Abstract: To provide a better solution for search efficiency reduction problem caused by pseudo collision in the traditional intelligent optimization algorithms, this paper proposes a double clonal selection algorithm based on fuzzy non-genetic information mem...
Abstract: The existed machine learning based road segmentation algorithms maintain obvious shortage that the detection effect decreases dramatically when the distribution of training samples and the scene target samples does not match. Focusing on this issue, ...
Abstract: Classification method based on sparse representation has won wide attention because of its simplicity and effectiveness, while how to adaptively build the relationship between dictionary atoms and class labels is still an important open question, at ...
Abstract: The applicability of traditional spectral clustering is limited by its high complexity in large-scale data sets. Through construction of affinity matrix between landmark points and data points, the Landmark-based Spectral Clustering (LSC) algorithm c...
Abstract: Convolution Neural Networks (CNN) make breakthrough progress in many areas recently, such as speech recognition and image recognition. A limiting factor for use of CNN in large-scale application is, until recently, their computational expense, especi...
Abstract: The optimal noise that minimizes Bayes risk for a binary hypothesis testing problem is analyzed firstly. As a result, the minimization of Bayes risk can be equivalent as the optimization of the detection probability and/or false alarm probability . S...
Abstract: Adaptive beamforming techniques for conformal arrays suffer from poor universality, difficulty to maintain the main beam and high computational cost. A novel robust adaptive beamforming algorithm for conformal arrays based on sparse reconstruction is...
Abstract: A sparse representation speech denoising method based on adapted stopping residue error is proposed. Firstly, an over complete dictionary of the clean speech power spectrum is learned by the K-Singular Value Decomposition (K-SVD) algorithm. In the sp...
Abstract: The estimation accuracy of the wall displacement, delay time, and linear-regression-based Pulse Wave Velocity (PWV) affected by different scanning frame rates and beam density is investigated quantitatively in the measurement of the regional PWV with...
Abstract: To overcome the large errors and complexity of measuring the wave velocity of landing point location algorithm in target range, a method based on poisoning algorithm without velocity measurement is proposed. Nine accelerate sensors constitute pozidri...
Abstract: A new method of construction of shift sequence sets is proposed, and based on these shift sequences, a new class of Gaussian integer sequence sets with period 2N which can choose Zero Correlation Zone (ZCZ) length flexibly is obtained by interleaving...
Abstract: As the substantial growth of data traffic over the past few years, the deployment of cellular base stations tends to be smaller and denser which puts forward higher requirements for backhaul techniques. In this study, WiFi is taken as a backhaul tech...
Abstract: Considering a general eavesdropping case where the eavesdropper is equipped with multiple antennas and two uncertainty models for the imperfect Channel State Information (CSI) on the main and eavesdroppers channels at the transmitter. Two robust tran...
Abstract: Traditional lossless compression algorithms are not efficient for screen content coding. To take the full advantage of special characteristics of screen content, a lossless compression algorithm based on String Matching with High Performance and Low ...
Abstract: In order to guarantee that Visible Light Communication (VLC) can provide both high-speed and low energy consumption data transmission services. A modulation named by Carrier-less Position/Phase (CPP) based on Pulse Position Modulation (PPM) is propos...
Abstract: To reduce the energy consumption in wireless access networks, a Cooperative Energy-Saving Mechanism based on Benders Decomposition (BD-CESM) is presented to solve inadequate coverage problem caused by BS dormancy by means of cooperative BS selection ...
Abstract: In the electronic countermeasure, the opponents bit stream can be captured. However, without any knowledge about the type of data link protocol, the existing protocol analyzing tools can not analyze the useful information from the bit stream. To furt...
Abstract: During the Distributed Denial of Service (DDoS) attack happening in Software Defined Network (SDN) network, the attackers send a large number of data packets. Large quantities of new terminal identifiers are generated. Accordingly, the network connec...
Abstract: In the searchable encryption services provided by cloud severs, data owners expect that their data files can be partitioned and stored to multiple cloud severs with the form of ciphertext, so as to improve the searching efficiency of authorized users...
Abstract: The limitations of network resource and the dispersion of network management are the two major difficulties for traditional networks to address the Distributed Denial of Service (DDoS) attacks. However, current defense methods are static and hysteres...
Abstract: Block Fast Factorized Back-Projection (Block-FFBP) algorithm adopts a subaperture synthesis approach to reduce the computing complexity of the conventional BP algorithm, and partitions the echo data into blocks in range to avoid the complicated trans...
Abstract: The method for estimating the parameters of multi-look Pareto distribution based onzln(z) can not estimate the shape parameter less than 1. To overcome the drawback, it is generalized byzrln(z), which widens the efficacious range for shape parameter ...
Abstract: A Direct Position Determination (DPD) algorithm based on spatial spectrum analysis for the issue of asynchronous observation in the multiple moving sensors passive fusion location system is proposed. At first, a direct determination mathematical mode...
Abstract: The problem of ISAR image jamming is the main stream in radar countermeasures study. This paper proposes a new jamming technique for ISAR imaging based on Multiple Phase Sectionalized Modulation (MPSM) jamming method. Its basic principle and processi...
Abstract: As the basis of change detection and image fusion, SAR image registration plays an important role in the interpretation of multi-temporal SAR images. This paper presents a method of SAR image registration based on corner detection using SAR-FAST, whi...
Abstract: Distributed micro-satellites SAR has the capabilities of substantially miniaturizing the size and lowering the cost of space-borne SAR systems. However, one of the key issues is to take full advantage of the distributed resources and achieve high-res...
Abstract: In order to obtain accurate aerial stitching images, this paper proposes a novel image mosaic method based on Binary Robust Invariant Scalable Keypoints (BRISK) feature of directed line segment, aiming to resolve incident scaling, rotation, changes i...
Abstract: For the unambiguous general acquisition for Binary Offset Carrier (BOC) and its derivative signals is still scarce of analysis, a new unambiguous algorithm is proposed for all types of BOC signals and all kinds of modulation order. Firstly, the commo...
Abstract: In order to solve the problem of high computational complexity of the ambiguity in attitude measurement, a new attitude measurement method based on antenna configuration is proposed. In a certain range of measurement error, the antenna array for atti...
Abstract: The electromagnetic fields from oblique lightning channel are studied by using FDTD and considering the effects of vertical layered ground conductivity and lightning channel tilt angle. The calculation results show that the initial peak values of lig...
Abstract: With the development of communication technology, investigating predistortion circuit for Travelling Wave Tube (TWT) becomes more and more important. This paper analyzes the principle of nonlinearity generator based on the schottky diodes and the eff...
Abstract: The application of LCLC resonant converters for space Travelling-Wave Tube Amplifiers (TWTAs) is investigated in this paper. Based on the working principles under Zero Current Switching (ZCS) and Zero Voltage Switching (ZVS), the equivalent circuit o...
Abstract: To address the problem of the description and encryption of color images on the quantum computer, a new method based on the phase rotation of qubit is proposed. Firstly, the color image is described as a quantum superposition state by mapping the pix...
Abstract: Basing on the signal-subspace vectors from the spatial-frequency decomposition, a novel time-reversal imaging algorithm is proposed. Using the backscattered data recorded by the antenna array, a spatial-frequency multistatic matrix is set up. Singula...
Abstract: A body biasing linearization technique is proposed to shape output spectrum mask to meet the stringent specification of the Human Body Communication (HBC) standard for Wireless Body Area Network (WBAN). Body biasing of the buffer transistors is prope...
Abstract: Traveling Wave Tube Amplifier (TWTA) is used extensively in the fields of radars and communication. And its phase stability could exert influence upon the quality of transmission signals, the detection accuracy of target parameters and the electromag...