

Email alert
A new prompt 2-D attitude steering approach for zero Doppler centroid of GEOsynchronous SAR (GEOSAR) is proposed. Large yaw angle of GEOSAR in traditional 2-D yaw steering condition can be solved by this method. It is suited to the large satellite su...
The traditional methods based on CFAR and Kernel Density Estimation (KDE) for SAR ship candidate region extraction has the following defects: The choice of false alarm rate of CFAR depends on artificial experience; CFAR only models the sea clutter di...
Due to the selection of dominant scatterers is easy to be affected by noise, a novel Inverse Synthetic Aperture Radar (ISAR) cross-range scaling algorithm based on image contrast maximization is proposed, which can realize the cross-range scaling whi...
Three dimensional interferometry of wide-band radar can provide crucial information for estimating the micro-motion and geometric parameters of targets. For estimation of the micro-motion parameters via three dimensional interferometry in the case of...
Focusing on the clutter suppression problem of the airborne Multiple Input Multiple Output (MIMO) radar, an improved method based on Knowledge-Aided Space-Time Adaptive signal Processing (KA-STAP) algorithm is proposed. The clutter subspace is constr...
Integration of radar and communication on the electronic war platform is an effective method to reduce volume and enhance spectrum usage and efficiency. A transmitted pattern based on OFDM-LFM MIMO radar is designed to realize the integration of rada...
For the problem of hydrometeor classification in the presence of ground clutter, traditional methods produce large classification errors under different weather and environmental conditions. A new method for the classification of Hydrometeor based on...
In view of the strong anti-jamming capability of monopulse radar, the cross eye is used to interfere with monopulse radar. Monopulse radar is widely used in missile terminal guidance for precise attack on aircraft and ship targets. Based on the radar...
A multi-parameter convolutional neural network method is proposed for gesture recognition based on Frequency Modulated Continuous Wave (FMCW) radar. A multidimensional parameter dataset is constructed for gestures by performing time-frequency analysi...
To improve the location resolution of electromagnetic radiation source, a ultra-short baseline network CASMA (Mini-Array by Chinese Academy of Sciences) is proposed for detection, utilizing optical fiber for timing. CASMA contains 5 electromagnetic d...
To test the radiated interference E-field threshold of Equipment Under Test (EUT) with common-mode interference of transmission lines in reverberation chambers and unify the test results with the open areas, the range of the maximum directivity of th...
In order to realize safety, reliability and self-control of electromagnetic computing, the large-scale parallel MoM is studied based on domestically-made many-core supercomputer platform named " Tianhe-2”. A new LU decomposition algorithm named Block...
For the requirement of broadband interference suppression for passive sonar, a robust broadband interference suppression algorithm using few snapshots is proposed. Based on the estimated bearing of the broadband interference, the algorithm obtains th...
In view of the problem that the existing methods are not applicable or are only feasible to the case where only a low ratio of data are missing in multivariable time series, a missing data prediction algorithm is proposed based on Kronecker Compresse...
In order to solve the dictionary mismatch problem of Compressive Sensing (CS) based multi-target Device-Free Localization (DFL) under the wireless localization environments, a Variational Expectation Maximization (VEM) based dictionary refinement met...
The Grey Wolf Optimizer (GWO) algorithm mimics the leadership hierarchy and hunting mechanism of grey wolves in nature, and it is an algorithm with high level of exploration and exploitation capability. This algorithm has good performance in searchin...
When modeling user preferences, the current researches of recommendation ignore the problem of modeling initialization and the review information accompanied with rating information for recommender models, integrating deep learning into the recommend...
In order to improve the ability of anti-chosen plaintext attack and decryption quality under unknown attack in current optical encryption technology, an optical image encryption algorithm based on chaotic Gyrator transform and differential mixed mask...
By means of Zero-mean Microstructure Pattern Binarization (ZMPB), an image representation method based on image local microstructure binary pattern extraction is proposed. The method can express all the important patterns with visual meaning that may...
Considering the low recognition accuracy of behavior recognition from different perspectives at present, this paper presents a perspective-independent method for depth videos. Firstly, the fully connected layer of depth Convolution Neural Network (CN...
To solve sparse signal processing problem with structural noise interference, a method of sensing matrix optimization design based on sparse Bayesian theory is proposed. Combining the sparse signal model with additive interference, the design of the ...
For the problems of the Composite Binary Offset Carrier (CBOC) signal pseudo code period and combination code sequence are difficult to estimate in a non-cooperative context, two blind methods are proposed based on power spectrum reprocessing and Rad...
Audio clipping distortion can be solved by the Consistent Iterative Hard Thresholding (CIHT) algorithm, but the performance of restoration will decrease when the clipping degree is large, so, an algorithm based on adaptive threshold is proposed. The ...
For the problem of the finite word length effect of prototype filters in hardware implementation of the filter bank system, this paper studies how to improve the performance of roundoff noise caused by signal quantization for the FIR prototype filter...
FIR notch filter has many advantages such as linear phase, high precision and good stability. However, when the notch performance is required to be high, a higher order is usually required, resulting in increased greatly hardware complexity of the FI...
To establish effective backhaul connection in multi-tiers Heterogeneous Network (HetNet), by exploiting advanced Non-Orthogonal Multiple Access (NOMA) a novel in-band wireless backhaul scheme is proposed at full-duplex Small cell Base Stations (SBSs)...
The millimeter-wave hybrid beamforming becomes a widely accepted beamforming method in millimeter-wave systems. However there is almost no hybrid beamforming algorithm based on security. Especially when the eavesdropper has multi-user decoding capabi...
To solve the long decoding latency caused by the serial nature of the decoding of polar codes, a pre-decoding based maximum-likelihood simplified successive-cancellation decoding algorithm is proposed. First, the signs of the likelihood values stored...
Focusing on the reconnaissance mission of Unmanned Aerial Vehicle (UAV) swarm under complex battlefield environment, the non-uniform energy consumption during the information transmission between UAVs affects the efficient implementation of the recon...
With the development of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) can be deployed in a common platform such as virtual machines in the form of Service Function Chaining (SFC), providing flexibility for management. Howeve...
Request acceptance rate and energy saving are the two most important indicators in the virtual network mapping process. However, the current virtual network embedding problem considers only a single index, ignoring the correlation and constraints bet...
With the rapid growth of Data Center Network (DCN) traffic, how to improve the performance and service quality of data center network become a research hotspot. However, when the network load increases, the existing traffic scheduling algorithm on th...
The existing virtual network reconfiguration algorithms do not consider the fragment resources generated in the physical network, which results in the improvement of the performance of the online virtual network embedding algorithms is not obvious. T...
Trust based access control is a research hotspot in open network that access control is one of the importation technology of information security. For the interactive access behaviors of non-honest cooperation between network interactive entities in ...
The misuse of signcryption ciphertext means that the malicious recipient uses the received signcryption ciphertext to forge a new ciphertext that has a different recipient. It is found that the Existential UnForgeability against adaptive Chosen Messa...