Abstract: To improve the correct radar emitter recognition rate in cases that radar emitter characteristic parameters are overlapped with each other and existence of multiple modes, a DSm (Dezert-Smarandache) evidence modeling and radar emitter fusion recognit...
Abstract: In heterogeneous clutter environments, Space-Time Adaptive Processing (STAP) shows notable performance degradation for lacking sufficient Independent Identically Distributed (IID) training samples. To solve this problem, a STAP approach is proposed b...
Abstract: Conventional matched filtering based algorithms are not sufficiently good at dealing with the anisotropic backscattering behavior of targets in Wide Angle SAR (WASAR) imaging. Sparse signal processing provides a new idea for this problem, the anisotr...
Abstract: By adjusting the transmitting time and the initial phase of distributed radar antennas, the spatial distribution of signal energy transmission can be controlled and then the signal energy can be improved in the spatial region of interest. The fundame...
Abstract: Fast Factorized Back-Projection (FFBP) is originally developed for Ultra-WideBand (UWB) Synthetic Aperture Radar (SAR), and it shows great success for spotlight SAR signal processing. However, its implementation is not straightforward for stripmap SA...
Abstract: The ordinary full-aperture SAR imaging algorithms are inapplicable to focus high squint diving SAR subaperture data due to its property of vertical velocity which brings variance in azimuth. Based on the equivalent squint model and the characteristic...
Abstract: Target decomposition is an important tool to realize target classification, detection and recognition applications with Polarimetric SAR (PolSAR). However, the traditional method with priority of volume scattering component extraction seriously perfo...
Abstract: In order to solve the issue of two dimensional angles estimation for MIMO radar with L-shaped array, two novel reduced-dimensional Direction Of Arrival (DOA) estimation methods using ESPRIT algorithm are proposed. Firstly, through the reduced-dimensi...
Abstract: Circular SAR (CSAR) high resolution imaging requires a more accurate and stable Inertial Navigation System (INS), therefore motion compensation is one of the key technologies. In this paper, the phase error caused by trajectory measurement error is f...
Abstract: In Over-The-Horizon Radar (OTHR), the maneuvering target detection algorithms based on time- frequency analysis methods have the advantage of low signal to noise ratio requirement and high parameter estimation precision. However, the calculation amou...
Abstract: In the application of planning and management of the limited resources of radar, the fluctuation of the targets Radar Cross Section (RCS) area will have a significant impact on the effects of allocation of resources. For this problem, this paper puts...
Abstract: The classical multi-sensor anti-bias association algorithms require complex calculation procedure, can not be used in real-time condition, for instance the algorithms based on image matching and reference topology feature. On the basis of tracks dist...
Abstract: A moving ship detection method is presented for ocean moving objects detection of remote sensing satellite in geostationary orbit. First, the multi-structural and multiscale element morphological filter is used to suppress background information of o...
Abstract: In order to meet the requirement for measurement and detection of complex missile targets, a complex missile model with empennages is established and its scattering characteristics are studied under the conditions of the missile irradiated by extreme...
Abstract: The Multiple Measurement Vectors (MMV) problem addresses the recovery of unknown input vectors which share the same sparse support. The Compressed Sensing (CS) has the capability of estimating the sparse support even in coherent cases, where the trad...
Abstract: A novel algorithm is proposed for Two-Dimensional (2D) Direction Of Arrival (DOA) estimation issue with L-shaped array. By introducing an auxiliary electrical angle, 2D-DOA estimation problem is solved by two-step 1D-DOA estimation. Firstly auxiliary...
Abstract: In view of the poor performance of traditional Direction of Arrival (DOA) methods at low signal-to-noise ratios, an improved MUltiple SIgnal Classification (MUSIC) algorithm for DOA estimation applied to active detection system based on covariance ma...
Abstract: Image interpolation is a basic issue in digital image processing, which can be used to realize image magnification and restoration, etc.. Traditional interpolation methods are easy to make the edge structures produce staircase artifacts or make the i...
Abstract: For the linear discrete time multisensor system with uncertain model parameters and noise variances, a Covariance Intersection (CI) fusion robust steady-state Kalman filter based on the minimax robust estimation principle is presented. Firstly, intro...
Abstract: Researchers have done a great number of studies on the object recognition and the video coding transmission respectively. However, there are still no public reports about the influence on the object recognition raised by the video encoding parameters...
Abstract: In order to address the non-rigid deformation (e.g., misalignment, poses, and expression) of facial images, this paper proposes a novel sparse representation face recognition algorithm using Dense Scale Invariant Feature Transform (SIFT) Feature Alig...
Abstract: The Viterbi decoding algorithm is widely used in the wireless digital communication system, generally using the bit Log-Likelihood Ratio (LLR) as its input. For an M-ary Frequency Shift Keying (M-FSK) signal, a corresponding Viterbi decoding algorith...
Abstract: An algorithm to recover a Turbo-code interleaver is proposed at high Bit Error Rate (BER), and it is applied to the 1/3 parallel concatenated Turbo-code. The recognition of channel coding plays an important part in the field of non-cooperative signal...
Abstract: A novel scheme named EWF-RLT codes, which produces Unequal Error Protection (UEP) for Luby Transform (LT) codes over Additive White Gaussian Noise (AWGN) channel by using a windowing technique before regularizing variable-node distribution, is propos...
Abstract: Faced with the complex environment of deep space communication, the adaptive capacity can have an impact on the ability of the Low Density Parity Check (LDPC) code decoder to maintain long-term stability. This paper proposes a design method of dynami...
Abstract: Redundant Residue Number System (RRNS) is widely used in communication systems for WLAN (Wireless LAN) and CDMA (Code Division Multiple Access) etc. due to its strong ability to enhance robustness of information in parallel processing environments. E...
Abstract: To combat the effect of InterSymbol Interference (ISI) while transmitting data over wireless fading channels, the issue of single carrier communication signal receiving with multiple antennas is studied and an iterative frequency domain combining equ...
Abstract: Most interference alignment algorithms assume that the senders know perfect Channel State Information (CSI), but in practical communication systems, due to the channel estimation error, the delayed feedback and so on, the CSI often exists the error. ...
Abstract: In order to address the problem of reducing the resources of transponder and spectrum in flexible grid optical networks, a lightpath circle mechanism is studied for many-to-many multicast requests, and a method of optical grooming is proposed based o...
Abstract: To analyze the immunity of ZUC stream cipher in aspect of correlation power analysis attack, some relevant researches are conducted. In order to improve the pertinence of attack, a rapid assessment method of the attack scheme is presented, and accord...
Abstract: By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed wit...
Abstract: Using the hard assumption of Ring-Decision Learning With Errors (Ring-DLWE) in the lattice, a new Authenticated Key Exchange (AKE) scheme is proposed, which is based on the Peikerts reconciliation technique. Under the standard model, the proposed sch...
Abstract: Since the F5 algorithm is proposed, a bunch of signature-based Gr?bner basis algorithms appear. They use different selection strategies to get the basis gradually and use different criteria to discard redundant polynomials as many as possible. The st...
Abstract: The security of certificateless signature scheme which was proposed by He et al. (2014) is analyzed, and the security of the certificateless aggregate signature scheme which was proposed by Ming et al. (2014) is analyzed too. It is pointed out that t...
Abstract: The method of secure communications is the critical techniques for Wireless Sensor Networks (WSNs) to guarantee the routing information security in the process of transmission. But most of wireless sensor network routing protocol have problems involv...
Abstract: Cloud computing data centers generally consist of a large number of servers connected via high speed network. One promising approach to saving energy is to maintain enough active severs in proportion to system load, while switch left servers to idle ...
Abstract: For the protocol headers of wireless network data prone to errors, this paper puts forward with a bit-flip subset restriction header recovery algorithm after studying the one based on Cyclic Redundancy Check (CRC). A constraint subset of the received...
Abstract: The energy optimized virtual network embedding problem in the substrate network with heterogeneous nodes is not to minimize the number of working nodes and links. The load-based energy consumption models of the node and link in the substrate network ...
Abstract: Compressive sensing has a preliminary application to the field of Tracking, Telemetry, and Command (TTC) and communication, which can effectively decrease sampling and data rate, but there is a contradiction between the real-time requirement and the ...