Pulse Radar (FCPR) is proposed in this paper. Considering spatial sparsity of the target scene, a FCPR target sparse signal model is derived. A FC...
Abstract: A fast angle estimation algorithm of coherently distributed targets based on bistatic MIMO radar is proposed. Firstly, the signal model of coherent distributed targets for bistatic MIMO radar is established. Then, Hadamard product rotational invarian...
Abstract: In order to achieve high accurate measurement of objects velocity, a laser Doppler velocity radar system is established and the frequency estimation algorithm is investigated. The frequency estimation method based on autocorrelation operation is impr...
Abstract: Sliding spotlight SAR, which is between strip-map SAR and spotlight SAR, is a unique imaging mode. Concerning on the long illuminating time and long accumulating time of high-resolution and wide-coverage-area space-borne sliding spotlight SAR, the pr...
Abstract: Considering the shortage of edge preservation and low direction-resolution for SAR image segmentation based on the conventional wavelet transform domain, a new segmentation method is proposed based on Gray-Level Cooccurrence Probability (GLCP) featur...
Abstract: An automatic method for detecting and interpreting bridges over water in high-resolution space-borne synthetic aperture radar imagery is proposed. Firstly, the textual features for image classification are computed, including response for Gabor filte...
Abstract: The detection of navigation signals evil waveform based on multicorrelator is an important issue of GNSS integrity monitoring. This paper defines the effect of 2nd-order step threat model of evil waveform on the code tracking loop, analyzes the multi...
Abstract: The Method of Moments (MoM) based on Impedance Boundary Condition (IBC) is presented to analyze the electromagnetic scattering characteristics of three-dimensional target coated with anisotropic materials. According to the surface equivalence princip...
Abstract: In order to study electron emission phenomenon of cathode evaporator, a new designed test device is used to collect the electron emission curve of evaporator deposited on polycrystalline tungsten surface, Electron emission microscope and SEM are used...
Abstract: This paper presents the design considerations, the simulation results and the test results for a new type S-band high-average-power broadband klystron. In this paper, a method which is used for verifying the quality of an electron-optics-system of a ...
Abstract: Regarding the connectivity domain constraint in nano-meter circuit architecture, this paper proposes a circuit equivalent transformation method based on logic replication for reducing mapping complexity. The fanout degrees of all gates in a circuit a...
Abstract: Kernel-based Support Vector Machine (SVM) is widely used in many fields ( e.g. image classification) for its good generalization, in which the key factor is to design effective kernel functions. As there is not much a priori knowledge introduced into...
Abstract: To improve the performance of salt-and-pepper noise removal, a two-stage scheme is proposed. In the first phase, an improved adaptive median filter is used to identify pixels which are likely to be contaminated by noise (noise candidates). In the sec...
Abstract: In this paper, a blind despreading algorithm is proposed for the synchronous multi-user long-code Direct Sequence Spread Spectrum (DS-SS) signals in low Signal to Noise Ratio (SNR) scenarios. The synchronous multi-user long-code DS-SS signals are rep...
Abstract: M-estimator is a new estimator presented by Hao Cheng-peng in 2005, which possesses higher accuracy in the estimation of shape parameter of K-distribution and is enhanced in 2007. In this paper, a further enhanced M-estimator is proposed based on the...
Abstract: Because its capability in long-range imaging with simple hardware architecture, the stepped frequency modulated signal has an obvious advantage in modern radar target recognition. The principle of synthesizing the range profile using stepped frequenc...
Abstract: This paper presents the concepts of sorted-attack security and generalized sorted-attack security of tweakable enciphering schemes under chosen-plaintext and chosen-ciphertext attacks. Firstly, it is proved that those two notions are equivalence. Sec...
Abstract: The k-error linear complexity of the output sequences of single cycle T-function is investigated with the polynomial theory and the Chan Games algorithm as the main tools. All of the linear complexity drop points and the k-error linear complexity on ...
Abstract: The 4-round ARIA differential property is given, and the differential enumeration attack on 7-round and 8-round ARIA-256 is presented in this paper. The attacks need 256 chosen plaintexts. The attack on 7-round ARIA has the time complexity of 2238.2 ...
Abstract: Threshold Logic Gate (TLG) is receiving much attention because of its logic versatility and functionally complete. For the circuit design based on TLG, a method is described to determine whether a function is threshold or not with the spectral techno...