Abstract: Considering the resource allocation problem for Device-to-Device (D2D) communications, a channel selection and power control strategy for D2D communications is investigated. On the premise of guaranteeing the Quality of Service (QoS) of cellular user...
Abstract: When the Underwater Wireless Sensor Network (UWSN) performs target tracking, the contributions of the measured values of the nodes are different, and the battery energy carried by the sensor node is limited. Therefore, a good node fusion weight metho...
Abstract: The radio map construction is time consuming and labor intensive, and the conventional semi-supervised based methods usually ignore the influence of the uneven distribution of high-dimensional Received Signal Strength (RSS). In order to solve that pr...
Abstract: Considering coverage redundancy problem existed in random heterogeneous sensor networks with high density deployment, a Node Scheduling algorithm for Stochastic Heterogeneous wireless sensor networks(NSSH) is proposed. The Delaunary triangulation is ...
Abstract: Considering the problem of Orthogonal Frequency Division Multiplexing (OFDM) signal delay estimation with only a Single Measurement Vector (SMV) in a complex environment, a sparse reconstruction time delay estimation algorithm based on Bayesian Autom...
Abstract: To solve the problems of high encoding complexity and long encoding delay in the multi-source multi-relay Low Density Parity Check (LDPC) coded cooperative system, a special kind of structured LDPC codes—Quasi-Cyclic LDPC (QC-LDPC) codes based on gen...
Abstract: Two online blind equalization algorithms based on Echo State Network (ESN) in this paper are proposed for the nonlinear satellite channel. These two algorithms take advantage of the good nonlinear approximation of ESN to bring the High-Order Statisti...
Abstract: Considering the problem that the Dual-Sequence Frequency Hopping (DSFH) can not communicate at extremely low Signal-to-Noise Ratio (SNR), a Stochastic Resonance (SR) detection method is proposed. The SR takes full advantage of the physical characteri...
Abstract: To solve the problem that polarization sensitive array of defective electromagnetic vector sensor estimate multi parameter, a two-dimensional DOA estimation algorithm based on orthogonal dipole is proposed in this paper. First, eigendecomposition of ...
Abstract: Increasing the integration time can effectively improve the detection performance of passive radar. However, for maneuvering targets, the complex motions, such as high velocity, acceleration and jerk, cause existing detection methods to suffer the Ra...
Abstract: Considering the disadvantage of oblique delay estimation of tropospheric scattering at arbitrary stations, which is difficult to obtain real-time sounding meteorological data, an oblique delay estimation algorithm of tropospheric scattering based on ...
Abstract: Considering the problem that the scattering echo image of the new generation Doppler meteorological radar is reduced by the noise echoes such as non-rainfall, the accuracy of the refined short-term weather forecast is reduced. A method for semantic s...
Abstract: The circuit structure optimization method for Basic programmable Logic Element (BLE) of FPGA is studied. Considering finding the solution to the bottleneck problem of low resource utilization efficiency in logic and arithmetic operations with 4-input...
Abstract: To solve the problem of heat dissipation in Three Dimensional Field Programmable Gate Array Technology (3D FPGA), an interconnect channel architectural design method with low thermal gradient feature is proposed. A thermal resistance network model is...
Abstract: Currently, the turbine air flow sensors are widely used to record the human exhalation signals in spirometry, but test results vary due to different expiratory flow for the same Forced Vital Capacity(FVC) measurements, and the differences are usually...
Abstract: Cipher cards play an important role in the field of information security. However, the performance of cipher cards are insufficient, and it is difficult to meet the needs of high-speed network security services. A design and system implementation met...
Abstract: In order to overcome the problem that cloud storage is not trusted and the low efficiency of ciphertext retrieval in cloud storage, a searchable ciphertext sorting encryption scheme based on B+ tree on the block chain is proposed. Combined with the b...
Abstract: With the development of the internet of things, small-scale communication devices such as wireless sensors and the Radio Frequency IDentification(RFID) tags are widely used, these micro-devices have limited computing power, so that the traditional cr...
Abstract: GC weight is an important parameter of DNA code, and how to meet GC constant weight constraint DNA code is an interesting problem. In this paper, by establishing a bijection between DNA code and quaternion code, the DNA code that satisfies the GC con...
Abstract: Due to the feature of in-network caching in Named Data Networking (NDN), any consumer might fetch the cached contents from NDN routers, but the content producers have no idea about details of certain contents being accessed. Considering these problem...
Abstract: Network Function Virtualization (NFV) brings flexibility and dynamics to the construction of service chain. However, the software and virtualization may cause security risks such as vulnerabilities and backdoors, which may have impact on Service Chai...
Abstract: Salient object detection which aims at automatically detecting what attracts human’s attention most in a scene, bootstrap learning based on Support Vector Machine(SVM) has achieved excellent performance in bottom-up methods. However, it is time-consu...
Abstract: A method of establishing a fingerprint database, which is based on distributed compressed sensing, is proposed to improve the low positioning accuracy and poor real-time positioning that exist in the current mine target positioning in China. Using th...
Abstract: The filtering performance of Gaussian Mixture Cardinality Balanced Multi-target Multi-Bernoulli (GM-CBMeMBer) filter can be effected by the heavy-tailed process noise and measurement noise. To solve this problem, a new STudent’s t Mixture Cardinality...
Abstract: To solve the problems of low robustness and tracking accuracy in target tracking when interference factors occur such as target fast motion and occlusion in complex video scenes, an Adaptive Strategy Fusion Target Tracking algorithm (ASFTT) is propos...
Abstract: To solve the problems of the existing in the process of human-computer interaction system, such as lack of emotion and low participation, a cognitive emotion interaction model based on game theory in PAD emotion space is proposed. Firstly, the intera...
Abstract: In the case of high compression rates, the JPEG decompressed image can produce blocking artifacts, ringing effects and blurring, which affect seriously the visual effect of the image. In order to remove JPEG compression artifacts, a multi-scale dense...
Abstract: High-resolution remote sensing images have complex visual contents, and extracting feature to represent image content accurately is the key to improving image retrieval performance. Convolutional Neural Networks (CNN) have strong transfer learning ab...
Abstract: A lossy frame memory compression algorithm using Direction Interpolation Prediction Variable Length Coding (DIPVLC) is proposed to improve frame memory compression performance. Firstly, the prediction residual is obtained by adaptive texture directio...
Abstract: The Fast Super-Resolution Convolutional Neural Network algorithm (FSRCNN) is difficult to extract deep image information due to the small number of convolution layers and the correlation lack between the feature information of adjacent convolutional ...
Abstract: Considering the problem that the prediction accuracy is not accurate enough when the depth information is recovered from the monocular vision image, a method of depth estimation of road scenes based on pyramid pooling network is proposed. Firstly, us...
Abstract: In partial label learning, the true label of an instance is hidden in a label-set consisting of a group of candidate labels. The existing partial label learning algorithm only measures the similarity between instances based on feature vectors and lac...
Abstract: Utilizing multiple data (elevation information) to assist remote sensing image segmentation is an important research topic in recent years. However, the existing methods usually directly use multivariate data as the input of the model, which fails to...
Abstract: Considering the inaccurate description of feature differences between nodes in the graph-based saliency detection algorithm, an image saliency detection algorithm combining object compactness and regional homogeneity strategy is proposed. Different f...