Abstract: How to efficiently utilize the finite storage space and cache content chunks in the content store poses challenges to the caching policy in Named Data Networking (NDN). Using the differentiated caching strategy, a collaborative caching algorithm is p...
Abstract: Most of Controller placements take the Propagation Delay (PD) as the important consideration in Software-Defined Network (SDN), ignoring the influence of the Transmission Delay (TD) on the network performance. This paper provides a delay-aware contro...
Abstract: In the context that social network becomes more and more complicated and huge, it is extremely difficult and complex to mine the global community structures of large networks. Therefore, the local community detection has important application signifi...
Abstract: Considering the security resource allocation problem in the two-way relay networks exiting an eavesdropper, to improve the security of the relay, a security secrecy ratio scheme under the constraint of subchannel allocation and power is studied in th...
Abstract: Uplink resource allocation in Device-to-Device (D2D) enabled cellular systems is studied. The sum-rate maximization problem is transformed into a concise Binary Integer Programming (BIP) problem, which is NP-hard. Then based on the Canonical duality ...
Abstract: This paper proposes a novel wideband compressive spectrum sensing scheme based on the Generalized Likelihood Ratio Test (GLRT), in which the GLRT statistic and the decision threshold are derived according to Random Matrix Theory (RMT). The proposed s...
Abstract: To solve the confliction between the security and reliability of physical layer security codes and improve the secrecy rate, a security coding method based on puncturing polar codes is proposed. In order to keep the security and reliability, the conf...
Abstract: Multiple tags collision becomes an important factor blocking the popularization of Radio Frequency IDentification (RFID). To improve the identification efficiency and reduce the communication overhead, an novel algorithm, anti-Collided Bits Indicator...
Abstract: At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrast...
Abstract: Since the existing algorithms can not meet the requirements of real-time compression and transmission for UAV(Unmanned Aerial Vehicle) videos, a new real-time compression algorithm with low complexity for UAV videos is proposed. Considering the plane...
Abstract: A Discrete Cosine Transform (DCT) based Modulation Transfer Function (MTF) is used to improve the intra quantization matrix for the High Efficiency Video Coding (HEVC) standard. A new method is used to calculate the spatial frequency in the calculati...
Abstract: Recently, extensive researches have been focused on the early stoping criterion for Belief-Propagation(BP) decoding of LDPC codes. However, there is little study on suitable design of early stopping criterion for Weighted Bit Flipping (WBF) decodings...
Abstract: This paper proposes an Eigenvalue Reconstruction method in Noise Subspace (ERNS) for Direction of Arrival DOA estimation with high resolution, provided that the powers of sources are different. The noise subspace eigenvalues belonging to the covarian...
Abstract: Since the adaptive beamformer suffers from the output performance degradation when the position of the interference moves, a new null broadening technique is proposed. The algorithm uses the projection technology to transform the array receives data,...
Abstract: The radiated noise sources of underwater vehicle can be localized by analysis of Doppler information. Then effective suppression of noise can be taken. However, traditional time-frequency methods can hardly distinguish the Doppler shift of noise sour...
Abstract: Traditional echo control techniques as Partitioned Block Frequency Domain Adaptive Filter (PBFDAF) with stochastic gradient adaptive method usually endure slow convergence and insufficient echo suppression in reverberant room when the echo is speech ...
Abstract: The power line being indispensable under indoor environment is firstly introduced to be as the antenna, which wideband high-frequency signals are injected into it to obtain the location fingerprint so as to achieve precise indoor positioning. Firstly...
Abstract: The common way of conflicting evidence combination is to modify the basic probability mass assignment of evidence bodies by a certain indicator which can reflect or describe the information uncertainty of the conflicting evidence. In existing conflic...
Abstract: A novel algorithm called Dual Latent Variable Spaces Local Particle Search (DLVSLPS) is proposed. It can estimate the 3D human motion sequence from silhouettes of multi-view image sequence more accurately. Gaussian Process Dynamical Models (GPDM) is ...
Abstract: The processing of generating dictionary of function in Kernel Matching Pursuit (KMP) often uses greedy algorithm for global optimal searching, the dictionary learning time of KMP is too long. To overcome the above drawbacks, a novel classification al...
Abstract: Aiming at the problem that a Continuous Wave (CW) is easy to be suppressed by the frequency domain filtering and the efficiency of a broadband continuous blanket jamming is low, this paper presents a new broadband comb spectrum jamming type which is ...
Abstract: For the problem of two Dimensional Direction Of Arrival (2-D DOA) estimation, a broadband 2-D DOA algorithm is proposed based on the Compressed Sensing (CS). It can obtain the center frequency, azimuth angle and pitch angle of multiple narrowband sig...
Abstract: Compressed Sensing (CS) reconstruction of hyperspectral image is an effective mechanism to comedy the traditional hyperspectral imaging pattern with the drawback of high redundancy and vast data volume. This paper presents a new multiple measurement ...
Abstract: Feature extraction is the key technique for Radar Automatic Target Recognition (RATR) based on High Resolution Range Profile (HRRP). Traditional feature extraction algorithms usually use shallow models. When applying such models, the inherent structu...
Abstract: The micro-Doppler modulation caused by precession is considered as an important signature for the discrimination of space cone-shaped target. A novel feature extraction method for precessing cone-shaped target with narrow-band radar networks is propo...
Abstract: The detection performance of the Moving Target Detection (MTD) method descends badly in a non-Gaussian correlated clutter background. Therefore, a radar target detection method in the non-Gaussian correlated clutter background is proposed, which is o...
Abstract: Adaptive Coherence Estimator (ACE) often suffers considerable performance degradation in the presence of steering vector errors. In this paper, a robust ACE detector based on the ellipsoid uncertainty set constraint is proposed. A detailed analysis o...
Abstract: The traditional methods for automatic recognition of sidelobe tracking of angle measurement system in radar techniques are presented based on the different magnitude between the signals of sum channel and difference channel. By researching the princi...
Abstract: Through-the-wall radar imaging by estimating the wall thickness and the dielectric constant is a hot research field in recent years. In order to lift strict restriction that the antenna should parallel to the wall in the traditional through-wall imag...
Abstract: The SAR imaging algorithm based on Compressed Sensing (CS), could complete the high-resolution imaging of sparse target with the sampling data below the Nyquist sampling rate. However, the Single Measurement Vectors (SMV) model used for range profile...
Abstract: The Mosaic mode is a hybrid mode of spotlight and ScanSAR, which can obtain SAR images with a large coverage and a high resolution. In this paper, a new Mosaic mode is proposed. The image scene is divided into several sub imaging blocks along the ran...
Abstract: This paper is concerned with the multitarget localization for bistatic MIMO radar in the presence of Symmetric-Stable (SS) impulsive noise. As the non-existence of the second-order matrix degrades the estimation performance of the subspace-based algo...
Abstract: For passive radar, the maneuvering target causes range cell migration and Doppler cell migration, leading to a detection ability loss. The signal model is established and a novel detection algorithm is proposed to solve the problem. Firstly, the fast...
Abstract: In light of the fact that enormous elements exist when applying the uniform rectangular planar array to skywave Over-The-Horizon Radar (OTHR), the sparse optimization approach of the uniform 2-D arrays using an improved genetic algorithm is proposed ...
Abstract: During the process of antenna design and optimization, classical optimization methods often require hundreds or even thousands trials of different parameter combinations, which leads to a low efficiency in solving multi-parameter and large scale opti...
Abstract: Reconfigurable cipher processing architecture is a newly proposed architecture for security information processing, but it has the shortage of low throughput and low utilization. To solve the problem, this paper proposes the Stream based Reconfigurab...
Abstract: Embedded memories are easily influenced by Single-Event Effects (SEE). A model to calculate the SEE failure rate of an embedded memory is proposed, which considers the likelihood that an single-event upset or single-event transient will become an err...
Abstract: In this paper, the relationship between the group delay and correlation delay is discussed, and the influence of dispersion on the calibration of a system is analyzed, when a modulated signal passes through a dispersive narrow-band system. The envelo...
Abstract: In order to improve the modeling accuracy of the AH model,this paper introduces some lagging envelope terms and leading envelope terms to the weak nonlinear module with memory in the AH model to simulate the lagging and the leading envelope effects o...