Abstract: The type and scale of data has been promoted with a hitherto unknown speed by the emerging services including cloud computing, health care, street view services recommendation system and so on. However, the surge in the volume of data may lead to man...
Abstract: In order to solve the selfishness problem that forwarding nodes in the wireless ad hoc network refuse to cooperation due to the limit of energy and storage space, a wireless ad hoc network cooperation enhancement model combined with the game theory i...
Abstract: To address the contradiction between data aggregation and data security in Wireless Sensor Networks (WSNs), a recoverable privacy-preserving integrity-assured data aggregation scheme is proposed based on the technologies of privacy homomorphism and a...
Abstract: Matching prediction with high accuracy of entity state can cansignificantly improve the efficiency of content-based search in the Internet of Things and reduce communication overhead while searching. The equal-interval and during the period entity st...
Abstract: As current kernel malware detection method based on data signature exists the problem that its efficiency decreases with the growth of the number of signatures, a signature selection method for kernel malware based on hierarchical cluster is presente...
Abstract: To make the generalized interger transform used for lossless information hiding more generalized and improve the data embedded capacity, a new lossless information hiding method based on expanded generalized integer transform is proposed for image. B...
Abstract: Certificateless aggregate signcryption not only can ensure the confidentiality and authentication of information transmission, but also can reduce the cost of data communication and the verification of ciphertexts. Through analyzing some existing cer...
Abstract: The security of MD-64 block cipher under related-key rectangle attack is studied. Firstly, when the weight of input difference is 1, the differential properties of high order DDOs (Data Dependent Operations) and SPN structures are researched. By the ...
Abstract: With the rapid development of high-speed railway, the railway mobile communication system has more demands on the handover delay and handover success rate. This paper proposes an advance trigger handover algorithm based on the speed in LTE-R. It is d...
Abstract: Considering the problem of real-time distributed cooperative spectrum detection of cognitive users, a real-time distributed cooperative spectrum detection algorithm based on diffusion strategy is proposed. Global cost function can be approximated by ...
Abstract: In order to eliminate the narrowband limit of stochastic resonance system, and to complete the digitized receiving of linear frequency modulation signal with high gain, a method based on the frequency setting of received digital samples is proposed. ...
Abstract: Based on the modeling of transmission rate maximization problem for Orthogonal Frequency Division Multiplexing (OFDM) underwater acoustic communication, the computing amount for water-filling algorithm is reduced reasonably, which realizes rapid assi...
Abstract: The sampling system based on Gabor frames with exponential reproducing windows holds nice performance for short pulses in general cases, but when the frames are highly redundant, the traditional coefficient oriented methods for subspace detection may...
Abstract: By analyzing the signal model of the Incoherently Distribute Source (IDS), a sparse representation based parameter estimation method of IDS is presented. Through using the Toeplitz characteristic and the two point approximation model as well as the J...
Abstract: As the beamforming of Nonuniform Linear Array (NLA) may occur grating lobes phenomenon, a beamforming method is proposed for working on the NLA with consecutive difference coarray. Firstly, this method analyzes the array optimization of the NLA based...
Abstract: Outlier detection, also called anomaly detection, is an important issue in pattern recognition and knowledge discovery. Previous outlier detection methods can not effectively control the false-alarm probability. To solve the problem, a supervised met...
Abstract: To overcome the problem that the deficiency of the appearance model and the motion model often leads to low precision in original Multiple Instance Learning (MIL), a target tracking algorithm is proposed based on multiple instance deep learning. In o...
Abstract: Transfer learning usually focuses on dealing with small training set in target domain by sharing knowledge generated from source ones, in which one main challenge is divergence metric of distributed samples between training and test data. In order to...
Abstract: Determining cameras next best view is a difficult issue in visual field. A next best view approach based on depth image of visual object is proposed by using occlusion and contour information in this paper. Firstly, the occlusion detection is accompl...
Abstract: In view of the problem of target echoes interfered by strong direct path-wave in bistatic sonar, a high resolution algorithm of direct path interference suppression is proposed when the deployment is known. The method divides the space of N dimension...
Abstract: A novel wideband signals Direction-Of-Arrival (DOA) estimation method based on sparse representation is proposed. This algorithm can reduce the storage and calculation of the traditional sparse representation methods in wideband signals process, whic...
Abstract: The traditional sparse ISAR imaging method mainly considers the recovery of coefficients on individual scatters. However, in the practice situation, the target scatters presented by blocks or groups do not emerge on individual. In this case, the usua...
Abstract: The angle tracking loop in airborne radar facing to a maneuvering target plays a vital role in the joint 3D-tracking of range, velocity and angle. This paper analyses the disadvantage of the conventional Kalman filter algorithm employed to track a ma...
Abstract: The issue of position error estimation for transmit and receive array of a bistatic Multiple-Input Multiple-Output (MIMO) radar is investigated, and an algorithm for the joint estimation based on clutter echo is proposed. The algorithm is based on th...
Abstract: To reduce estimation error caused by high correlation level of two transmitted waveforms, a novel method is proposed to design a couple of waveforms with low correlation level, named Phase Only Spectral Approximation Algorithm (POSAA). Firstly, the o...
Abstract: High velocity and Ionosphereic both modulate the phase of low carrier frequency wide-band linearly frequency modulated radar signal , It make the resolution of Inverse SAR (ISAR) image lower. In order to get clean ISAR image, the effect of high veloc...
Abstract: Range migration is the basic and troublesome problem in moving target detection for wideband radar. To solve this problem, a detection algorithm of moving targets based on joint-sparse recovery is proposed for wideband radar. Firstly, a prewhitening ...
Abstract: Long integration is often required to detect weak moving target in sea clutter. However, the Doppler frequency spread and amplitude fluctuation in long integration and limited reference cells resulting from spatial non-homogeneity of sea clutter make...
Abstract: A Non Local Means (NLM) filtering based on Homogeneous Pixels Preselection (NLM-HPP) is proposed to solve the problem of preserving structural feature and polarimetric scattering properties in speckle reduction of Polarimetric SAR (PolSAR) images. Fi...
Abstract: Compressed Sensing (CS) reconstruction of hyperspectral images driven by spatial-spectral multihypothesis prediction is proposed in order to take full advantage of spatial and spectral correlation of hyperspectral images. The hyperspectral images are...
Abstract: This paper presents a robust optimal guidance control law for precise three-dimensional (3D) trajectory tracking of an Unmanned Aerial Vehicle (UAV) in wind disturbance. The wind disturbance is considered in the UAVs kinematic model. The reference pa...
Abstract: Exact and real-time kinematics model plays a very important role in the mobile robot motion control and path planning. Compared to the off-line model estimation, based on an Instantaneous Centers of Rotation (ICRs) based kinematic model of skid-steer...
Abstract: The theory of near-field to far-field transformation using spherical-wave expansions is the key to implement the spherical near-field antenna measurement system. It can develop the field in the space which is built by antenna expanding into the sum o...
Abstract: With deep understanding of the characteristics of And-Inverter Cone (AIC), an alternative logic element for FPGA, a series of improvements are proposed to get an optimized interconnect architecture inside the logic cluster. The enhancements include r...
Abstract: In this study, a complex-valued Joint Approximate Diagonalization of Eigen-matrices (JADE)- Independent Component Analysis (JADE-ICA) algorithm is proposed for the Polarization Division Multiplexed in Optical Orthogonal Frequency Division Multiplexin...
Abstract: To deal with the problem of the serious speckle or composite speckle noise in the image of the strong reflection surface, an image denoising algorithm based on fractional differential enhancement is proposed, which can highlight the granular characte...