Abstract: The traditional spectrum algorithms are limited in face recognition issue. For its characteristics of issue, a novel multi-angle face recognition method based on modified Gaussian Process Latent Variable Mode (GP-LVM) is proposed. Firstly, the probab...
Abstract: According to the issue of pedestrian detection in complex background, this paper presents an Improved Center-Symmetric CENTRIST (ICS_CENTRIST) feature from the view of the pedestrian edge information. This feature has characters of simple calculation...
Abstract: Researches on current Dimensionality Reduction (DR) methods are mainly based on two ways. One attempts to ensure the stabilities of global features of high-dimensional samples, the other tries to make the local manifold structure between data before ...
Abstract: A new method named ball-averaged Lyapunov exponents method is presented to calculate Lyapunov exponents of nonlinear time-series signals. The method can be used as feature extraction and classification of electromyography. Firstly, the Lyapunov expon...
Abstract: Based on the concept of Difference Of Density (DOD), L2 Kernel Classifier(L2KC) exhibits its good performance. However, the assumption that the training domain and testing domain are independent and identically distributed severely constrains its use...
Abstract: Due to lack of adaptability to assess objective image quality and poor correlation between the existing assessment methods and subjective human perception, a no-reference image quality assessment method based on parameter estimation is proposed. In t...
Abstract: The threshold segmentation of mixed noise image can not be solved by existing algorithms efficiently. A 3D minimum error thresholding algorithm is proposed. Using gray distribution information of pixels and relevant information of neighboring pixels,...
Abstract: Otsu adaptive threshold algorithm is a classic image segmentation method. The two-dimensional Otsu algorithm and its improvements which based on original Otsu algorithm are restricted, due to their computation(or space) complexity, inability for anti...
Abstract: Since exponential reproducing kernel has the finite support property in time domain, it is widely used as sampling kernel in Finite Rate of Innovation (FRI) sampling framework. However, this process will change white noise in signal to color one, whi...
Abstract: Sampling and reconstruction is a basic issue in signal processing. The known sampling theory in the FRactional Fourier Transform (FRFT) domain is based on the analysis of ideal sampling system. The actual Analog-to-Digital conversion is implemented t...
Abstract: Adaptive monopulse technique is widely used in surveillance and tracking radar due to its interference cancelling and angle estimation ability. In classical adaptive monopulse, the first-order linear approximation is adopted and the high-order items ...
Abstract: Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI) mode is an important mode in airborne radar systems since it can monitor extensive area in a short time. However, there are few systems that possess WAS-GMTI mode. Therefore, real data...
Abstract: Micro-Doppler is a unique characteristic of micro-motion targets, as an important signature of truck, micro-Doppler generated by rotation of wheels will offer proof for recognition of the truck. Firstly, on the basis of scatterer model, taking the re...
Abstract: RCS of aircraft varies with time or radar wave incident angle without regular pattern during its movement. It is necessary to analyze RCS variation using statistic items or models. The research objects of existing literatures are mostly conventional ...
Abstract: The micro-Doppler effect induced by the rotating parts of the target, which provides a new approach for accurate auto radar target recognition, attracts great research attention in recent years. In this paper, taking target with rotating parts for an...
Abstract: The spinning targets three-dimensional (3D) radar imaging is one of the most significant studies for space targets recognition. To obtain the real 3D characteristics of the targets that can not be acquired from a monostatic radar, a broadband 3D rada...
Abstract: For SAR images of two adjacent strips with the smaller overlapping area, the severe geometric distortion makes it difficult to extract directly the Tie Points (TPs). Based on imaging information and coherent information of the InSAR images, this pape...
Abstract: Caused by the limited quantization dynamic range of the spaceborne SAR, the echo saturation phenomenon happens between timesduring spaceborne SAR data acquiring. In this paper, saturation correction methods based on dynamic decoding are proposed for ...
Abstract: The Bistatic SAR (BiSAR) acquires the radar cross section of target area from different directions, which is helpful for SAR image classification and target recognition. The spotlight mode has higher resolution and thus has advantages in target recog...
Abstract: In the application of getting the earth surfaces Digital Elevation Model (DEM) through InSAR technology, multichannel (multi-frequency or multi-baseline) InSAR technique can be employed to improve the mapping ability for complex areas with high slope...
Abstract: Multi-channel SAR technique is an effective solution to obtain high-resolution images with better than 0.1 m. A radar transceiver channel scheme which consists of one wideband transmit channel and 8 down-converter receive channels is designed and imp...
Abstract: The combination of Loran-C and Global Navigation Satellite System (GNSS) has become a?new?application?mode, which provides reliable positioning, navigation and timing service for users. Based on the research on Loran-C signal system, considering its ...
Abstract: Based on binary periodic complementary sequence set and binary Zero-Correlation Zone (ZCZ) sequence set, constructions of quaternary periodic complementary sequence sets with zero-correlation zone are proposed by using the inverse Gray mapping. If th...
Abstract: A novel Bussgang category of blind equalization with Exponential Expanded Multi-Modulus Algorithm (EEMMA) is proposed. Comparing with those traditional Bussgang blind equalization algorithms, the proposed one can decrease further the steady-state err...
Abstract: Compared to traditional Time Division Multiplexed (TDM) and Frequency Division Multiplexed (FDM) training sequence, Superimposed Training (ST) sequence can effectively improve the frequency spectrum efficiency. However, the interference between infor...
Abstract: For the carrier synchronization in short burst communication system, a joint Rotational Periodogram Averaging (RPA) and demodulation soft information carrier estimation algorithm is proposed. First, the pilot sequence is rotated with different freque...
Abstract: A communication scheme is proposed based on spread spectrum combined synthetic-aperture for long- rang acoustic communication in shallow water. The Doppler effect and an effective motion compensation method are analyzed using resampling technique com...
Abstract: Most of current wireless packet scheduling algorithms aim at maximizing overall system throughput or achieving a certain type of fairness among mobile users. However, these content-independent algorithms can not be applied to wireless video transmiss...
Abstract: A novel Quantum Adaptive Particle Swarm Optimization (QAPSO) method is proposed. In this algorithm, the position encoding of the particle is achieved with quantum bits, and the state of quantum bit is updated dynamically with particle trajectory info...
Abstract: As the high complexity and low convergence speed, traditional methods could not solve QoS multicast routing problem to satisfy the network requirement. A Harmony Search algorithm based on Child-Node Encoding (CNE-HS) is proposed for better performanc...
Abstract: For the localization algorithm of sparse targets based on orth, the orth preprocessing would affect the sparsity of original signals. A novel localization algorithm of sparse targets based on LU-decomposition is proposed. It translates target localiz...
Abstract: In the real world, the structure of social networks is not static, but varying with times changing, and the same communities as an essential feature of social networks is also true. An incremental dynamic community detecting algorithm is proposed to ...
Abstract: Resource sharing is one of the key issues of distributed computing, and load balancing is the fundamental approach to sharing scarce resource in a distributed computing system. However, the existing load balancing methods are mostly confined to the h...
Abstract: Current failure recovery for routing system has not effectively resolved issues including storage cost, redundant recovery and AS (Autonomous System) benefit protection. In the background of cascading failure prone to happen under paralyzing attack, ...
Abstract: The nonlinear dynamics of Superbuck converter is investigated because Superbuck converter is a kind of important topology in the solar photovoltaic power generation system. The discrete mapping model of Superbuck converter is derived by stroboscopic ...
Abstract: In storage service, searchable encryption scheme allows users to access their cipher data selectively, and meanwhile ensures the confidentiality of search data. Since possessing higher search accuracy, conjunctive keyword (namely Boolean combination ...
Abstract: An efficient numerical approach is presented to analyze the electromagnetic scattering characteristics from conducting targets based on the Characteristic Basis Function Method (CBFM). Combined with the Improved Fast Dipole Method (IFDM), the matrix-...
Abstract: Neurons Action Potentials (NAP) contain the most critical information of neurons actions. Based on the discussion for the sparsity characteristics of NAP presented in the DWT domain, and the analysis of related Compressive Sensing (CS) measurements, ...
Abstract: In the 15th (2012) IACR international conference on practice and theory of Public-Key Cryptography (PKC), Fujioka et al. proposed a generic construction of Authenticated Key Exchange (AKE) from a Key Encapsulation Mechanism (KEM), which is called the...