Abstract: In this paper, a multi-task jointly sparse spectral unmixing method based on spectral similarity measure of hyperspectral imagery is proposed, which is a refinement of collaborative sparse spectral unmixing method. First, a threshold value is obtaine...
Abstract: To improve the compression ratio of lossless compression scheme based on prediction, a lossless compression scheme for hyperspectral images using K-means Clustering method and Conventional Recursive Least-Squares (C-CRLS) predictor is presented in th...
Abstract: The high dimensions of hyperspectral remote sensing images will cause the redundancy of information and complexity of data processing, which also brings tremendous computing workload and damages application accuracy. Therefore, before the analysis of...
Abstract: At present, the amount of data collection of microwave radiometric imaging system in one snapshot is massive, so it is difficult to achieve the high spatial resolution by conventional microwave radiation imaging method based on the Nyquist sampling. ...
Abstract: The Sea State Bias (SSB) is an important source of error in satellite altimetry. Operational SSB correction models are based on the altimeter-measured wind speed (U) and Significant Wave Height (SWH). This paper presents a new method to estimate the ...
Abstract: In the electronic system, it occasionally needs to accomplish the transmission and reception of signal in the same platform, at this time, certain transceiver isolation and signal cancellation processing technology are usually adopted. Relative to no...
Abstract: This paper investigates the joint estimation of Time Difference Of Arrival (TDOA) and Frequency Difference Of Arrival (FDOA) in passive location system, where the true value of the reference signal is unknown. A novel Maximum Likelihood (ML) estimato...
Abstract: Traditional design methods of two-dimensional large-scale filter banks suffer from high-complexity. This paper presents an algorithm to design two-dimensional double-prototype fully oversampled Discrete Fourier Transform (DFT) modulated filter bank w...
Abstract: For the problem of Time Division Data Modulation-Binary Offset Carrier (TDDM-BOC) modulation signal under low Signal-to-Noise Ratio (SNR), including blind estimation of the combination code sequence and information sequence, a revised method using Si...
Abstract: An algorithm of Directions Of Arrival (DOA) estimation based on the state-space method is proposed to deal with the problem of estimating DOA of multiple source signals from a single observation vector of distributed array. Hankle matrixes are firstl...
Abstract: Distance-weighted coefficients between unlabeled sample point and its nearest neighbors belonging to same sample set are determined subjectively in the Pseudo Nearest Neighbor (PNN) classification algorithm, which makes it difficult to obtain optimal...
Abstract: The constant modulus algorithm is widely used in the blind equalization of wireless communication system, in order to reduce further the steady-state error, it is usually combined with the decision directed least mean square algorithm. The traditiona...
Abstract: A novel image forensic algorithm against contrast modification based on superpixel and histogram of run length is proposed. In the proposed algorithm, images are firstly divided by superpixel, then run length histogram features of each block are extr...
Abstract: Considering that the existing high-order models have limitations in forecast range and accuracy, a heuristic adaptive-order intuitionistic fuzzy time series forecasting model is built with the combination of the intuitionistic fuzzy sets theory. In t...
Abstract: Under the framework of the Bayesian inference, tracking methods based on PCA subspace and L2-norm minimization can deal with some complex appearance changes in the video scene successfully. However, they are prone to drifting or failure when the targ...
Abstract: The nuclear norm is used to replace the rank function in the subspace clustering algorithm based on low rank representation, it can not estimate the rank of the matrix effectively and it is sensitive to Gauss noise. In this paper, a novel algorithm i...
Abstract: As a typical implementation of the Probability Hypothesis Density (PHD) filter, Particle PHD (P-PHD) is suitable for highly nonlinear systems and widely used in Multi-Target Tracking (MTT). However, the resampling in P-PHD filter, recommended to avoi...
Abstract: One significant advantage of rate selection algorithms based on bandwidth estimation is the high bandwidth utilization rate. They are, however, vulnerable to network bandwidth fluctuations, leading to appearance of rate instantaneous peak value and h...
Abstract: Some existing color image adaptive watermarking algorithms do not fully utilize the color information in the adaptive process, or do not consider the holistic property of the components of a color host image. To overcome these drawbacks, this paper p...
Abstract: ElectroEncephaloGram (EEG) data are often contaminated by various electrophysiological artifacts. Among all these artifacts, removing the ones related to muscle activity is particularly challenging. In past studies, Independent Component Analysis (IC...
Abstract: ElectroEncephaloGram (EEG) signal detection and recognition is an important diagnostic method for the epilepsy. Radial Basis Function (RBF) neural network has excellent performance on approximation and generalization, and can directly recognize EEG s...
Abstract: Texture factor is one of the most important characteristics in the image description. In order to describe the texture feature accurately, and enhance image distinguish ability, a method of texture image retrieval is proposed based on Dual-Tree Compl...
Abstract: To solve the speed bottleneck of deformable part models in the detection process, this paper proposes a cascade deformable part model with rapid computation of feature pyramids for the detection process of the model. Because the speed of the detectio...
Abstract: Many systemic diseases can cause changes of the diameters of retinal vessels and Arteriolar-to-Venular diameter Ratios (AVR), so it is of great importance to make quantitative analysis of the diameter of retinal vessels accurately in the diagnosis of...
Abstract: In order to improve the correct rate of Voice Activity Detection (VAD) in low Signal Noise Ratio (SNR) environment, the paper presents an adaptive reserved likelihood ratio VAD method, which is based on sub-band double features. The method employs su...
Abstract: A physical layer security scheme is studied, which employs the advantage of artificial noise to improve the performance of legitimate user for multiple antenna systems using beamforming technology and artificial noise. Based on the transmitted symbol...
Abstract: In order to solve the problem of blind detection of MIMO system, this paper takes maximum-likelihood sequence detection as the criterion and derives the formulas to get a model based on SemidDefinite Relaxation. The rank of SDR solution equals to the...
Abstract: To solve the problem of key leakages in existing physical layer challenge-response authentication schemes, a physical layer authentication scheme based on hash method is proposed. The channel characteristics are extracted and linked with the key whic...
Abstract: Shuffled-BP (SBP) decoding algorithm is a variable-node-based serial decoding algorithm, which converges faster than the original Belief-Propagation (BP) decoding algorithm. However, due to the semi-parallel processing, there is a decrease in terms o...
Abstract: Because the matroid search algorithm is very complicated and the local matroid search algorithm can not search all optimal codes, this paper proposes a variable matroid search algorithm to search the quasi-cyclic codes by researching matroid search a...
Abstract: In order to deal with the explosive growth of mobile data traffic, a novel design of network architecture will be adopted in 5G. Software Defined Network (SDN) and Network Function Virtualization (NFV) are the key technologies for network transformat...
Abstract: Attribute-Based Encryption (ABE) is often used in cloud storage to achieve fine-grained access control. In order to further protect the sensitive information of access control policy and solve the key escrow caused by the authority center generating ...
Abstract: In order to provide differentiated services in information centric networking, a Differentiated Service Model based on Meta Module (DSM3) is proposed. DSM3 defines the basic network control unit as meta module, and matches different meta module combi...
Abstract: In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different publi...
Abstract: In the design of ultra wideband TEM horn antenna, it is difficult to combine both the character optimization in low frequency and the miniaturization of an antenna, which always limits the usage of TEM horns in some applications. For the problem of l...
Abstract: To improve the environmental adaptation of the package of electric field micro sensor, this article introducs a new electrode package. Different from placing the sensing chip and package inside the measured environment, a package electrode, which is ...
Abstract: As the core component of space traveling wave tubes, the cathode-heater assembly is required to be stable, reliable, long life and low power consumption. In this paper, an estimation method of thermal contact resistance is proposed, and the thermal c...
Abstract: A novel recognition algorithm for Low Probability of Intercept (LPI) radar signal based on deep learning of radar signals Bispectra Diagonal Slice (BDS) is proposed in this paper. Firstly, a Deep Belief Network (DBN) model is established on stacked R...
Abstract: The Theory of Characteristic Modes (TCM) provides the antenna designer with physical insight regarding the antenna operating principles. Based on TCM, this paper analyzes in detail the characteristic modes properties of the several transfigurations o...
Abstract: In order to alleviate the influence of network congestion in space delay/disruption tolerant networks, a QoS based congestion control algorithm is proposed in this paper. The algorithm consists of contact congestion forecasting scheme and QoS based d...