Abstract: Increasing integration time is a main approach to improve performance of passive radar, but the range and Doppler migration may occur for high-speed and accelerated targets, and for non-uniform sampled signal in the slow time such as China mobile mul...
Abstract: Truth table is an important tool to represent the logic causal relationships between inputs and outputs. The reduction of the truth table is of great significance in analysis and design of digital logic circuit. In this paper, the MIMO truth table is...
Abstract: This paper presents a high-resolution imaging method based on Sparse Bayesian Learning (SBL) for passive radar compressed sensing imaging. Under the one-snapshot echo model, the proposed method firstly takes account of the frequency-dependent statist...
Abstract: The transient interference can dramatically degrade the performance of over-the-horizon radar. The traditional interference suppression methods need to suppress the sea clutter, and only can suppress the strong transient interference, not mitigate th...
Abstract: A beampattern design method for the airborne Multiple Input Multiple Output (MIMO) radar based on the prior information is proposed to suppress the sidelobe clutter in the non-homogeneous clutter environment. Using the two Dimensional (2D) prior info...
Abstract: Non-sidelooking array configuration leads to heterogeneous airborne radar echo data, it degrades seriously the clutter suppression performance of the traditional Space-Time Adaptive Processing (STAP) algorithms. To solve this problem, a heterogeneous...
Abstract: To handle the small sample support problem under the heterogeneous clutter environment, a fast convergence Space-Time Adaptive Processing (STAP) algorithm based on low-rank approximation of the weight matrix is proposed. Unlike the traditional Low-Ra...
Abstract: Active radar stealth technology is an important branch of target radar signature control technology (which is also called as stealth technology). A quantitative analysis is made for an active radar stealth device mentioned in a United States patent, ...
Abstract: This paper proposes a new signal reconstruction method for the signals with missing samples obtained by narrow-band radar. For the narrow-band radar system, the target echoes can be assumed to follow the complex Gaussian distribution. Based on this p...
Abstract: The wideband cross-ambiguity function method is commonly adopted to execute the parameter estimation of wideband noise radar, but it needs three-dimensional search in distance, velocity and acceleration when dealing with maneuvering targets, which ta...
Abstract: The extraction of the procession and structure parameters for ballistic targets is a critical point for success of the ballistic target identification. This paper proposes a method to deduct the procession and structure parameters of a cone target ba...
Abstract: The Random Pulse Repetition Interval Radon-Fourier Transform (RPRI-RFT) is proposed for long-time echo pulses coherent integration and Blind Speed Side Lobe (BSSL) suppression, which makes it a good resolution for low SNR target detection and paramet...
Abstract: Based on the equivalent scatter point model, the relationship between the micro-Doppler frequencies and the motion parameters of the cone-shaped target with precession is established. Due to the approximately sinusoidal form of the micro-Doppler freq...
Abstract: On the condition of a high Pulse Repetition Frequency (PRF) mode, radars may suffer from range ambiguity, which poses a significant challenge to detecting and tracking weak targets. To address this problem, a novel approach, which can handle ambiguou...
Abstract: For the issue that the range spread targets got from the wideband radar signal are difficult to integrate for detect by the large velocity of target, a Hough Transformation Detector (HTD) is developed. Adjoin high resolution radar range profiles of r...
Abstract: Multi-baseline phase unwrapping problem can be solved according to find the optimal solution of the L1-norm optimization. However, there are two problems: one is the huge memory required and the other is the difficulty in processing interferograms wi...
Abstract: In the wide-field and super high-resolution spaceborne Synthetic Aperture Radar (SAR), the traditional hyperbolic slant range model is no longer available, which is due to the variance of equivalent velocity in azimuth direction is able to cause azim...
Abstract: In this paper, the tradition change detection method based on local statistical feature is expanded to two-dimensional feature space, and a SAR image change detection method based on comparison of two-dimensional probability density functions is prop...
Abstract: Endmember extraction methods based on geometric?distribution of hyperspectral images usually divide into projection algorithm and the maximum volume formula for simplex, which the former has lower computational complexity and the latter has better pr...
Abstract: When using a Choi-Williams Hough (CWH) transform to estimate the parameters of the Linear Frequency Modulated Continuous Wave (LFMCW) signals, the signal observation time is longer than a period, the output SNR at the true parameter value does not in...
Abstract: A novel video stabilization algorithm based on preferred feature trajectories is presented. Firstly, Harris feature points are extracted from frames, and foreground feature points are eliminated via K-Means clustering algorithm. Then, the effective f...
Abstract: For the mosaic algorithm of traditional panoramic image, the Harris corner extraction or the Scale-Invariant Feature Transform (SIFT) feature matching are the most commonly used methods for resolving the parts of image overlap. But for the vehicle pa...
Abstract: To improve the lower limb surface ElectroMyoGraphic (EMG) gait recognition accuracy and real time performance, this paper deals with a pattern recognition method for optimizing the Support Vector Machine (SVM) by using the Particle Swarm Optimization...
Abstract: To reduce side effects of background information included in the outer parts of tracking rectangular boxes, a weighted block compressed sensing feature extraction method is proposed based on normalized gradient features. The compressed sensing measur...
Abstract: For lack of effective methods used by the traditional immune network algorithms to guide the memory cell determination, a dynamic recognition neighborhood based immune network classification algorithm is proposed. The algorithm uses a kernel function...
Abstract: In order to reduce the computational complexity, an improved decoding algorithm based on a layer-wise decomposition transform is proposed for Reed-Solomon (RS) codes in this paper. Firstly, the received codewords are split into a number of sub-sequen...
Abstract: The downlink transmission performance of the massive MIMO Time Division Duplex (TDD) system is bottlenecked by the channel reciprocity errors called antenna reciprocity errors. Antenna reciprocity errors are hard to be calibrated completely in practi...
Abstract: The security performance of the communication system degrades dramatically when the covariance- based Channel State Information (CSI) is imperfect at the transmitter. To overcome this problem, a robust Artificial Noise (AN) aided transmit method is p...
Abstract: In the multi-cell MIMO (Multiple-Input Multiple-Output) cooperative communication system, the performances of outage probability and network throughput of interference alignment applied by the cooperative Base Stations (BSs) and users are investigate...
Abstract: FlexRay is becoming the in-vehicle communication network of the next generation. To resolve the problem of Frame IDentification (FID) assignment in the FlexRay Static Segment Scheduling (FSSS), an Automatic Model Coefficient Matrix Generating (AMCMG)...
Abstract: In order to compensate the outage cell autonomously, this paper derives a solution for Cell Outage Compensation (COC) in Self-Organizing Networks (SON) which is based on the joint adjustment of power and tilt. Firstly, the paper takes the power and t...
Abstract: Based on distributed networks of the Super-Peer Architecture (SPA), this paper proposes Efficient Method for Skyline Recommendation in Distributed Networks (EMSRDN), to handle u skyline recommendation instructions by prestore w skyline snapshots. The...
Abstract: How to mitigate the privacy attacks related to the ubiquitous presence of caching poses challenges to the content delivery in Content Centric Networking. On the basis of trade-off between content distribution performance and users privacy, a collabor...
Abstract: Multicast is a widely applied communication technology. Multicast source authentication is an important problem in multicast security. Especially, it is a big challenge to implement the multicast source authentication in a noisy channel. In order to ...
Abstract: To deal with the problem of signal estimation for Wireless Sensor Networks (WSN) in a untrustworthy environment where malicious nodes tamper the measured data, two reputation-based algorithms, that are, Reputation-based diffusion Least Mean Square (R...
Abstract: In application of RFID (Radio Frequency IDentification), security threats are on the rise. The demand for the privacy protection of tag is becoming more and more urgent. In RFID system, the privacy protection is against not only the outside attacker,...
Abstract: To meet the watermarking requirement in encrypted domain, a novel scheme for robust and separable watermarking in encrypted image is proposed based on Compressive Sensing (CS). Firstly, the content owner divides the original image into non-overlappin...
Abstract: Tapered finline array plays an important role in waveguide-based spatial power combiner. This paper presents a simplified model of tapered finline array by taking it as a tapered TE mode wave impedance transformer. The spectral domain admittance meth...
Abstract: Aiming at the essential problems of the design of adaptive spatial steganography, this paper proposes an adaptive spatial steganographic algorithm without synchronizing the side information, combining with Cannys edge detection algorithm and the Synd...