Abstract: In-network caching is one of the key technologies of Content-Centric Networking (CCN), which is widely concerned recently. However, most existing works are targeted for optimizing network resource utilization, and the energy consumption aspect is lar...
Abstract: Recovery of link failure is not only the issue of selecting a connected backup path, but the QoS requirement in the process of failure recovery of the network service should be also taken into account. The probabilistically correlated failure model a...
Abstract: Traditional mobile target localization algorithms are not suitable for wireless sensor networks as they need to collect, store, and process a mass of data. To address this issue, a mobile target localization algorithm based on compressive sensing is ...
Abstract: Previous network-trace-based methods only consider the plaintext format of payload data, and are not suitable for security protocols which include a large number of ciphertext data; therefore, a novel approach named CFIA (Ciphertext Field Identificat...
Abstract: An efficient range matching method based on Bloom Filter algorithm and Ternary Content Addressable Memory (BF-TCAM) technology is proposed to resolve the problem that there generally exit low memory using ratio and high power dissipation in current T...
Abstract: With the access distance of users increasing in hybrid Time and Wavelength Division Multiplexing Passive Optical Networks (TWDM-PONs), the round trip time becomes very long, and idle time is increased in the network. It leads to the problem of bandwi...
Abstract: Sparse Code Multiple Access (SCMA) is a promising air-interface technology for 5 G wireless communication networks, which can enable massive connectivity. The existing multiuser detection schemes are based on a parallel message updating for Message P...
Abstract: Concurrent data transmission from massive Machine Type Communications (MTC) devices makes the traffic pattern of MTC more bursty, which invalidates the commonly-used methodologies of traffic engineering for multichannel S-ALOHA under the assumption o...
Abstract: A dynamic pilot allocation scheme is proposed in case of the pilot contamination existing in massive MIMO system. Based on the signal to interference difference between the aim cell user and the interference cell user, the interference cell is divide...
Abstract: This paper investigates transceiver design for dual-hop up-link multi-user Multiple-Input Multiple- Output (MIMO) system with Amplify-and-Forward (AF) relay to improve the performance of Bit Error Ratio (BER) under the imperfect Channel State Informa...
Abstract: The physical layer security performances of low-complexity opportunistic transmission strategy based on multiple antenna are investigated for cooperative adaptive decode-and-forward relaying system in Nakagami-m fading channels. To fully utilize the ...
Abstract: Multiple-Input-Multiple-Output (MIMO) under water acoustic communication is capable of improving the channel capacity in extremely limited bandwidth. However, the performance of traditional channel estimation algorithms, such as Least Squares (LS) me...
Abstract: This paper shows the rebound attack on the Feistel-SPS structure, which has the Feistel network with a Substitution-Permutation-Substitution (SPS) round function. A 6-round known-key truncated differential distinguisher is obtained by studying the di...
Abstract: Dataspace is a new type of data management, which can manage the mass, heterogeneous, and dynamic data in a pay-as-you-go fashion. However, it is difficult to construct an effective access control mechanism in dataspace environment, because of the da...
Abstract: In colored-loading Knowledge Aided STAP (KA-STAP) techniques, the colored-loading factor should be determined according to the performance of the a priori information. The existing Pre-Whitening (PW) colored-loading factor optimization method can not...
Abstract: In this paper, a novel algorithm named Compact Sensing Matrix Pursuit (CSMP) is proposed to deal with the high coherence problem encountered in the compressed sensing based radar system with high resolution. The CSMP algorithm is applied to the two d...
Abstract: Based on the fact that anisotropy characteristic represents some intrinsic properties of scattering centers, an algorithm for extracting anisotropy characteristic of scattering centers is proposed when wide-angle SAR is used. Firstly, the components ...
Abstract: To compensate the translation motion of precession ballistic targets, the characters of translation and precession are analyzed and it is found out that the precession has the center symmetry character. Using this character, a method based on conjuga...
Abstract: Traditional adaptive detectors are mostly derived under the assumption of independent and identically distributed texture. However, the texture correlation along the range cell exists in real sea clutter datasets. A new coherent detector based on tex...
Abstract: In order to achieve the matched beams goal of the dual-band dual-polarized spaceborne precipitation radar, the solution that a shared aperture feeding array illuminates the parabolic cylindrical reflector is proposed. The shared aperture feeding arra...
Abstract: Since spoofing send similar navigation satellites C/A code, this kind of interferences can lead to the receiver misled easily, receiver will provide a wrong location information. Considering both navigation signal and spoofing with same navigation si...
Abstract: Phase retrieval is an issue that tries to recover an image from its Fourier magnitude measurements. Since the Fourier magnitude measurements contain less information, the traditional phase retrieval algorithms can not reconstruct the image efficientl...
Abstract: In order to sufficiently exploit the image information residing in the residual image for boosting the denoising performance of the Non-local Means (NLM) algorithm, a novel multi-stage residual filtering method is proposed. Firstly, the Non-Local Mea...
Abstract: To overcome the limitation that the alpha stable distributed variable possesses infinite second-order moment, a novel generalized correntropy is defined and the bounded property of the generalized correntropy for the symmetric alpha stable variable i...
Abstract: Traditional double constraint robust Capon beamforming algorithm uses Newton iterative method for solving the optimal loading, presenting the problems of low accuracy and large amount of computation. An improved Double Constraint Robust Capon Beamfor...
Abstract: Existing dual microphone Voice Activity Detection (VAD) algorithms use normally a fixed threshold. The fixed threshold can not provide an accurate VAD under various noise environments. In such case, it causes voice quality degradation, particularly i...
Abstract: In order to improve the stability and accuracy of the object tracking under nonlinear conditions, an object tracking algorithm based on Partial Least Squares (PLS) representation and stochastic gradient object optimization tracking is proposed. In th...
Abstract: Process mining is a technology which can extract non-trivial and useful information from airport event logs. However, the airport event logs are always on a detailed level of abstraction, which may not be in line with the expected abstract level of a...
Abstract: In order to realize intelligent and autonomous navigation of vehicles, a method of spatial place representation based on biological place cells firing is proposed. A relationship is built that the spatial location of vehicle is corresponding with the...
Abstract: To improve distribution and convergence of the obtained solution set in constrained multi-objective optimization problems, this paper presents a constrained multi-objective optimization algorithm based on adaptive truncation strategy. Firstly, throug...
Abstract: Conventional fuzzy system modeling methods essentially belong to the single-view learning modality. In multi-view-oriented data scenarios, they can only cope with each view separately, which is prone to incurring their unsatisfactory generalization p...
Abstract: Based on adaptive control and Lyapunov stability theory, a novel adaptive Generalized Combination Complex Synchronization (GCCS) scheme is proposed for nonidentical hyperchaotic complex systems with unknown parameters. Firstly, the definition of GCCS...
Abstract: With the increasing amount of image data, the image retrieval methods have several drawbacks, such as the low expression ability of visual feature, high dimension of feature, low precision of image retrieval and so on. To solve these problems, a lear...
Abstract: For solving the clustering problem of transfer learning, a new algorithm called Transfer Affinity Propagation clustering algorithm is proposed based on Kullback-Leiber distance (TAP_KL). Based on the probabilistic framework, a new interpretation of t...
Abstract: Searching for wavelet invariants is a key issue in multiresolution analysis. On the other hand,the method of moment invariants is fully developed both in the theory and the practice. A kind of wavelet moment invariants are given based on the image in...
Abstract: In order to implement the wisdom city planning and build perfect wisdom network, it is important to design the security Radio Frequency IDentification (RFID) protocol. A secure RFID ownership transfer protocol should be evaluated in terms of the secu...
Abstract: Stochastic computing is a special algorithm that performs mathematical operations with probabilistic values of bit streams rather than traditional deterministic values. The main advantage of stochastic computing is its great simplicity of hardware ar...
Abstract: A new Virtual Least-Square Active Element Pattern Expansion (VLS-AEPE) method is presented in this paper, which considers each active element pattern of an unequally spaced array as the one radiated by some of equally spaced elements of a virtual arr...
Abstract: With the shrinking of feature size, soft errors due to Single Event Transient (SET) effect become the main reliability threat for aerospace deep sub-micron VLSI circuits, and the generation and propagation of SET pulse is also a hot issue in the stud...
Abstract: This paper presents a non-bandgap voltage reference, which contains a pre-regulated circuit with a super source follower. The pre-regulated circuit includes a super source follower, which attenuates the impedance from the supply of the core reference...