Abstract: It is known from electromagnetic momentum that electromagnetic waves can carry Spin Angular Momentum (SAM) related to polarization and Orbital Angular Momentum (OAM) related to the trajectory of the Poynting vector. When OAM is not zero, the wave-fro...
Abstract: Considering the intelligent decision of battlefield communication countermeasure, based on the overall confrontation, a Bootstrapped expert trajectory memory replay - Hierarchical reinforcement learning - Jamming resources distribution decision - Mak...
Abstract: Mobile communication applications scenarios are becoming complexity and diversity. It is difficult to have a universal transmission waveform to meet all communication needs, which puts forward high requirements for the coordination and collaboration ...
Abstract: Near-field source localization is a potential research topic in next-generation wireless communications. Most existing methods focus on traditional subspace based methods or on-grid sparse methods. For the problem that the accuracy of subspace class ...
Abstract: For time-division duplex massive MIMO systems, two new downlink precoding schemes are proposed, namely New Maximum Ratio Combining (NMRC) and New Zero-Forcing (NZF) scheme. Through theoretical analysis, the expressions of downlink signal to interfere...
Abstract: To deal with the dynamic nature of 5G network resource state and the difficulty of service function chain deployment under the high-dimensional network state model, an online Service function Chain Deployment method based on Deep Q network (DeePSCD) ...
Abstract: An Orthogonal MultiUser Short Reference High Rate DCSK (OMU-SRHR-DCSK) communication system is proposed to solve the problem of low transmission rate and low energy efficiency of traditional MultiUser Short Reference Differential Chaos Shift Keying c...
Abstract: The existing physical layer authentication mechanism relies on the privacy of the legitimate channel. Once the attacker can manipulate or obtain legitimate channel information, the physical layer authentication mechanism will face the threat of being...
Abstract: The influence of channel construction process on the algorithm performance is not considered in the existing polar code puncturing algorithms. To solve this problem, a Puncturing algorithm of Polar Code based on Gaussian Approximation (GAPPC) is prop...
Abstract: The wireless communication technology based on Orbital Angular Momentum (OAM) can greatly improve the performance of the communication system under ideal transmission conditions. However, in the actual environment, atmospheric turbulence and aperture...
Abstract: In order to better correct the nonlinear characteristics of Power Amplifier (PA), conventional broadband Digital PreDistortion (DPD) requires usually the feedback channel bandwidth to be 5 times of the transmitting signal bandwidth, and Analog to Dig...
Abstract: In the research of matching navigation and precision guidance using spaceborne SAR image as the reference image and airborne/missile SAR image as the real-time image, the traditional point feature-based matching method has too many feature points, hi...
Abstract: Due to the weak energy of the floating small targets, it is hard to be detected in sea surface. Relying on the energy, the traditional detectors based on statistical model inevitable loss the detection performance, regardless of the correlation betwe...
Abstract: Reference signal reconstruction is one of the key technologies for signal processing of passive radar based on digital TV signals. The quality of the reconstructed signal affects directly the time-domain clutter suppression effect of the surveillance...
Abstract: Considering the issue of poor target detection performance of millimeter-wave radar caused by the limited platform space and transmitting power in the case of autonomous driving, a joint design approach of waveform parameters and receiving weight is ...
Abstract: The available deception anti-jamming methods in multistatic radar can not be applied to multiple jamming sources. In view of this problem, a clustering analysis-based method is proposed to discriminate active false targets in multistatic radar, accor...
Abstract: The Foreign Objects Debris (FOD) detection technology based on millimeter wave radar has the advantages of high resolution and low power consumption, but the traditional Constant False Alarm Rate (CFAR) detection algorithm has high false alarm probab...
Abstract: In the problem of sub-Nyquist sampled pulse Doppler radar signals, the existing methods have poor anti-noise performance, and the subsequent parameter estimation in the sequential parameter estimation methods is seriously affected by the accuracy of ...
Abstract: The existing target depth classification methods based on acoustic interference structure characteristics have a limited frequency range, and are only suitable for the case where target frequency can excite first two modes. Aiming to this problem, a ...
Abstract: Compared with traditional swarm intelligence optimization algorithms, the Whale Optimization Algorithm(WOA) has better optimization capabilities and robustness, but there are still problems such as limited global optimization capabilities and difficu...
Abstract: With the development of human-computer interaction, gesture recognition is becoming more and more important. At the same time, mobile terminal applications are developing rapidly, it is a development trend to implement human-computer interaction tech...
Abstract: Recently in speaker recognition tasks, consistent performance gains have been continually achieved by various Convolutional Neural Networks (CNNs), which have shown increasingly stronger multiscale representation abilities. However, most existing met...
Abstract: Hill climbing algorithm has too large search space and is easy to fall into local optimum. In this paper, a new Bayesian network structure algorithm based on V-structure & log-likelihood orientation and Tabu Hill (VTH) climbing is proposed. The a...
Abstract: At present, aspect-level sentiment analysis uses mainly the method of combining attention mechanism and traditional neural network to model aspect and contextual words.These methods ignore the syntactic dependency information and position information...
Abstract: In order to meet the requirement of low resource cost and mixed noise suppression for outdoor target detection based on rotor Unmanned Aerial Vehicle (UAV), a mixed noise suppression algorithm based on Developable Local Surface (DLS) is proposed. Thi...
Abstract: It needs a large number of training sets with annotation information to classify microstructure images of steel materials by deep learning. To solve the problem of low efficiency of manual image annotation, a new semi-supervised learning method combi...
Abstract: Capsule network is a new type of network model which is different from convolutional neural network. This paper attempts to improve its generalization and accuracy. Firstly, variational routing is used to alleviate the problem of classic routing that...
Abstract: Early diagnosis of dementia is critical for timely treatment and intervention. Alzheimer’s Disease(AD) classification is an effective method on identifying AD at its early stage. In this paper, a feature selection method using improved Gauss fuzzy lo...
Abstract: Using the methods of Optical Character Recognition (OCR) to detect and recognize the seal characters can speed up the classification speed and identification efficiency of all kinds of contracts. According to the characteristics of the cycle seal cha...
Abstract: Object tracking based on structured SVM attracts much attention due to its excellent performance. However, the existing methods have the problem of imbalance between positive and negative samples. To solve the problem, a cost sensitive structured SVM...
Abstract: As a traditional feature extraction algorithm, Canonical Correlation Analysis (CCA) has been excellently used for the field of pattern recognition. It aims to find the projection direction that makes the maximum of the correlation between two groups ...
Abstract: Conditional Proxy Re-Encryption (CPRE) can grant fine-grained authorization to the original ciphertext according to the conditions. The existing CPRE schemes only check the conditions of the original ciphertext, but ignore the conditions of the re-en...
Abstract: SIMON algorithm is a group of lightweight block cipher algorithms introduced by the National Security Agency (NSA) in 2013. It has the advantages of low implementation cost and good security performance. Its round function adopts \begin{document}$F(x...
Abstract: Although Deep Neural Networks (DNN) achieves high accuracy in image recognition, it is significantly vulnerable to adversarial examples. Adversarial training is one of the effective methods to resist adversarial examples empirically. Generating more ...
Abstract: In this paper, a new locally active memristor is proposed. The characteristics and local activity of the memristor are analyzed by using standard nonlinear theory and the circuit theoretic technique direct current loci. Furthermore, the locally activ...
Abstract: In this paper, a passive flux-controlled memristor is used to replace the diode series-parallel branch in the Shinriki oscillator, and the active flux-controlled memristor is introduced to substitute the resistance in the RLC resonant loop. At the sa...