Abstract: Unmanned Aerial Vehicle (UAV) images are characterized by a very high spatial resolution, and consequently by more abundant information of the edge and the texture. The conventional stitching methods, which use Speeded Up Robust Features (SURF) and k...
Abstract: With the development of big data and information technology, a better understanding of users trajectories is of great importance for the design of many applications, such as personalized recommendation, behavioral targeting and computational advertis...
Abstract: For the traditional clustering algorithms efficiency problems in situations of insufficient datasets or datasets with noises, a Knowledge Transfer Clustering Algorithm with Privacy Protection (KTCAPP) is proposed based on the classical Fuzzy C-Means ...
Abstract: Classification algorithm of Support Vector Machine (SVM) is introduced the penalty factor to adjust the overfit and nonlinear problem. The method is beneficial for seeking the optimal solution by allowing a part of samples error classified. But it al...
Abstract: The aerial camera takes photographs from sky. Conventional auto exposure algorithms can not be suitable for some special scenes such as the background is bright or dark and few strong interference points exist. Unsuitable exposure causes information ...
Abstract: The traditional Bag-Of-Words (BOW) model easy causes confusion of different action classes due to the lack of distribution information among features. And the size of BOW has a large effect on recognition rate. In order to reflect the distribution in...
Abstract: To deal with the consistency problem of training process and decision process in Generalized Eigenvalue Proximal Support Vector Machine (GEPSVM), an improved version of eigenvalue proximal support vector machine, called IGEPSVM for short is proposed....
Abstract: In practical application, the adaptive weight of the sidelobe canceller can not be updated frequently. Thus, the spatial nonstationary interference would lead to the mismatch between the weight and the snapshots, which seriously deteriorates the canc...
Abstract: Target appearance model is crucial for tracking. In this paper, a Real-time SuperPixels based Tracking (RSPT) method is proposed in a tracking-by-detection framework, by investigating mid-level vision cue superpixels. Firstly, a discriminative appear...
Abstract: For the sparse representation of image quality assessment model are based on gray image and the lack of color information, a Non-negative Matrix Factorization (NMF)-based full reference color image quality assessment method is proposed. Firstly, from...
Abstract: A method of voiced/unvoiced classification and pitch estimation based on Pitch Estimation Filter with Amplitude Compression (PEFAC) is proposed in this paper. The method first attenuates strong noise components at the?low frequencies based on PEFAC a...
Abstract: In RFID systems, tag anti-collision algorithm is significantly important for fast tag identification, especially in mobile scenarios. A Group Strategy for Remaining tags Algorithm (GSRA) is proposed. It is divided into two phases, which are the ident...
Abstract: Countering the active deception jamming which is repeated by a Digital Radio Frequency Memory (DRFM) has been a challenging problem. Utilizing the characteristics that the Range Gate Pull Off (RGPO) jamming has a slightly different center frequency f...
Abstract: The existing approaches with missing data for SAR by Gapped-data Amplitude and Phase EStimation (GAPES) ignore the range migration and phase error, which lead to the decrease of the imaging quality. An imaging method of gapped-data for spotlight mode...
Abstract: As a new and special bistatic SAR imaging mode, Missile-borne Bistatic Forward-Looking SAR (MBFL-SAR) can perform Two-Dimensional (2D) imaging during the terminal diving period of missile. However, double square root and high order terms in range his...
Abstract: The issue of Direction-Of-Arrival (DOA) estimation in low-angle tracking environment for Very High Frequency (VHF) MIMO radar is investigated in this paper. Under the condition of the reflecting surface height is unknown, an algorithm for the target ...
Abstract: The MUltiple SIgnal Classification (MUSIC) algorithm is one of the most important techniques for Direction-Of-Arrival (DOA) estimate. However, this method is found expensive in practical applications, due to the heavy computational cost involved. To ...
Abstract: For multichannel High-Resolution Wide-Swath SAR (HRWS SAR), to achieve high resolution wide cover mapping ability, the echoes of each channel suffer Doppler ambiguity, thus current clutter suppression approaches may not perform well. To solve the pro...
Abstract: Sum rate maximization is often used as the target of linear Interference Alignment (IA). However, the sum rate function is non-convex and hard to be solved. This problem is solved according to the relationship of mean square error and sum rate which ...
Abstract: In the fifth generation (5G) mobile communication system, massive MIMO antenna and ultra dense deployment of the network are the two ways to achieve high throughput. To solve the mobility management problems in ultra dense clustering network, this pa...
Abstract: In this paper, an optimized inter-prediction algorithm is proposed for High Efficiency Video Coding (HEVC) based on video texture similarity. With the increasing of the video resolution, spatial statistical redundancy is increased meanwhile. HEVC imp...
Abstract: In entropy coding systems based on the context modeling, the context dilution problem introduced by high-order context models needs to be alleviated by the context quantization to achieve the desired compression gain. Therefore, an algorithm is propo...
Abstract: Blind recognition of Space-Time Block Code (STBC) is a new important task in cognitive radio system. Most of the previous researches require multiple receive antennas, however, in many practical applications, size and power on the receivers may favor...
Abstract: To recognize the major modulation schemes which are applied to concurrent communication systems, a joint method based on the high-order cumulants and cyclic spectrum with intelligent decision algorithm (neural network) is proposed to recognize the mo...
Abstract: This paper proposes a novel chaotic communication scheme named Correlation-Delay-Shift-Keying with No Intrasignal Interference (CDSK-NII). By utilizing the repeated chaotic sequence as the reference signal and taking advantage of the zero-sum sequenc...
Abstract: An improved weighted bit-flipping decoding algorithm for LDPC codes is presented. The proposed algorithm introduces an updating rule for variable nodes to efficiently improve the reliability of the flipped bits and reduces the error codes caused by t...
Abstract: A novel Symbol-Variance Feedback Equalizer (SVEF) algorithm is proposed to reduce the computational complexity of the equalizer in Turbo equalization. The derivation of the algorithm is based on the Taylor expansion of the Linear Minimum Mean Squared...
Abstract: In the process of monitoring and controlling power distribution network, condition monitoring and fault tolerance of towers and other facilities become an urgent problem in power system. The existing monitoring system can not maintain transmission of...
Abstract: Bidirectional Label Switch Paths (LSPs) are important parts of Multi-Protocol Label Switching- Transport Profile (MPLS-TP) networking technology. However, the existing algorithms of establishing bidirectional LSPs have redundancy in operation, contro...
Abstract: The data has correlations and redundancy in Wireless Sensor Network (WSN). How to reduce effectively the amount of communication data and extend the network life cycle is one of researching hot points. The Two-Step data Compression algorithm based on...
Abstract: The constructing cost and lifetime are two core problems when constructing a barrier coverage of Wireless Sensor Network (WSN). For the former, the amount of nodes and information transferred are considered very much. And the WSN shutdown Caused by j...
Abstract: Virtual network embedding is researched across multiple domains under network virtualization environment. A hierarchical virtual resource provisioning architecture with centralized management and distributed control is proposed. On this basis, an eff...
Abstract: This paper reviews the past situation and existing problems in chaotic cipher theories and applications, and reports the recent progress of some issues on theoretical design and hardware implementation of ciphers based on high-dimensional chaos syste...
Abstract: Detection performance of Passive Radar Network (PRN) is affected by many factors including network geometry, radio propagation environment, performance of system, signal and data processing capability, and so on. Optimized disposition with passive ra...
Abstract: In view of the existing CRB (Cramr-Rao Bound) for near-field single source is based on the uniform linear array, and analyzes less fully the CRB's characteristics and the influence factors of specific. In this paper, non-matrix, closed-form expressio...