

Email alert
Since the echo characteristics of moving targets are different from that of stationary targets, the traditional reconstruction filter bank algorithm, i.e., the reconstruction filter algorithm, is not applicable. In this paper, a novel reconstruction ...
The wide-swath interferometric altimeter working at near-nadir is a newly developed ocean surface topography measurement technology in recent years. Different from land elevation measurement, for the dynamic ocean surface waves, they move randomly al...
An observer is placed on the airborne in the multistatic passive radar localization system. The error in observer position may seriously affect the localization accuracy. An algebraic closed-form solution is proposed for 3D localization of multistati...
To effectively detect sea surface targets by the passive interferometric microwave technology considered as an important complement for the space-based early warning system of China, a detection algorithm is proposed based on the Passive Interferomet...
In order to solve the problem of geomagnetic interference and model nonlinearity in the tracking process of magnetic dipole under geomagnetic background, Monte Carlo Kalman Filter (MCKF) tracking method based on differential magnetic anomaly is propo...
Linear Tapered Slot Antennas (TSA) have significant advantages over traditional horn antennas, dielectric rod antenna when used as feed elements in Focal Plane Arrays (FPA) of Passive MilliMeter Wave(PMMW) imaging. In this paper, a novel Antipodal Li...
Focusing on the problem of rather large estimation error in the traditional Direction Of Arrival (DOA) estimation algorithm induced by finite subsampling, a robust DOA estimation method based on Sparseand Low Rank Decomposition (SLRD) is proposed in ...
In existing null broadening algorithm, the taper matrix does not contain phase information, and when it is used to against strong directional and large deviation angle interference, the null depth becomes shallow and the interference suppression perf...
In through-the-wall scene, due to the serious attenuation of signal caused by wall, the energy of target reflection signal in the received signal decreases significantly and the received signal is submerged in the direct signal of the transceiver and...
In order to completely remove the spurious-peak side effect in the undersampling based wide-band spectral analysis, this paper proposes a high-performance co-prime spectral analysis method based on paralleled all-phase point-pass filtering. On basis ...
As one of the key 5G technologies, Non-Orthogonal Multiple Access (NOMA) can improve spectrum efficiency and increase the number of user connections by utilizing the resources in a non-orthogonal manner. In the uplink grant-free NOMA system, the Comp...
In the heterogeneous wireless networks, the parameter weight is difficult to determine for the vertical handover algorithm considering the parameters of the network and the user, at the same time, the vertical handover algorithm based on fuzzy logic ...
Considering the interference problem of overlapping areas of cells, the service continuity of mobile users and the utilization of spectrum resources in the 5G network, an Energy Efficient resource allocation scheme for the Inactive user(EEI) is propo...
In the emerging vehicular networks, the task of the car terminal requesting offloading has more stringent requirements for network bandwidth and offload delay, and the proposed Mobile Edge Computing (MEC) in the new communication network research sol...
Link prediction considers to discover the unknown or missing links of complex networks by using the existing topology or other information. Resource Allocation index can achieve a good performance with low complexity. However, it ignores the path eff...
In Software-Defined Networking (SDN) with distributed control plane, network expansion problems arise due to network domain management. To address this issue, a Traffic Engineering-based control Resource Optimization (TERO) mechanism of SDN is propos...
In order to solve the Virtual Network Function (VNF) migration optimization problem caused by the dynamicity of service requests on the 5G network slicing architecture, firstly, a stochastic optimization model based on Constrained Markov Decision Pro...
Existing Point-Of-Interest (POI) recommendation algorithms lack adaptability for users with different check-in features. To solve this problem, an adaptive POI recommendation method UCA-TS based on User Check-in Activity (UCA) feature and Temporal-Sp...
Orthogonal Frequency Division Multiplexing(OFDM) is widely used in wireless communication systems, and its data transmission security has certain practical significance. A double encryption scheme is proposed which enhances the confidentiality of the...
In view of the problems of low attack detection rate and high false positive rate caused by poor accuracy and robustness of the extracted traffic features in network traffic anomaly detection, a network traffic anomaly detection method based on deep ...
The decision on computation offloading to Mobile Edge Computing (MEC) may expose user’s characteristics and cause the user to be locked. A privacy-aware computation offloading method based on Lyapunov optimization is proposed in this paper. Firstly, ...
Live migration of Virtual Machines(VMs) across WANs is an important support for multi-datacenter cloud computing environments. The current live migration of VMs across WANs faces many technical challenges due to the limitations of small bandwidth and...
The SIMON block cipher receives extensive attention since its proposed. With respect to integral attacks, some integral attacks on SIMON32 and SIMON48 are presented by Wang, Fu and Chu et al. In this paper, on the basis of the existing analysis resul...
The application of Dynamic Voltage Scaling (DVS) technique in real-time system energy management will result in the decrease of system reliability. A dynamic energy management method based on Improved Bird Swarm Algorithm (IoBSA) is proposed in this ...
It is of great significance to optimize emergency resource schedule for earthquake emergency rescue. The conflicting multiple schedule goals, such as time, fairness, and cost, should be taken into consideration together in an earthquake emergency res...
A new ensemble TSK fuzzy classifier (i,e. IK-D-TSK) is proposed. First, all zero-order TSK fuzzy sub-classifiers are organized in a parallel way, then the output of each sub-classifier is augmented to the original (validation) input space, finally, t...
In view of shortcomings of dark channel prior dehazing methods, such as transmission in sky areas is small and halo effects are prone to occur in the edges, this paper proposes a novel and efficient dehazing algorithm. Firstly, the fan-shaped model w...
To improve performance of denoising and edge preservation of the total variational image denoising model, a curvature difference driven minimal surface filter is proposed. Firstly, the presented filter model is constructed by adding an adaptive edge ...
Existing few-shot methods have problems that feature extraction scale is single, the learned class representations are inaccurate, the similarity calculation still relies on standard metrics. In order to solve the above problems, multi-level attentio...
Based on the in-depth research on the S-box constitution arithmetic of composite, an area optimized generic low-entropy higher-order masking scheme is proposed in this paper. The low entropy masking method is introduced on GF(24), and the partial mod...
To improve bandwidth, efficiency and linearity of Envelope Tracking (ET) architecture, it is necessary to optimize the performance of envelope supply modulator and linearize nonlinear behavior of the ET system. The optimization procedure of the suppl...