Abstract: A new algorithm is proposed for SAR image registration based on monogenic signal theory. A monogenic phase congruency function is constructed using the characteristics to detect feature points in SAR image. On the other hand, a monogenic vector is co...
Abstract: In remote sensing image, there is significant difference between the scales of different objects, so any single-scale segmentation can barely produce satisfying result. This paper argues that appropriate segmentation scale can be selected according t...
Abstract: Rotating Fan-beam SCATterometer (RFSCAT) is a new radar scatterometer system for ocean surface vector wind measurement. Compared with other available scatterometers, RFSCAT can provide more combination of azimuth and incidence angles for a single sur...
Abstract: In this paper, related issues of SAR retrieving ocean surface wind in near shore are discussed thoroughly. First, a method of estimating ocean surface wind direction in near shore is proposed, which uses wind direction of closed ocean surface to esti...
Abstract: MIMO radar imaging using ISAR technique combines the space sampling of MIMO radar and the time sampling of ISAR techniques, which can save many antenna elements and improve image resolution. However, there will be the nonequivalent relationship betwe...
Abstract: A new Inverse Synthetic Aperture Radar (ISAR) target recognition method with the fusion of Gabor magnitude and phase feature is proposed. Firstly, the corresponding Gabor Magnitude Maps (GMMs) and Gabor phase information are obtained by convolving th...
Abstract: The one-Step Generalized Likelihood Ratio Test (1S-GLRT) and two-Step GLRT (2S-GLRT) are proposed for the problem of adaptive detection for airborne radar with jamming in partially homogeneous environments. Basing on these detectors, the Reduced-Rank...
Abstract: The FRaction Fourier Transform (FRFT) is optimal in the detection and parameter estimation of Linear Frequency Modulation (LFM) signal, but it is suboptimal for Linear Frequency Modulation Continuous Wave (LFMCW). LFMCW signal is a periodic extension...
Abstract: The conventional characteristics analysis methods for moving target in Frequency Modulation Continuous Wave (FMCW) SAR all carry out in space-domain, leading to approximated and partial results. Therefore, a novel analysis approach based on an accura...
Abstract: A novel algorithm for estimation of Azimuth Direction Of Departure (ADOD), Azimuth Direction Of Arrival (ADOA) and Elevation Direction Of Arrival (EDOA) based on bistatic MIMO radar with electromagnetic vector sensors is presented. The linear transmi...
Abstract: The parameter estimation performance for the moving bistatic MIMO radar is studied. First, the bistatic MIMO radar signal model with both the transmit and receive arrays being moving is given and the general Cramer- Rao Bound (CRB) expression for the...
Abstract: Inverse Synthetic Aperture Radar (ISAR) imaging in short coherent processing interval has a great deal of major advantages in application. In this paper, a novel cross-range scaling algorithm for ISAR imaging with limited pulses and short aperture is...
Abstract: Multi-channel SAR in azimuth, which can be used to suppress the Doppler ambiguity to get the High-Resolution Wide-Swath (HRWS) SAR images, suffers from the amplitude and phase mismatch among the channels. Based on the analysis of the characteristics ...
Abstract: The distribution of ground clutter in angle-doppler space depends on the information of platform velocity, radar parameters and so on, which is known as the prior information. In this paper a model with matrix form of the ground clutter data is estab...
Abstract: This paper proposes a joint cluster and power allocation algorithm for multiple targets tracking in multistatic radar system. By selecting an optimal subset of radars with predetermined size to cluster around each target and implementing the power al...
Abstract: A modulation classification scheme based on the chaotic theory is presented in low SNR condition by taking the advantage of the chaotic oscillator at noise management. The principle and method of the modulation classification to MPSK signal are given...
Abstract: Restricted by the current A/D sampling, parameter estimation of sub-sampling wideband Linear Frequency Modulated (LFM) signal has important research value. Based on that the LFM signal has approximate rectangular spectrum, the differentiation spectru...
Abstract: In order to reduce the transmission data in the multi-view video, the number of multi-views can be decreased properly which include texture images and depth maps, and the intermediate virtual views are generated based on Depth Image Based Rendering (...
Abstract: Shape feature is one of the important characteristics which are used to describe images in MPEG7. The descriptor of Cluster of Concentric Discrete Circles (CCDC) can be extracted in a short time. However, the method uses the variance of the ring arc ...
Abstract: How to reduce Markov features dimensionality while keeping their steganalytic ability is an important issue in the field of steganalysis. This paper generalizes the statistical hypothesis that images are isotropic from spatial domain to Discrete Cosi...
Abstract: According to the problem of camera jittering under natural environments when detecting moving objects, a background adaptive scheme is proposed in the paper. First, the Harris operator is used to detect corners in the region-of-interest for backgroun...
Abstract: Pedestrian detection is a key ability for a variety of important applications, such as robotics, driver assistance systems and surveillance. This paper presents a fast pedestrian detection based on saliency detection and Histogram of Oriented Gradien...
Abstract: Due to characteristics of binary code, it is difficult to deal with binary code variable through traditional interval analysis. To figure out this problem, a new interval analysis method of binary code variable based on abstract interpretation is pro...
Abstract: Intrusion tolerance is a new mechanism used to build secure computer networks. Therefore, its very important to analyze and evaluate the security performance of intrusion tolerant networks before intrusion tolerance is absolutely adopted. Thus, a sec...
Abstract: Lattice reduction algorithms play an important role in the field of cryptanalysis. In this paper, based on the strategies of genetic algorithm, a new lattice reduction algorithm is proposed through the transformation of the initial lattice basis. The...
Abstract: This paper analyzes the mechanism of physical layer secrecy coding and calculates the secrecy rate for the Gaussian wiretap channel under the security gap constraint. Furthermore, a classified normalized decoding algorithm with two-dimensional inform...
Abstract: Interleaving technology plays an important role in most digital communication systems. The data stream is sent to an interleaver that rearranges the data in order to cope with burst errors and improve the reliability of data transmission. Considering...
Abstract: In current energy detection algorithms, the environmental noise level is often assumed as prior information. However, it is a parameter which needs to be measured in practical application. In the situation of using the known free spectrum to measure ...
Abstract: Finding the optimal codebook is one of the key problems for interference alignment with limited feedback, it is equivalent to line packing issue in the Grassmannian manifold. Because analytical construction of the optimal codebook is possible only in...
Abstract: For frequency reuse one systems, the inter-cell interference is one of the restricting factors of the system performance. This paper presents a statistical modeling of the path loss of uplink inter-cell interference link from single interference cell...
Abstract: Available Opportunistic Routing (OR) works adopted a relay scheme, which is derived from the traditional wireless routing algorithms. In such scheme, each node is assigned with a global metric or next-hop nodes set. In this paper, it is proved that t...
Abstract: A Time Window based Unmanned Aerial Vehicle (UAV) task Coalition Formation algorithm (TWCF) is proposed to solve effectively the problem of task assignment under the scenario of multiple targets and UAVs. The main idea of TWCF is to use the free time...
Abstract: A hybrid cooperative strategy for Heterogeneous Network (HetNet) is proposed to improve its energy efficiency. By studying the two well-known cooperative strategies: Coordinated Multi-Point Joint Processing (CoMP-JP) and Coordinated Beamforming (CoMP...
Abstract: Because devices limited ability and networks dynamic topology can not ensure persistent high-quality heterogeneous services in Mobile Ad hoc NETwork (MANET), a Dynamic Backup-based Service Contingency Mechanism (DBSCM) is proposed, which includes thr...
Abstract: In order to speed up the inference algorithm of the link delay distribution based on discrete delay model, a fast inference algorithm based on hierarchy decomposition is proposed. This algorithm decomposes the end-to-end path delay into subtree units...
Abstract: An ultra-wideband and low RCS (Radar Cross Section) printed antenna is designed and fabricated using the periodically loaded fractal complementary Frequency Selective Surfaces (FSS) on the upper patch and bottom ground plane, respectively. Simulated ...
Abstract: To validate the validity of in human body communication in 2.5~6.0 GHz signal, the path loss characteristic and Specific Absorption Rate (SAR) are investigated by using a 3D ElectroMagnetic (EM) simulator based on Finite Integration Technique (FIT) a...
Abstract: An Angle Of Arrival (AOA) estimation method for Ultra WideBand (UWB) positioning based on a mono-station Hexagonal monopole antenna array is proposed. The AOA information is obtained from the received pulse amplitudes combined with the antenna array ...
Abstract: The nonparametric detection methods for radar target are extensively used in radar system, due to the fact that they can ensure Constant False Alarm Rate (CFAR) for a wide class of input noise distributions and can be easily implemented. In this pape...