Abstract: Efficient and accurate spectrum sensing is a necessary part in cognitive radio network. This paper focuses on the spectrum sensing in MIMO environment. Based on the fact that the correlation structure of the received signals is different between the ...
Abstract: In the context of multi-tap self-interference cancellation in the multipath channel in the Co-time Co- frequency Full Duplex (CCFD) system, the current studies focus on the experimental verification technologies in the RF-domain self-interference can...
Abstract: In this paper, a new distributed beamforming technique for relay networks in frequency selective channels is proposed. The relay network consists of one transmitter, multiple relays and one receiver. To equalize the transmitter-to-relay and relay-to-...
Abstract: Two-way relay cooperative communication system demonstrates significant gain in spectral efficiency when two user nodes exchange information via a relay node. For improving the Bit Error Rate (BER) performance, a joint precoding and detection algorit...
Abstract: In this paper an approach of eigen-decomposition and Chirp Z Transform (CZT) for DSSS signals with unknown carrier frequency under narrow band interferences is proposed to estimate the PN sequence.The period and chip rate of PN sequence need to be kn...
Abstract: Most of the existing research on Physical-layer Network Coding (PNC) is based on the assumption that the symbol timing at the relay is ideally synchronized, and rarely discusses the issue of symbol synchronization. However, in practice, the symbol ti...
Abstract: For a long time, the circularity of the tail-biting trellis is ignored in conventional decoding algorithms of Tail-Biting Convolutional Codes (TBCC). This kind of algorithm starts decoding from the fixed location, and consequently exhibits relatively...
Abstract: Efficient Error Control Coding (ECC) can be used to enhance the stability and energy efficiency of Wireless Sensor Networks (WSNs). In order to deal with high bit error probability due to poor channel environment in WSNs, the paper study the error co...
Abstract: In order to solve the problems of the low accuracy and the high energy cost by the existing abnormal event detection algorithm in Wireless Sensor Networks (WSN), this paper proposes an abnormal event detection algorithm based on Compressive Sensing (...
Abstract: Since the conflict between the limitation of measurement resources and the diversity of measurement requirements becomes more and more serious, this paper models the issue of measurement task deployment and proposes a new deployment algorithm based o...
Abstract: The network traffic measurement and anomaly detection for high-speed IP network become the hotspot research of network measurement field. Because the current measurement algorithms have large estimation error for the mice flows and poor performance f...
Abstract: There is a great challenge in the data stream clustering due to a limitation of time and space. In order to solve this problem, a new fuzzy-clustering algorithm, called Weight Decay Streaming Micro Clustering (WDSMC), is presented in this paper. The ...
Abstract: Classification is a supervised learning. It determines the class label of an unlabeled instance by learning model based on the training dataset. Unlike traditional classification, this paper views classification problem from another perspective, that...
Abstract: Due to the deficiencies in prefetch distance controlling of most threaded data prefetching methods for pointer application, a prefetch distance control strategy based on the cache behavior characteristics is proposed. In this paper, the prefetch dist...
Abstract: Currently the application research of compressive measurements is still focused on the image recovery, but the ultimate purpose is a task of target detection and tracking in many special applications. And the issue performing target detection and tra...
Abstract: To solve the problem that the tracking algorithm often leads to drift and failure based on the appearance model and traditional machine learning, a tracking algorithm is proposed based on the enhanced Flock of Tracker (FoT) and deep learning under th...
Abstract: The existing subspace tracking methods have well solved appearance changes and occlusions. However, they are weakly robust to complex background. To deal with this problem, firstly, this paper proposes an online discrimination dictionary learning mod...
Abstract: In order to avoid the loss of background and spatial information in mean shift tracker, a dual-kernel tracking approach based on the second-order spatiogram is proposed. In the method, the second-order spatiogram is employed to represent a target, th...
Abstract: For the consideration of the multiple copy-move forgery detection of digital images, and to avoid missing the matching feature points when generalized 2 Nearest-Neighbor (g2NN) algorithm is applied, Reversed generalized 2 Nearest-Neighbor (Rg2NN) alg...
Abstract: The Iteration-based Variable Step-Size LMS (IVSSLMS) algorithm is proposed to overcome the compromise between the convergence speed and the steady-state misadjustment error, which cannot be handled in Fixed Step-Size LMS algorithm (FXSSLMS). This alg...
Abstract: Considering the influence of the projection matrix on Compressed Censing (CS), a novel method is proposed to optimize the projection matrix. In order to improve the signals reconstruction precise and the stability of the optimization algorithm of the...
Abstract: The conventional magnitude constraints beamformer is a non-convex issue which is reformulated as a linear programming issue. A robust beamformer with Phase response Fixed and Magnitude response Constraint (PFMC) is proposed for Uniform Linear Array (...
Abstract: For distributed aperture coherent radar of general signal processing architecture, the estimating performance of time delay differences and phase differences, and the output Signal to Noise Ratio gain (oSNRg) based on cross-correlation are studied in...
Abstract: Aiming at the problem that different Ground-Based Radar (GBR) deployment way influences the detection performance to the near-space hypersonic target, the near-space hypersonic target model and GBR detection model are established. On the basis of tar...
Abstract: Aiming at the problem of complex range processing and strong azimuth variant in GEosynchronous Orbit SAR (GEO SAR) imaging processing, an imaging algorithm based on Chirp_z transform and the azimuth scaling is proposed. Firstly, the stop-go-stop phas...
Abstract: Due to the skew Region Of Support (ROS) of the two-dimensional wavenumber domain for high squint SAR data, conventional Omega-K algorithm can not exploit the ROS efficiently enough and degrades the resolution when choosing the square region to proces...
Abstract: If the azimuth angle between the interference and the detected target is small, the energy of the received signal reflected by the target may have a great loss when the interference is cancelled for an omni-directional VHF radar with single circular ...
Abstract: A modified model-based method is proposed to obtain sufficient prior templates and reduce the computational complexity on Synthetic Aperture Sonar (SAS) automatic target recognition. First, a quick method based on build convex hull is proposed to est...
Abstract: According to the feature that the underwater target radiated noise contains high intensive and stable line spectrum, a weighted line spectrum detection method based on the instantaneous phases variance is proposed with regard to the problem of unknow...
Abstract: Exploring a new logic element of Field Programmable Gate Array (FPGA) is always a key field in FPGAs research, while And-Inverter Cones (AIC) is the most promising one. Implementing a highly-efficient and highly-flexible mapping tool is also an impor...
Abstract: Parameters of the Ultra-High-Frequency Radio Frequency IDentification (UHF RFID) tags and the mutual coupling effect have great impact on antenna gain, and a corresponding theoretical model is developed. Firstly, from the perspective of the radiation...
Abstract: In the Cognitive Radio (CR) networks, the detection performance of Primary Users (PU) randomly arriving during the sensing period is poor. So, an improved spectrum sensing method exploiting the cyclostationary feature is proposed, which adds the seco...
Abstract: For the problems of reduced secrecy rate and energy according to noncooperation of selfish relay, this paper presents a security coalition method based on the game theory. Firstly, this paper introduces a benefit-sharing mechanism of cooperative game...
Abstract: Packets in ICWN (Intermittently Connected Wireless Network) are delivered in a cooperation manner between nodes, which means the existence of malicious nodes will degrade the network performance. A malicious node tolerant message forwarding mechanism...
Abstract: For tackling the deficiencies of weak adaptability due to the singleness of the role establishment method, role or privilege redundancy, and little attention on resource management in the existing Role-Based Access Control (RBAC) researches, a Scalab...
Abstract: In this paper, with the purpose of sorting frequency-hopping networks, identifying and tracking signals, a joint estimation of Direction Of Arrival (DOA) and polarization for multiple frequency-hopping signals is carried out in underdetermined condit...
Abstract: For the several kinds of pseudo-random code modulated pulse trains-the Pseudo-Random Binary Code (PRBC) pulse train, including the Pulse Position Modulation (PPM) pulse train, the Pseudo-Random Binary Code and Pulse Position Modulation (PRBC-PPM) pul...
Abstract: The accuracy of the radial velocity estimated by the airborne Along-Track Interferometric SAR (ATI-SAR) is affected by the accuracy of different system parameter, such as the interferometric phase biases and the baseline components errors. Therefore,...
Abstract: In Synthetic Aperture Radar-Ground Moving Target Indication (SAR-GMTI) processing, it is difficult to solve the Range Cell Migration (RCM) and azimuth defocusing problems simultaneously since the motion parameters of each moving target is different, ...