Abstract: The spectral efficiency and energy efficiency of the uplink of massive MIMO-OFDM system is studied using mixed-precision Analog-Digital Converter (ADC) and Zero-Forcing (ZF) reception algorithm at the receiver. By using the additive quantization nois...
Abstract: For the service characteristics and Quality of Service (QoS) requirements of Machine Type Communications (MTC), short-packet/short-coded block transmission in MTC based on Non-Orthogonal Multiple Access (NOMA) is considered in this paper, and the res...
Abstract: The power control problem of mobile users in macro-femto heterogeneous cellular networks is studied. Firstly, an optimization model that maximizes the total energy efficiency of femtocells with the minimum received signal-to-noise ratio as the constr...
Abstract: Due to the limited transmission performance of cellular network and the buffering capabilities of the Base Station (BS), it is very difficult to achieve the Quality of Service (QoS) requirements of multi-user content requests. In this paper, a joint ...
Abstract: In order to improve multicast’s spectrum energy-efficient of elastic optical network configured with Colorless, Directionless and Contentionless-Flexible Reconfigurable Optical Add/Drop Multiplexer (CDC-F ROADM) nodes, an All-optical Multicast Energy...
Abstract: In order to reduce the computational complexity of Convolutional Neural Network(CNN), the two-dimensional fast filtering algorithm is introduced into the CNN, and a hardware architecture for implementing CNN layer-by-layer acceleration on FPGA is pro...
Abstract: Bitstream generator in FPGA Electronic Design Automation(EDA) offers precise configuration information, which enables the application circuits to be implemented on the target device. On one hand, modern FPGAs tend to have larger device scale and more...
Abstract: A novel technique for increasing the load response speed of Capacitor-Less Low-DropOut linear regulator (CL-LDO) is proposed to improve the transient response of CL-LDO when its load current changes. With an additional fast signal feedback path, the ...
Abstract: Considering the large computational complexity and the long-time calculation of Convolutional Neural Networks (CNN), an Field-Programmable Gate Array(FPGA)-based CNN hardware accelerator is proposed. Firstly, by deeply analyzing the forward computing...
Abstract: In order to accommodate the development of new communication technology, an integrated programmable microwave photonic filter with high shape-factor is proposed in this paper. This filter is based on Silicon-On-Insulator (SOI) and an eight-tap finite...
Abstract: Chirp signals are widely used in communication and exploration. The parameter analysis of the chirp signals often uses a Wigner-Ville Distribution (WVD) based time-frequency analysis method, which achieves high time-frequency resolution. However, thi...
Abstract: The Dense Focal Plane Array Feed (DFPAF), which integrates the characters of multi-beam feed with multiple independent horns and Phased Array Feed (PAF), can simultaneously provide more fixed shaped beams and wider field of view than multi-beam feed ...
Abstract: The G-matrix model method is usually used to achieve the brightness temperature reconstruction for the one-Dimensional (1-D) synthetic aperture microwave radiometer system. For the 1-D radiometer system, the imaging process mainly includes: the rad...
Abstract: Forwarding dense false target jamming disturbs the detection and recognition of real targets by generating multiple false targets in the range dimension. Because the false echo signal is highly correlated with the real signal, it is difficult for rad...
Abstract: The microwave source of Non-Coherent Short Pulse (NCSP) radar transmits short pulse. Thus, for high velocity targets, the motion effect in the pulse duration can be neglected, and the echo signal does not need special motion compensation. In order to...
Abstract: In order to improve missile-borne radar detection performance in modern electronic warfare, a radar waveform design method based on Nash equilibrium is proposed. Firstly, the radar and jammer game signal models are established in electronic warfare. ...
Abstract: For Time-Division Multiple Access (TDMA) signals, the performance of Specific Emitter Identification (SEI) is primarily limited by burst duration. To remedy this shortcoming, a novel radiometric signature is presented, which reveals whether the users...
Abstract: In order to achieve routing optimization in the Software Defined Network (SDN) environment, deep reinforcement learning is imposed to the SDN routing process and a mechanism based on deep reinforcement learning is proposed to optimize routing. This m...
Abstract: With the introduction of Network Function Virtualization (NFV), the operating costs of operators can be greatly reduced. However, most existing Service Function Chain (SFC) orchestration researches can not optimize the resources utilization while gua...
Abstract: To support the execution of computation-intensive, delay-sensitive computing task by moving down the computing and processing capability in mobile edge computing becomes the current trend. However, when serving a large number of mobile users, how to ...
Abstract: Online contract signing is becoming more and more popular in e-commerce. It is not easy to sign a contract between two parties who do not trust each other. Many of these protocols involve the participation of third parties, but they are not advantage...
Abstract: Side channel attack is the primary way to leak information between tenants in current cloud computing environment. However, existing Service Function Chain (SFC) deployment methods do not fully consider the side channel attack problem faced by the Vi...
Abstract: Heterogeneous hybrid group signcryption can not only solve the confidentiality and unforgeability of data transmission under different cryptosystems, but also encrypt data of any length. Firstly, the security of a hybrid group signcryption scheme und...
Abstract: To solve the problem for the large amount of tasks, complex constraint conditions and manual which is hard to generation shifts of airport foreign airline service personnel. A shift generation model is studied and constructed for multi-task hierarchi...
Abstract: With the attribute feature information of the fuzzy membership matrix and cluster centers after the iteration not fully utilized, the results of Fuzzy C-Means (FCM) Clustering and related modified algorithms are determined based on the principle of m...
Abstract: Considering the failure of the Conditional adversarial Domain AdaptatioN(CDAN) to fully utilize the sample transferability, which still struggle with some hard-to-transfer source samples disturbed the distribution of the target domain samples, a Tran...
Abstract: Most current transfer learning methods are modeled by utilizing the source data with the assumption that all data in the source domain are equally related to the target domain. In many practical applications, however, this assumption may induce negat...
Abstract: To solve the problem that small moving object is difficult to be detected in video surveillance, a track-based detection algorithm is proposed. Firstly, in order to reduce missing alarm, an adaptive foreground extraction method combining regional tex...
Abstract: Facial expression is the most intuitive description of changes in psychological emotions, and different people have great differences in facial expressions. The existing facial expression recognition methods use facial statistical features to disting...
Abstract: By using the intra-view and inter-view correlations and the motion vector-sharing, a depth map error concealment approach is proposed for 3D video coding based on the High Efficiency Video Coding (3D-HEVC) to combat the packet loss of the depth video...
Abstract: To solve the problems that Two-Dimensional Principal Component Analysis (2DPCA) can not implement the on-line feature extraction and can not represent the complete structure information, an Incremental 2DPCA (I2DPCA) without estimating covariance mat...
Abstract: An image semantic segmentation model based on region and deep residual network is proposed. Region based methods use multi-scale to create overlapping regions, which can identify multi-scale objects and obtain fine object segmentation boundary. Fully...
Abstract: As an extension of Compressed Sensing(CS), Matrix Completion(MC) is widely applied to different fields. Recently, the Riemannian optimization based MC algorithm attracts a lot of attention from researchers due to its high accuracy in reconstruction a...