Abstract: MIMO radar is an emerging radar system that has significant potential. MIMO radar can provide high resolution and real-time imaging solution. Because of the sparsity of the observation zone, the task of MIMO radar imaging can be formulated as a probl...
Abstract: Recently, the Compressed Sensing (CS) theory becomes the researching hot point in SAR imaging. The Multiple Measurement Vectors (MMV) model of CS theory can be used to effectively represent the jointly sparse signals, and it can obtain better perform...
Abstract: For multisite radar system, to solve the data transmission rate problem, two kinds of Double Threshold Constant False Alarm Rate (DT-CFAR) detectors, the DT Generalized Likelihood Ratio Test (DT-GLRT) detector and the DT Adaptive Matched Filter (DT-A...
Abstract: In this paper, monostatic MIMO radar with cross array using electromagnetic vector antennas is utilized and a novel algorithm for fast Two Dimensional (2D) Direction Of Arrival (DOA) with high accuracy and polarization estimation is proposed. First, ...
Abstract: In order to solve the problem of performance losses in the MIMO radar waveform design when target signal is uncertainty, a novel joint optimization of transmitting waveforms and receiving filters in the MIMO radar for the case of target in flat ellip...
Abstract: In order to improve the velocity estimation accuracy for multiple targets in distributed MIMO radar, this paper analyses the influence of transmitted power and signal effective time width on the estimation accuracy, and a joint resource allocation al...
Abstract: A classification algorithm based on the fast density search clustering method is proposed for polarimetric High Resolution Range Profile (HRRP) of man-made target. The polarization and frequency features are used to discriminate scattering centers in...
Abstract: The tradition tropospheric delay models and the method of ray-tracing have some limits like inefficiency, high cost and the the restrictions of radiosonde data and surface parameters. An improved method based on ray tracing is proposed. In this metho...
Abstract: Ground moving target detection is a major application in multichannel Synthetic Aperture Radar (SAR) system. In recent years, method based on Robust Principal Component Analysis (RPCA) has attracted much attention for its good performance in distingu...
Abstract: In order to excise transient interferences in the skywave over-the-horizon radar, regular time-domain methods use steps as interference localization, interference blanking and data restoration. The interference excision performance depends highly on ...
Abstract: RDNLMS algorithm is used to cancel Doppler-spreading direct signal and strong echo of airborne passive radar. The transfer function of RDNLMS filter is deduced, based on which a method of non-uniform Doppler extraction is developed to decrease the co...
Abstract: Synthetic Aperture Radar ALtimeter (SARAL) is a new generation radar altimeter and has the best height precision now. As using synthetic aperture technique, the height precision of SARAL is improved by one fold. Based on studying the height precision...
Abstract: At low frequency, the assumption of independent scattering of the scatterers in vegetation medium is no longer valid. The coherent effect and near field interactions should be considered. In this paper, a high-order coherent scattering model for vege...
Abstract: Based on the property that the scene radiance is of high contrast and the atmospheric veil is locally smooth, a novel single hazy image restoration method based on nonlocal total variation regularization optimization is proposed in this paper. In ord...
Abstract: As to the problem that the base classifiers in ternary Error Correcting Output Codes (ECOC) matrix do not contain the prior information of classes which are ignored in binary splits, a new recoding ECOC based on Receiver Operating Characteristic (ROC...
Abstract: An efficient Coding Unit (CU) decision algorithm is proposed for depth intra coding, in which the depth level of CU is predicted by Corner-Point (CP) and the co-located texture CU. More specially, firstly, the CPs are obtained by corner detector in j...
Abstract: The generalized principal component analysis plays an important roles in many fields of modern signal processing. However, up to now, there are few algorithms, which can extract the generalized principal component adaptively. In this paper, a general...
Abstract: The Forward-Backward Pursuit (FBP) algorithm, a novel two stage greedy approach, receives wide attention due to the high reconstruction accuracy and the feature without prior information of the sparsity. However, FBP has to run more time to get a hig...
Abstract: In order to solve the problem of low recognition accuracy of Continuous Phase Modulation (CPM) which is non-linear and with memory, a new maximum likelihood modulation recognition approach using memory factor is proposed in this paper. The approach d...
Abstract: In order to transfer effective, reliable and secure information in resource-constrained networks such as deep space communications and mobile communications, a joint source channel security arithmetic coding method controlled by chaotic keys is propo...
Abstract: A fast nulls tracking pattern synthesis algorithm based on jammer subspace orthogonal projection is proposed, which can suppress the dynamic active jamming for LEO spaceborne array antenna. The algorithm corrects the nulls positions of radiation patt...
Abstract: In wireless communication network, the channel state information is complicated. A joint Hierarchical Modulation and Physical-layer Network Coding (HM-PNC) scheme is proposed for the asymmetric Two-Way Relay Channel (TWRC). In this scheme, the two so...
Abstract: To improve the secrecy performance of relay networks in the presence of one eavesdropper, the Artificial Noise Precoding (ANP) and Eigen-Beamforming (EB) secure transmission schemes are appilied at the multiple-antenna amplify-and-forward relay, and ...
Abstract: In Video on Demand (VoD) applications it is desired that the encrypted multimedia data are still partially perceptible after encryption in order to stimulate the purchase of the high-quality versions of the multimedia products. This perceptual encryp...
Abstract: With the development of the technology of cognitive radio, the standards of spectrum sensing performance become the higher and the higher, especially in low Signal-to-Noise Ratio (SNR) environments. A Dynamic Double-threshold Energy sensing method ba...
Abstract: In Orthogonal Frequency Division Multiple Access (OFDMA)-based cellular networks, the statistical characteristics of the Inter-Cell Interference (ICI) are closely related to network performances. There is no closed-form expression for the Cumulative ...
Abstract: The rational spectrum resource allocation is one of the goals of Cognitive Radio (CR) technology. With the rapid increase of Secondary Users (SUs) numbers, the precise and real-time management becomes more and more difficult to achieve. In order to s...
Abstract: Physical layer secret key capacity is affected by such factors as additive noise, the time difference of channel sampling, terminals moving speed, sampling period, and the number of samples, whose effects on the physical layer secret key capacity are...
Abstract: The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, t...
Abstract: To solve the problem that Sybil attack damages the uniqueness of node identity in ZigBee network, an adaptive link fingerprint authentication scheme against Sybil attack is proposed. First, a link fingerprint based on the characteristics of wireless ...
Abstract: To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, term...
Abstract: Implementation of file fault tolerance is the key for preventing data loss in cloud. However, cloud storage service providers may not offer the committed level, which results in that users may suffer data loss and economic loss. Existing inspection a...
Abstract: In order to optimize the recovery quality of Region Incrementing Visual Cryptography Scheme (RIVCS), by adding identities for shares and combing the random numbers, an XOR-based single-secret sharing Visual Cryptography Scheme (XVCS) with individual ...
Abstract: Network virtualization is widely deployed in network experiment platforms and data center networks. As a key networking equipment in virtualized environment, the virtual router can build many virtual router instances to run different virtual networks...
Abstract: A novel adaptive co-evolutionary particle swarm optimization algorithm is presented for energy aware virtual network embedding problem. The polymerization degree is designed, which is used to adaptively select searching method, namely variation searc...
Abstract: A novel non-iterative method, named unitary matrix pencil method, is presented in this paper for the pattern synthesis of sparse linear arrays. Through unitary transformation of the centro-Hermit matrix constructed using sample data of the desired pa...
Abstract: X-band pulsed space Traveling Wave Tube (TWT) is mainly used in such radar system as light-weight SAR, which is required to have high power, high efficiency and high reliability. The output structure is an important part of the TWT, and its reliabili...
Abstract: Memristor is a kind of resistance and in possession of the function of memory. The research hotspots and difficulties at present memristor lie in the application of the new model and related areas. A novel magnetron memristor model based on hyperboli...
Abstract: There are increasing interests in hardware support for decimal arithmetic due to the demand of high accuracy computation in commercial computing, financial analysis, and other applications. New specifications for decimal floating-point arithmetic hav...
Abstract: Zhang et al. (2015) proposed two certificateless aggregate signature schemes, and they demonstrated that both of their schemes are provably secure in the random oracle model. This paper analyzes the security of two schemes proposed by Zhang et al. an...