Abstract: Many enterprises try to promote their products in online social network since information propagation in this network have several advantages such as fast transmission speed, low marketing costs, and large influence area. However, it is a challenging...
Abstract: Devoted to enriching the research system of online group, and laying the foundation for exploring deep scientific problem in the future, this paper discusses the definition of online group, online topic, common classification methods, and primarily i...
Abstract: Group recommendation confronts two major problems, i.e., unambiguous definition and identification of groups and efficient recommendation to users in groups. To tackle the two problems, a group recommendation framework based on social network communi...
Abstract: The trajectory K-anonymous is the mainstream of the current trajectory privacy protection, but the method has some defects such as privacy leakage. In this paper, a method of trajectory privacy preserving is proposed Based on Agent Forwarding Mechani...
Abstract: In mobile social networks, people can quickly find potential friends with the same attributes by sharing personal attribute profile. These attribute profiles, however, usually contain sensitive information, if this information gets intercepted by mal...
Abstract: The model based on fully-trusted third party is a major model for location privacy protection in location-based services, but the model has some risk of exposing privacy. In this paper, a location privacy protection method based on Grid Identifier Ma...
Abstract: To study the effects of information coupling of local topology on the complex network evolution, a new weighted method is proposed based on local topology information, which can measure the closeness of connection and the coupling degree of topology ...
Abstract: To implement the high performance web server, it is a key to exploit fully the performance of multi-core CPUs in web servers. Traditional First Come First Served (FCFS) policy does not consider the characteristic of multi-core processors, and could n...
Abstract: By reasonably exploiting the collaborative relationships between nodes and the limited cache resources of neighbor nodes, the cache utilization rate and the message delivery probability of opportunistic networks can be effectively improved. A node st...
Abstract: The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injecting mobile elements. However, the infection process of worm will be greatly accelerated once the mobile element has been captured and become the new inf...
Abstract: Considering that conventional distributed synchronicity algorithm may lead to a state of partial synchronization separately with small couple coefficient or unsteadiness with large couple coefficient, a multi granularity firefly-inspired synchronicit...
Abstract: Considering the line-of-sight path interference cancellation in Co-time and Co-frequency Full-Duplex (CCFD), the pre-nulling technique of transceiver is usually used. However, this method forms a subsidence zone of signal power for the remote receive...
Abstract: For channel estimation technology of multiple antenna communication system based on cognitive radio architecture, traditional zero correlation zone sequences (which assume the availability of the entire spectral band) can not be used because their or...
Abstract: Considering the issues of nonlinearity and self-interference in transmitting and receiving channels of a full-duplex MIMO radio respectively, a novel low hardware cost and low software complexity design scheme with transmitting channels linearization...
Abstract: A physical layer security transmission protocol in a two-hop relay system is studied. All nodes are equipped with an antenna and have the ability of energy harvesting. There are direct links between the source node and the eavesdropper as well as the...
Abstract: Interference alignment has the advantage of eliminating interference, but it needs the perfect Channel State Information (CSI) which is difficult to achieve in practical systems. The advantages and disadvantages of robust interference alignment algor...
Abstract: A transmission mechanism based on the joint management of time, frequency and space domain resources is proposed in the Cooperative Cognitive Radio Network (CCRN), with which the cooperative cognitive users can obtain proper reward under the premise ...
Abstract: This paper deals with blind equalization of sparse multipath channels. A linear model is built under the framework of Reduced Constellation Algorithm (RCA). And the inherent sparse nature of the equalizer is exploited by employing a sparse promoting ...
Abstract: Multipath provisioning algorithm outperforms single-path provisioning algorithm in terms of bandwidth blocking probability. However, multipath transmission causes the differential delay among different paths and affects the usage of spectrum resource...
Abstract: Low-density parity-check code is the one of error-correction codes most approaching Shannon limit, which is adopted as a standard for channel coding by many international communication standard organizations. CCSDS recommends LDPC as channel coding s...
Abstract: In this paper, a new ensemble of the polynomial matrix of a time-invariant LDPC convolutional code is proposed. Based on the method of deriving time-invariant LDPC convolutional codes from QC (Quasi-Cyclic)- LDPC block codes, the elements over finite...
Abstract: All the existing provable secure proactive threshold RSA signature schemes rely on additive secret sharing, in which all players have to cooperate to produce a signature, valid players secret shares may be exposed, and the computing efficiency is too...
Abstract: The existing lattice-based signcryption schemes are based on trapdoor generation algorithm and preimage sample algorithm. However, both algorithms are complex, require a lot of time to run, and affect the efficiency of latticed-based signcryption sch...
Abstract: Privacy-preserving determination of spatial relationship belongs to spatial geometry problem in secure multiparty computation, which is significant to confidential business, engineering, military, etc. However, most existing schemes transform the ori...
Abstract: In view of image defocus caused by Doppler frequency shift in ISAR imaging of targets with complex motion, this paper characterizes the azimuth echoes as Cubic Phase Signal (CPS) and proposes an ISAR imaging algorithm for targets with complex motion ...
Abstract: In order to improve the accuracy of low-angle estimation in meter-wave radars, combined with sparse Bayesian learning, this paper makes use of the Kronecker product and the similarity of the sparse structure between adjacent snapshots to transform th...
Abstract: The Local Linear Regression (LLR) estimator is usually used when developing a nonparametric model for radar altimeter Sea State Bias (SSB). However, the conventional LLR estimator contains matrices with high dimension. When a large number of data are...
Abstract: Hyperspectral image contains the properties of much bands and high redundancy, and the research of hyperspectral image classification focuses on feature extraction. To overcome this problem, a Semi-Supervised Sparse Manifold Embedding (S3ME) algorith...
Abstract: The association between multiple targets and echo data is the main problem for multi-target location method, which causes huge calculation and the problem of extracting the targets accurately. The location method based on Bistatic Range Space Project...
Abstract: To solve the single-observer passive location estimation using illuminators of opportunity, a jointing Direction Of Arrival (DOA) and Time Difference Of Arrival (TDOA) location method based on Regularized Constrained Total Least Squares (RCTLS) algor...
Abstract: Jamming and spoofing are the most common and serious threat intentional interferences for Global Navigation Satellite?System (GNSS). A joint GNSS interference mitigation approach is proposed for jamming and spoofing issue based on multi-antenna array...
Abstract: In this work, considering a radar-communication integrated radio frequency system, a dynamic allocation method of shared aperture using relevant environmental information is proposed. Firstly, the shared aperture allocation task is formulated as a Mu...
Abstract: The accuracy of lung segmented results is important in actual clinical application. However, all kinds of segmentation methods can not be uniform for all the chest CT (Computed Tomography) images because of the irregularities and diversity of lung di...
Abstract: Traditionally, low dimensional features for partial information are extracted to analyze image quality. Though high dimensional features are difficult to be analyzed, they contain more information to fully analyze image quality. On this condition, th...
Abstract: Many of the high-resolution Direction Of Arrival (DOA) estimation methods fail to estimate the DOAs of incoming signals and distinguish the two close signals under small sample support; especially only one snapshot is available. To handle this proble...
Abstract: In order to extract Frequency-Hopping (FH) communication parameters and provide the necessary information for the communication countermeasure, an online estimation algorithm of 2D-DOA and frequency tracking for multiple FH signals is proposed in thi...
Abstract: This paper proposes a new algorithm to design near-perfect-reconstruction nonuniform Cosine modulated filter banks. Due to the infeasibility of directly controlling the performance of Nonuniform Filter Banks (NUFBs) in the existing combined algorithm...
Abstract: In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable Functions (PUF). First and foremost, the glitch circuit is...
Abstract: In order to break through the bottleneck of the huge cluster area in AIC (And-Inverter Cone) architecture based FPGA, the research on the optimisation of the input crossbar architecture is carried on. A post-pack netlist statistics method is creative...
Abstract: Compared with the first-order Markov random fields, higher-order Markov random fields could incorporate more statistical priors, thus have much expressive power of modeling. And the defogged images which based on dark channel prior have much error in...
Abstract: The design and implementation of ultra-high-speed FFT processor is imperative in radar system and prospective wireless communication system. In this paper, the fully-parallel-architecture FFT with bit-serial arithmetic is proposed. This method avoids...