

Email alert
Securely sharing and publishing location trajectory data relies on support of location privacy protection technology. Prior to the advent of differential privacy, K-anonymity and its derived models provide a means of quantitative assessment of locati...
Quantum walks are raised for teleporting qubit or qudit. Based on quantum walk teleportation, an arbitrated quantum signature scheme with quantum walks on regular graphs is suggested, in which the entanglement source does not need preparing ahead. In...
To improve the efficiency of the triangularization of ideal lattice basis, a fast algorithm for triangularizing an ideal lattice basis is proposed by studying the polynomial structure, which runs in time O(n3log2B), where n is the dimension of the la...
In radio monitoring and target location applications, the received signals are often affected by complex electromagnetic environment, such as impulsive noise and cochannel interference. Traditional signal processing methods based on second-order stat...
Automatic Target Recognition(ATR) is an important research area in the field of radar information processing. Because the deep Convolution Neural Network(CNN) does not need to carry out feature engineering and the performance of image classification ...
In the complex electromagnetic environment, multipath clutter in passive radar may be nonstationary and has jump characteristics. In order to suppress this kind of non-stationary clutter, a clutter suppression method is proposed based on channel segm...
Insect radar is the most effective tool for insect migration observation. In order to realize target recognition of insect radar, it is important to study the RCS characteristics of insects. This paper will analyze the static and dynamic Radar Cross ...
The current Synthetic Aperture Radar (SAR) target detection methods based on Convolutional Neural Network (CNN) rely on a large amount of slice-level labeled train samples. However, it takes a lot of labor and material resources to label the SAR imag...
A micro-motion gesture recognition method based on multi-channel Frequency Modulated Continuous Wave (FMCW) millimeter wave radar is proposed, and an optimal radar parameter design criterion for feature extraction of micro-motion gestures is presente...
The millimeter wave radar is robust against various environments such as rain, fog, snow. It has huge potentials in applications such as automotive radars, intelligent robots. At the same time, the rapid development of silicon technology improves the...
Ground Penetrating Radar (GPR), as a non-destructive technology, has been widely used to detect, locate, and characterize subsurface objects. Example applications include underground utility mapping and bridge deck deterioration assessment. However, ...
Pattern recognition algorithms can discover valuable information from mass data of biomedical images as guide for basic research and clinical application. In recent years, with improvement of the theory and practice of pattern recognition and machine...
Image thresholding methods based on the rough entropy segment the images without prior information except the images. There are two problems to be considered in the rough entropy based thresholding methods, i.e., measuring the incompleteness of knowl...
Compressed Sensing (CS) theory is one of the most active research fields in electronic information engineering. CS theory overcomes the limits dictated by Nyquist sampling theorem. Compared to the required minimum sampling quantity, CS proves that th...
The massive high-dimensional measurements accumulated by distributed control systems bring great computational and modeling complexity to the traditional fault diagnosis algorithms, which fail to take advantage of the higher-order information for onl...
Protograph Low Density Parity Check (P-LDPC) code is widely used in various communication systems. In order to meet the requirements of error correction performance, hardware resource loss and power consumption in different application scenarios, fur...
In order to reduce the delay of computing tasks and the total cost of the system, Mobile Eedge Computing (MEC) technology is applied to vehicular networks to improve further the service quality. The delay problem of vehicular networks is studied with...
Unbalanced load on the edge computing server will seriously affect service capabilities, a task scheduling strategy Reinforced Q-learning-Automatic Intent Picking (RQ-AIP) for edge computing scenarios is proposed. Firstly, the load balance of the ent...