Abstract: In order to construct a high complexity, secure and low cost image encryption algorithm, a class of chaos with Markov properties is studied and used to build the encryption algorithm. First, the key stream generator is designed by the Markov Chaos wi...
Abstract: To ensure the quality of watermarked image and improve the embedding capacity of watermarkings, an adaptive image reversible watermarking method based on interger transform is proposed in this paper, which defines a new generalized integer transform ...
Abstract: In order to extract accurately the image details, and improve the effect of image enhancement, an adaptive image enhancement algorithm with variable weighted matching based on morphological is proposed. With this method, extension omni-directional mu...
Abstract: In order to achieve smooth and continuous panorama stitching effect, an image fusion algorithm which based on contrast pyramid and combines color space conversion and Contourlet transform is proposed by considering the characteristics of panorama sti...
Abstract: The main idea of Matching Pursuit (MP) is to get a local optimal solution by iteration, so as to gradually approach the original signal. To cope with the intersection of different atom sets, which may affect the classification performance of conventi...
Abstract: To solve the model-fitting problem with different confidence levels of samples, a Neural-Network (NN)- based twice learning method is proposed. It is pointed out that the real model is a variation of experimental model. The neural network approximati...
Abstract: Latent tree-structured graphical models explore the latent relationships among variables by introducing hidden nodes, therefore they can better model the correlations among variables. In the learning process of tree-structured graphical models, the q...
Abstract: There are few studies on the vehicle recognition methods based on grille regional characteristics both at home and abroad, and its classification efficiency and accuracy is low. Based on the characteristics parameters of structure, shape and texture,...
Abstract: A new method called weighted Local Binary Pattern (LBP) with adaptive threshold is proposed in this paper to address the shortcomings of LBP and Center Symmetric Local Binary Pattern (CS-LBP), using unflexible threshold and non- discriminating respec...
Abstract: Most of spatial spectrum estimation methods fail when there is only one valid snapshot. To deal with this issue, a pseudo covariance matrix construction model utilizing array receiving signal is proposed. Theoretical analysis shows that the presented...
Abstract: De-noising is an important application field of the wavelet analysis. It has advantage over the traditional filtering methods for its well localized time and frequency property. A central issue in the signal de-nosing research is how to obtain a good...
Abstract: The update vector of Least Mean Square (LMS) algorithm is an estimation of the gradient vector, thus its convergence rate is limited by the method of steepest descent. Based on the discussion of basic LMS, a direction optimization method of LMS algor...
Abstract: The regularization parameter of sparse representation model is determined by the unknown noise and sparsity. Meanwhile, it can directly affect the performances of sparsity reconstruction. However, the optimization algorithm of sparsity representation...
Abstract: A weighted estimation method based on the Time Delay Difference (TDD) variance is proposed with regard to the problem of TDD estimation of unknown source. This method utilizes the TDD of the target radiation signal frequency unit and the TDD of the n...
Abstract: This paper discusses the design of unimodular waveforms with low correlation sidelobes that is useful for MIMO radar. These waveforms can suppress range sidelobes masking and mutual interferences among different echo signals. First, according to the ...
Abstract: Sampling may cause some loss for coherent integration in time domain and the computation burdens of the common coherent integration algorithms are usually heavy. To resolve these issues, a fast algorithm realizing long-term coherent integration in fa...
Abstract: Owing to the differences among scatterer distributions observed by wideband radars with different viewing angles, it is necessary to research the network radars imaging algorithm for asymmetrical spinning targets. By making use of the range profile s...
Abstract: Estimating procession period based on ballistic missile targets Radar Cross Section (RCS) sequences is an important means of feature extraction and target identification. The RCS sequences of ballistic missile target are unstable random process when ...
Abstract: Netted radar systems show great potential in improving the performance of radar detection, tracking and interference suppression. However, the systems suffer high auto-correlation and cross-correlations of transmitted waveforms. Meanwhile, they also ...
Abstract: Based on the idea of the multiple beam method, the least squares?multi beam?method is developed to resolve the problem that there is no intersections between beams by the traditional means of implementation . The method is used to process the data ob...
Abstract: In the hyperspectral compressive sensing reconstruction method, the exploitation of the prior information of the hyperspectral imagery can improve the reconstruction performance. As the existing methods have not taken into account the spectral struct...
Abstract: Thinned rotating arrays of microwave/millimeter wave synthetic aperture imaging radiometer result in polar like visibility samplings where complex image reconstruction algorithms are in need and it is tough work to estimate important system parameter...
Abstract: (1+uv)-cyclic codes over F2+uF2+vF2+uvF2 is defined, and the relations between(1+uv)- cyclic codes and cyclic codes is discussed. It is proved that the binary image on isometric Gray maphomof a (1+uv)-cyclic code of length n over R is a linear quasi-...
Abstract: In this paper, the multi-discrete logarithm problem is formally defined, and the necessary conditions of resistance to the quantum algorithm for the hidden subgroup problem are given. It is more difficult than the discrete logarithm problem. And the ...
Abstract: In Multiband Joint Detection (MJD) of wideband sensing, the most challenge is to set the optimal decision thresholds due to the non-convex nature of the problem. This paper proposes the Branch Reduce and Bound algorithm with Convex Relaxation (BRBCR)...
Abstract: In the context of the RF domain self-interference cancellation algorithms in the co-frequency and co-time full duplex system, the current research focuses mainly on the manually adjusting of self-interference parameters. To solve this problem, a RF d...
Abstract: Addressing the problem that the artificial noise method can be cracked by the eavesdropper with multiple antennas in wireless communication systems, a sufficient condition is proposed for secure physical layer transmission with finite alphabet inputs...
Abstract: In the light of the fact that the performance of the existing joint channel estimation and OFDM signals detection methods are poor, a novel joint channel estimation and OFDM signals detection algorithm using total least square is therefore proposed. ...
Abstract: A Physical-layer Network Coding (PNC) scheme based on Continuous Phase Frequency Shift Keying (CPFSK) modulation, i.e., CPFSK-PNC, for two-way relay channels is proposed. Compared with the current schemes of BPSK or QPSK for PNC, the CPFSK-PNC scheme...
Abstract: MultiUser Interference (MUI) caused by channel quantization error degrades the performance of the limited feedback-based multiuser Multiple-Input Multiple-Output (MIMO) systems. Antenna combining techniques can effectively improve the system performa...
Abstract: The main problems of the application of the Turbo equalizer in underwater acoustic communication are long time spread of channel and the multi-array processing. The union algorithm of time reversal and Markov Chain Monte Carlo (MCMC) equalization is ...
Abstract: For addressing the two focus issues under research , security authentication protocol and the multi-tag anti-collision algorithm in the field of Radio Frequency IDentification (RFID), a Code Division Multiple Access (CDMA)-based anti-collision algori...
Abstract: Energy efficiency and balance of sensor nodes in processing top-k queries can prolong the lifetime of wireless sensor networks. In this paper, an Energy-efficient and Balanced query Sampling Top-k algorithm named EBSTopk(,) is proposed, which is base...
Abstract: This paper presents an effective solution for personalized video recommendation based on the weight increment and similar aggregation user behavior analysis algorithm. The method is implemented in three steps: first, the user behavior is analyzed usi...
Abstract: Localization of sensor nodes is an important issue in Wireless Sensor Networks (WSNs), and positioning of the mobile nodes is one of the difficulties. To deal with this issue, a strong self-adaptive Localization Algorithm based on Gray Prediction mod...
Abstract: For large scale underwater sensor networks, the characteristics of underwater acoustic channel are investigated. A static beacon node based clock synchronization algorithm is presented for the nodes inside the beacon nodes coverage area, and a dynami...
Abstract: With the new electronic devices are increasingly used by airborne avionics equipment, Single Event Upset (SEU) fault has become a major hazard on aviation safety. Because of the randomness of SEU fault, the SEU fault occurs at any moments. Firstly, a...
Abstract: The effect of Digital BaseBand Converter (DBBC) sub-channel delay on bandwidth synthesis precision is analyzed under the condition of the consistent receiving system channel delay in order to improve the accuracy of bandwidth synthesis. Through a the...
Abstract: A novel planar beam steering parasitic array of planar printed dipoles is proposed, which can be used in the mobile terminals to improve communication quality and system capacity. The main beam can be controlled by the reactive loads on the parasitic...
Abstract: By utilizing the balanceable difference weight of high order Data Dependent Operations (DDO) and the high probability differentials of SPN structures, two 5-round related-key differentials of Eagle-128 are constructed. A full round related-key rectan...