Abstract: The distributed swarm operation of unmanned systems represented by Unmanned Aerial Vehicle (UAV) is the growth point of the future war, and the swarm situation awareness is an important part. Based on the typical situation awareness model, the distri...
Abstract: Assumed that extension and measurement number of Extended Targets (ET) are respectively modeled as ellipse and Poisson, a Gaussian Inverse Wishart Probability Hypothesis Density (GIW-PHD) filter can estimate kinematic and extension states. However, f...
Abstract: Ordinal regression is one of the supervised learning issues, which resides between classification and regression in machine learning fields. There exist many real problems in practice, which can be modeled as ordinal regression problems due to the or...
Abstract: The visibility of the visible images is not good under the poor lighting condition. If the visible and infrared images are fused directly, the resolution of the fused images is not ideal. In order to solve this problem, a modified infrared and visibl...
Abstract: The traditional Local Binary Pattern (LBP) has limited feature discrimination and is sensitive to the noise. In order to alleviate these problems, this paper proposes a method to extract texture features based on pyramid decomposition and sectored lo...
Abstract: Since dynamic background may be erroneously detected as a moving object in the Robust Principal Component Analysis (RPCA) algorithm, a RPCA-based moving object detection optimization algorithm is proposed to improve it. After detected by the RPCA alg...
Abstract: T-distributed Stochastic Neighbor Embedding (TSNE) is introduced into cluster ensemble problem and a cluster ensemble approach based on TSNE is proposed. First, TSNE is utilized to minimize Kullback-Leibler divergences between the high-dimensinal poi...
Abstract: Focusing on the problem that the personnel positioning methods are seriously influenced by the indoor environment, big cumulative error and other issues, a method is proposed to correct the position, which combines the prior knowledge of the map and ...
Abstract: The non-uniform illumination, low brightness, serious color deviation and halo effects around artificial light sources lead to the difficulty in haze removal for night-time image. The existing dehazing methods are mostly designed for daytime image an...
Abstract: In order to improve the inadequacies of Local Binary Pattern (LBP), Center-Symmetric Local Binary Pattern (CS-LBP) and Histogram of Oriented Gradient (HOG) algorithm, Center-Symmetric Local Smooth Binary Pattern (CS-LSBP) and Histogram of Oriented Ab...
Abstract: A novel non-contact heart rate estimation method is proposed to deal with the issue of heart rate measurement from face videos under motion interference in realistic situations, it is hard to estimate heart rate accurately using existing methods. Fir...
Abstract: In order to reduce the effect of low dose CT lung noise on the late diagnosis of lung cancer screening, a denoising model of low-dose CT lung based on deep convolution neural network is proposed. The input of the model is the complete CT lung image. ...
Abstract: To solve the online learning problem under the scenario of time-varying and containing outliers, this paper proposes an M-estimator and Variable Forgetting Factor based Online Sequential Extreme Learning Machine (VFF-M-OSELM). The VFF-M-OSELM is deve...
Abstract: Concerning the problem of real-time restriction on the application of Convolution Neural Network (CNN) in embedded field, and the large degree of sparsity in CNN convolution calculations, this paper proposes an implement method of CNN accelerator bas...
Abstract: An algorithm of Direction Of Arrival (DOA) estimation based on the single-snapshot data is proposed for distributed Two-Dimensional (2-D) array. 2-D Hankle matrixes are firstly constructed using the single observation of every subarray element. Then ...
Abstract: Focusing on the problem of poor accuracy and low resolution of traditional Direction Of Arrival (DOA) estimation algorithm in the presence of non-uniform noise, based on the Matrix Complement theory, a Weighted L1 Sparse Reconstruction DOA estimation...
Abstract: A novel Two Dimension Direction Of Arrive (2D-DOA) estimation method based on sparse sampling array optimization is proposed, which is combined with Accelerated Proximal Gradient (APG) and MUltiple SIgnal Classification (MUSIC). First, a 2D-DOA estim...
Abstract: To solve the problem that Compressive Tracking (CT) algorithm is unable to adapt to the scale change of the object and ignores the sample weight, an optimized compressive tracking algorithm based on particle filter and sample weighting is presented. ...
Abstract: It is a great challenge to model Takagi-Sugeno(T-S) fuzzy systems on high dimensional data due to the problem of the curse of dimensionality. To this end, a novel T-S fuzzy system modeling method called WOMP-GS-FIS is proposed. The proposed method co...
Abstract: Considering the fact that the classical two scale model which is based on the Geometrical Optics-Small Perturbation Method (GO-SPM) is sensitive to the cut-off wave number, a two scale model derived from the Geometrical Optics-Small Slope Approximati...
Abstract: To reduce Radar Cross-Section (RCS), improve operation bandwidth, this paper proposes an innovative Salisbury screen based on time-controlled surface and researches the frequency shifting of UHF radar signal. First, a reflective modulation board whic...
Abstract: The research of improving the Secrecy Capacity (SC) of wireless communication system using Artificial Noise (AN) is one of the classics models in the field of physical layer security communication. Considering the Peak-to-Average Power Ratio (PAPR) p...
Abstract: Since its wide coverage area, data broadcast is the major service of spatial system. However, due to the long distance and the complex, varied climate, data transmission suffers large round-trip-time and poor error performance. In order to achieve be...
Abstract: VoIP (Voice over Internet Protocol) is based on voice stream, which has the advantages of large data transmission and wide application. But the VoIP system is confronted with the security threats of data security and privacy disclosure. Thus, accordi...
Abstract: Mobile Ad hoc NETwork (MANET) is vulnerable to various security threats, and intrusion detection is an effective guarantee for its safe operation. However, existing methods mainly focus on feature selection and feature weighting, and ignore the poten...
Abstract: Review data in e-commerce websites implicates items features and users sentiment. Most existing recommendation researches based on aspect-level sentiment analysis capture users aspect preference for items by extracting users sentiment towards differe...
Abstract: The particularity of security threats for Multi-floor building Indoor Wireless Networks (MIWNs) is mainly caused by its stochastic, dynamic and complex spatial topology. According to the features of MIWNs, such as the randomization of node distributi...
Abstract: Massive MIMO system using Space Division Multiple Access (SDMA) can improve system throughput, and the use of multi-user downlink signal collaboration can cause superimposed interference to the eavesdropper, bringing a natural security gain. However,...
Abstract: For the high Range Sidelobe Level (RSL) of designing distributed MIMO radar orthogonal phase coded waveforms and its mismatched filter bank separately, a joint design method of Orthogonal Phase Coded Waveforms and Mismatched Filter Bank (OPCW-MFB) is...
Abstract: Phase shifter is the steering wheel to control the beam direction of Phased Array Antenna (PAA), which determines the performance of the PAA. Micro Electronic Mechanical System (MEMS) phase shifter has obvious advantages for PAA, but there always exi...
Abstract: In order to obtain efficient information transmission, the existing compression algorithms reduce the compression ratio by increasing complexity. In view of this problem, an array configuration speedup model is proposed in this paper. It is proved th...
Abstract: In the fitting process of the incoherent scatter power spectra with pure-growth mode line and the inversion of the disturbed ionospheric parameters, the GUISDAP package which is based on the equilibrium incoherent scatter theory, always exits serious...
Abstract: With the development of airborne equipment and the intercepted receiving technology, the survivability of aircraft in electronic confrontation is seriously threatened. The concept and basic principles of radio frequency stealth, the research status a...
Abstract: Based on cyberspace security collective defensive mechanism and its synchronization, uncertainty factors are introduced in the synchronization of cyberspace operation, and the improved synchronization model is established. The stability of cyberspace...
Abstract: The current research on Coarse Grained Reconfigurable Architecture (CGRA) loop mapping mainly focuses on operation placement and data routing, but seldom involves data mapping. To solve this problem, a mapping flow based on memory partitioning and pa...