Abstract: By taking into account of the prior information of the sparse signal and the additive noise encountered in the measurement process, the sparse recover algorithm under the Bayesian framework can reconstruct the coefficient better. However, the traditi...
Abstract: The target shape imaging algorithms receive great attention in applications of Ultra WideBand Through Wall (UWB-TW) radar, because it overcomes the shortcomings of real-time imaging and image quality in traditional Back Projection (BP) imaging algori...
Abstract: Under the effects of the initial perturbation and torque, the motion of the spin-stability spacecraft is the compound of nutation and precession, named quasi-regularized precession. The motion parameters estimation of the quasi-regularized precession...
Abstract: The existing vector weighted robust beamforming is able to estimate the signal power of target only in situations of a small steering angle error. For a larger steering angle error case, although the matrix weighted beamforming can effectively estima...
Abstract: The deceptive mainlobe jamming of airborne radar not only causes a large amount of false alarms but also contaminates samples of the Space-Time Adaptive Processor (STAP). Hence, the performance on clutter suppression is degraded and signal self-cance...
Abstract: Considering the urgent need of high precision motion parameter for SAR motion compensation in real-time, a motion compensation scheme using the Strapdown Inertial Navigation System/Global Positioning System (SINS/GPS) integrated system based on Rauch...
Abstract: The mission of imaging is usually not considered in existing resource scheduling strategies of phased array radar, and it is required to separate a fixed part of resources for target imaging. In this paper, the concept of cognitive imaging is introdu...
Abstract: An angle estimation algorithm based on fourth-order cumulants for distributed targets in monostatic Multiple Input Multiple Output (MIMO) radar is proposed in this paper, which could be used to deal with the problem of the performance declining in co...
Abstract: Based on the relationship between the velocities of 2D motion and the pose angle, a pose angle aided target tracking algorithm is proposed. In terms of target kinematics, the tracking models, in which the state vector includes pose information, are c...
Abstract: A systematic review of the phase error of the conventional airborne InSAR data processing method is firstly presented, which is caused by the center-beam approximation, and the unknown terrain, and its effects on imaging quality and height accuracy a...
Abstract: The sub-system composed of an element of the receiver array and the transmitter in Synthetic Aperture Sonar (SAS) is studied. Due to the double square rooted terms in the slant range history of the sub-system, the fourth-order Taylor expansion is use...
Abstract: The performance of direction finding of traditional MUltiple SIgnal Classification (MUSIC) method decreases sharply in the presence of sensor mutual coupling. In order to estimate effectively Mutual Coupling Matrix (MCM) of array and Direction Of Arr...
Abstract: Recently, a class of tracking techniques called tracking by detection receive much attention in computer vision. These methods train a discriminative classsifier to separate the object from the background. The classifier bootstraps itself by using th...
Abstract: Person re-identification, identifying the same persons images in an existing database come from non-overlapping camera views, is a valuable but challenging task. This paper proposes a statistical inference approach for person re-identification. A sim...
Abstract: Few traditional road edge detection algorithms can be employed in rural road. An edge detection method based on vanishing point iteration revaluation is presented in this paper. Firstly, the texture orientation of pixel is estimated by Gabor filter, ...
Abstract: In view of practical application of the target detection based on sensor networks, the remote target detection model is established. This paper addresses a novel Fusion Rule for Small-scale Sensor networks (FRSS) under the Neyman-Pearson criteria. Th...
Abstract: The prediction of airport noise plays an important role in airport noise control, flight schedule planning and surrounding designs of airport. However, the existing prediction models are complex and need so many highly accurate parameters that are mo...
Abstract: This paper presents a new Direction-Of-Arrival (DOA) and power estimation algorithm based on two-stage weighted L1-norm penalty. In this scheme, this paper first obtains a better statistical performance vector measurement model by sum-average arithme...
Abstract: The definition of ideal access structure of XOR-based visual cryptography is given in this paper. The characteristics of ideal access structure are analyzed, and the construction algorithm of shares under ideal access structure is designed. Based on ...
Abstract: As an important method of Side Channel Attacks (SCA), fault attacks offer the attacker plenty of possibilities to attack a cryptosystem, and nearly all the cryptographic algorithms are broken by using such kinds of attacks. So far many countermeasure...
Abstract: The Nonlinear Feedback Shift Register.(NFSR) is one of hot topics of stream cipher in recent studies. The uniqueness of a NFSR assuming to be decomposed into a cascade connection of smaller NFSRs is discussed in this paper. Firstly, the decomposition...
Abstract: SHACAL-2 algorithm is one of the standard block ciphers recommended by European NESSIE plan. It includes two kinds of nonlinear functions, the choice function and the major function. This paper studies mainly differential properties of the two nonlin...
Abstract: It is of great importance to guarantee the privacy of the database and users when the database is being queried. A private database queries protocol based on a quantum Third Party (TP) is proposed by utilizing the quantum correlation of three-photon ...
Abstract: This paper focuses on the energy-efficient power allocation in OFDMA systems. Different from the existing work, this paper proves that the optimal energy-efficient power allocation must have a special water-filling structure, named energy-efficient w...
Abstract: In cooperative spectrum sensing, previous numerical studies show that the sensing performance and the throughput of channel can be improved by increasing the secondary users which are participate in cooperative sensing. Due to the existence of channe...
Abstract: In cognitive radio network, the underlay coexistence problem of the OFDMA based Secondary System (SS) with LTE-A systems is more and more important. This paper focuses on the resource allocation and interference mitigation issues in the aforementione...
Abstract: A spectrum sensing algorithm based on covariance matrix and array antenna is reported. It can perform blind spectrum sensing under a condition of uncertainty noise. The new test statistics for spectrum sensing based on the covariance matrix is constr...
Abstract: High Efficiency Video Coding (HEVC) adopts a quadtree-based Coding Unit (CU) block partitioning structure which is flexible to adapt to various texture characteristics of images and can improve the coding efficiency significantly; however, it also in...
Abstract: Most existing wireless network coding mechanisms do not consider the impact of wireless link quality on video transmission, resulting in the degradation in video quality. To address the above issue, this paper proposes an Optimized Opportunistic Netw...
Abstract: Along with the growing expansion of network functions and continuous emerging of new protocols, the novel packet types and processing requirements are established in these protocols. The Software Defined Networking (SDN) makes the network innovation ...
Abstract: To deal with the issue that the interference increasing will make network capacity decrease and energy consumption increase in Wireless Sensor Network (WSN), the joint channel allocation and power control optimal game-theoretic model is established. ...
Abstract: Crucial node decision plays an important role during the network survivability study. Taking into account the node energy is limited, this study consider both the remaining life of the network and the added value of network energy consumption due to ...
Abstract: As for the interest flooding attack in Content-Centric Networking (CCN), this study proposes a new approach to mitigate interest flooding attack based on abnormal name prefix identification. This study utilizes the forwarding state in CCN routers to ...
Abstract: Data aggregation is one of the most important approaches to alleviate the bottlenecks of resource in the Wireless Sensor Networks (WSNs). However, it is vulnerable to the attacks directing toward data confidentiality and integrity in an open and hete...
Abstract: Many applications of Internet of Things (IoT) are performed by the continuous stream processing of the senor data and nodes replicas are required to guarantee system availability. However, the replicas backup and placement often bring the processing ...
Abstract: The performance of optically controlled phased array antenna is greatly improved by the optical phase- shifting network with its advantages of broad bandwidth and high precision, however the additional phase noise of the optical phase-shifting networ...
Abstract: Microwave over-the-horizon radar can detect long distance and low altitude targets by means of the evaporation ducts over sea, however, the super refraction and multi-path propagation effects produce radar blind areas in evaporation duct where target...
Abstract: In order to adapt to the requirement of the modern dual-band communication system, this paper presents a novel dual-band high gain antenna by adding an annular metal cylinder to the aperture in the center based on enhanced microwave transmission prop...
Abstract: The current wireless Network Coding Relaying (NCR) is based on XOR operation or superposition operation, this paper proposes an Amplify-and-Forward NCR (AFNCR) cooperative scheme based on the multiplication operation. The relay node realizes the anal...
Abstract: Attribute signature attracts much attention due to the large-scale applications of cloud computing. Sensitive information in the document needs to be hidden in cloud computing environment, and Attribute Based Sanitizable Signature (ABSS) scheme in cl...