Abstract: Non-Orthogonal Multiple Access (NOMA) serves multiple transmitters using the same resource block, and the receiver decodes the information from different transmitters through Successive Interference Cancellation (SIC). However, most of the researches...
Abstract: Long Range(LoRa) Backscattering Communication (BC) not only has the advantages of low cost and low power consumption, but also has a long communication distance. However, the existing LoRa BC scheme is complex and can not be applied to actual enginee...
Abstract: In order to solve the problem of the Device to Device (D2D) multi-multiplex communication resource blocks allocation in a cell, the resource blocks allocation scheme about D2D multi-multiplex mode based on non-equilibrium solution is proposed after a...
Abstract: Machine-to-Machine (M2M) and Device-to-Device (D2D) communications are both key technologies in the Fifth Generation (5G) mobile communication systems. In M2M communications, the Energy Efficiency (EE) especially needs to be improved to extend the li...
Abstract: For the problem of sparse feature enhancement in Synthetic Aperture Radar (SAR) imagery, conventional methods are difficult to achieve a preferable balance between accuracy and efficiency. In this paper, a robust and efficient SAR imaging algorithm b...
Abstract: The generalized Pareto distributed sea clutter model, known as one of the compound-Gaussian models, is able to describe heavy-tailed characteristic of sea clutter under high-resolution and low grazing angle detection scene efficiently, and the accura...
Abstract: The constraint conditions of target assignment model for phased array radar network are unreasonable and the performance of model solving algorithms are not good enough. To solve these problems, a target assignment model for radar network based on Qu...
Abstract: Forward-looking Synthetic Aperture Radar (SAR) imaging has the problem of left-right Doppler ambiguity, so it is necessary to use spatial resources for ambiguity resolution. Due to the weight and size of Unmanned Aerial Vehicle (UAV), the receiving a...
Abstract: The performance of a Constant False Alarm Rate (CFAR) detector is often evaluated in three typical backgrounds - homogeneous environment, multiple targets situation and clutter edges described by Prof. Rohling. However, there is a lack of the analyti...
Abstract: Bistatic radar has the advantages of high concealment and strong anti-interference performance, and plays an important role in modern electronic warfare. Based on the principle of radar coincidence imaging, the problem of bistatic radar coincidence i...
Abstract: A modified SPECtral ANalysis (SPECAN) algorithm based on Doppler resampling is proposed to deal with the azimuth Space-Variant (SV) phase coefficients of the High Squint (HS) SAR data acquired from maneuvering platform. Firstly, for HS SAR with const...
Abstract: The backscattering of the radar targets is sensitive to the relative geometry between orientations of the targets and the radar line of sight. When the orientations of the same target are different from the radar line of sight, the scattering charact...
Abstract: To solve the problem that the traditional micro-Doppler feature extraction technologies are generally hard to achieve resolution and parameter estimation of multi-target, a novel curve overlap extrapolation algorithm for wide-band resolution of micro...
Abstract: In the system of distributed radar array system using phase interference angle measurement, the phase center coordinate error of arrays and the phase difference error have relatively large influence on the angle measurement. The phase center position...
Abstract: It makes the Pulse Doppler (PD) radar widely applied that the PD radar has the obvious advantages of detecting the Doppler frequency of the target and suppressing the clutter effectively. However, it is difficult for the PD radar to detect the target...
Abstract: In order to satisfy the requirement of elliptical beam antenna with low profile, a novel design technique of the hybrid-structural antenna with elliptical beam is proposed. The hybrid-structural antenna consists of the ring-focus elliptical antenna i...
Abstract: Based on the beam wave synchronization interaction in transverse and longitudinal directions at the same time and derived from Maxwell’s equation and linear Vlasov equation, the planar metallic grating beam-wave interaction " hot” dispersion equation...
Abstract: A novel wideband low RCS new super-surface array based on three reflective cell shared aperture is designed, which is composed of three kinds of Artificial Magnetic Conductor (AMC). Compared with the traditional AMC array, the new array uses one of A...
Abstract: The performance of the existing target localization algorithms is not ideal in complex acoustic environment. In order to improve this problem, a novel target binaural sound localization algorithm is presented. First, the algorithm uses binaural spect...
Abstract: Penalized programs are widely used to solve linear inverse problems in the presence of noise. For now, the study of the performance of panelized programs has two disadvantages. First, the results have some limitations on the tradeoff parameters. Seco...
Abstract: To solve the problem of weak signals detection in non-Gaussian background, a method based on Sigmoid function is proposed which is named Sigmoid Function Detector (SFD). Firstly, the non-Gaussian background is modeled as a mixed Gaussian model. Based...
Abstract: The propagation of acoustic signal in space has a strong multipath effect, and the receiver often overlaps in the form of convolution. Especially in strong reverberation conditions such as ocean and theatre, where the length of impulse response of hy...
Abstract: Outliers are non-Gaussian measurement values far from the bulk of data. In practical transmission, the signals added with outlier often have the heavy-tailed property. Particle filter is based on the Bayesian framework and applicable to the non-linea...
Abstract: The transient signal without modulation information of the radiation source can characterize the unintentional modulation characteristics of the radiation source. The analysis of the transient signal can realize the radiation source identification. I...
Abstract: In order to enhance the useful information in the image and improve the visual effect of the image, a Non-local Multi-scale Fractional Differential(NMFD) image enhancement operator is proposed. The operator divides the image into several sub-images a...
Abstract: A kind of restoration method of BP neural network fuzzy image based on Optimized Brain Storming intelligent Optimized(OBSO-BP) algorithm is proposed in this paper. With the method of brain storming intelligent optimized algorithm which is optimized i...
Abstract: The image forgery detection algorithm based on convolutional neural network can implement the image forgery detection that does not depend on a single image attribute by using the learning ability of convolutional neural network, and make up for the ...
Abstract: Due to the wide applications in association schemes, authentication codes and secret sharing schemes etc., construction of the linear codes with a few weights is an important research topic. A class of linear codes with four-weight and six-weight ove...
Abstract: Families of pseudorandom sequences derived from Euler quotients modulo odd prime power possess sound cryptographic properties. In this paper, according to the theory of residue class ring, a new classes of binary sequences with period \begin{document...
Abstract: In the Network Function Virtualization (NFV) environment, for the reliability problem of Service Function Chain (SFC) deployment, a joint optimization method is proposed for backup Virtual Network Function (VNF) selection, backup instance placement a...
Abstract: The close relationship between resource deployment and specific tasks in traditional Wireless Sensor Network(WSN) leads to low resource utilization and revenue. According to the dynamic changes of Virtual Sensor Network Request(VSNR), the resource al...
Abstract: A distributed algorithm based on modified Newton method is proposed to solve the nodes localization problem in large scale Wireless Sensor Network(WSN). The algorithm includes network partitioning and distributed algorithm. Firstly, the network is di...
Abstract: Considering the problem of scattered node mapping and more hops of link mapping in the traditional virtual network energy-saving embedding, the node and link are mapped simultaneously by using the minimum spanning tree topology of the virtual network...
Abstract: Facing changeable network environment, current Quality of Service (QoS)-aware flow aggregation scheme is lack of flexibility. A dynamic flow aggregation method to overcome present problems is proposed. An Enhanced Rough K-Means (ERKM) algorithm is us...
Abstract: Against the problem of low detection rate to detect small hardware Trojan by side-channel in physical environment, the Marginal Fisher Analysis (MFA) is introduced. On the basis, a hardware Trojan detection method based on Compression Marginal Fisher...