Abstract: Computational microwave imaging based on metamaterial aperture can be considered as microwave compression sensing imaging. The imaging effect of this imaging method is seriously affected by the grid mismatch error. In this paper, a Two-Dimensional (2...
Abstract: This paper presents an electromagnetic metasurface structure with partially polarization-conversion and partially reflection functions and its application to the Fabry-Perot (F-P) cavity antenna design with wideband, high-gain and Circularly Polarize...
Abstract: This paper proposes a novel design strategy for wideband ultralow-profile Folded TransmitArray (FTA) antenna using metasurfaces. It consists of two kinds of metasurfaces and an open waveguide antenna as the feed source. The bottom metasurface is appl...
Abstract: In this paper, to simplify the control circuit of the Reconfigurable TransmitArray(RTA), a RTA based on row-column beamsteering method is proposed, which is composed of a double-layer Frequency Selective Surfaces(FSS). By tunning a capacitance value ...
Abstract: In this paper, a new type of foam material PolyMethacrylimIde (PMI) is used to design a millimeter-wave Luneburg lens antenna for the detection of complex space environment. By correlating the density of the foam material with the dielectric constant...
Abstract: Polarization conversion has important research significance and application value in the field of terahertz modulation. Traditional polarization conversion devices have many shortcomings, such as large size, low integration, high loss and narrow band...
Abstract: In order to meet the demand for passive ranging of sound sources in shallow water, a normal mode separation and ranging method based on a large-aperture horizontal array is proposed. This method deals with the problem of modal separation that caused ...
Abstract: The rapid development of Hypersonic Glide Vehicle (HGV) has changed the traditional combat style and opened a new field of military struggle. Identifying the maneuvering state of HGV can provide a powerful support for threat assessment, trajectory pr...
Abstract: There are some mismatches for the estimation of signal parameters in mult-dimention Estimating Signal Parameter via Rotational Invariance Techniques (ESPRIT) algorithm. In this paper, a parameter pairing method based on eigenvalue fractal dimension i...
Abstract: For the problem of Phased Array Radar (PAR) has excessive resource consumption and low measurement accuracy in the process of detecting Hypersonic Gliding Vehicle (HGV). An adaptive radar power allocation method based Radar Cross-Section (RCS) predic...
Abstract: Considering the problem of the low resolution of the Capon Power Spectrum (CPS) in the reconstruction of Interference plus Noise Covariance Matrix (INCM), two Robust Adaptive Beamforming (RAB) algorithms are proposed. The proposed algorithm first sea...
Abstract: For the problem that the results of multi-sensor measurement iteratively updating Gaussian Mixture Probability Hypothesis Density (GM-PHD) tracking algorithm is sensitive to the updating order if the qualities of multi-sensor observation data are dif...
Abstract: Armored target is currently great threatened by passive millimeter wave detection and guidance technology. An active cancellation millimeter-wave stealth method is proposed for enhancing the survivability of armored target in the future battlefield. ...
Abstract: Focusing on how to improve the system spectral efficiency of Prolate Spheroidal Wave Functions(PSWFs) multi-carrier modulation system, a third constellation composed of additional constellation points on the basis of multi-carrier index modulation ba...
Abstract: Focusing on the problem that the free space propagation model could only describe the propagation characteristics of vortex channel carrying Orbital Angular Momentum (OAM) in free space scenario, and the deterministic sparse multipath vortex channel ...
Abstract: The architecture of Deep Neural Network (DNN) based detectors can affect the Symbol Detection (SD) accuracy and computational complexity. However, most of the works ignore the architecture selection method when establishing a DNN-based symbol detecto...
Abstract: Considering the problems of high mobility and abnormal nodes in Unmanned Aerial Vehicle (UAV) communication, a Deep reinforcement learning based Trusted Geographic Routing protocol (DTGR) is proposed. A trusted third party is introduced to provide th...
Abstract: In ultra dense heterogeneous wireless networks, a vertical handoff algorithm considering Load Balancing and User Experience (LBUE) is proposed to solve the problem of network congestion caused by large-scale mobile terminals clustering in short time ...
Abstract: In order to solve the problem that the self-interference is difficult to eliminate in the transceiver system of the repeater jammer, a self-interference cancellation algorithm based on Deep Neural Network(DNN) is presented in this paper. This propose...
Abstract: With the development of the Internet of Things, the demand for timeliness of information is increasing, and the freshness of information is becoming crucial. In order to maintain the freshness of information, the transmission scenario of multiple dev...
Abstract: The existing indoor visible light positioning systems focus more on the positioning accuracy improvement and ignores the system's decoding success rate and the applicability of the positioning algorithm. The specific aspects are as follows: (1) Captu...
Abstract: In the edge computing environment, the edge nodes have various kinds, wide distribution range and great differences in working environment, which makes the data security guarantee become very complicated. It is difficult to evaluate the credibility o...
Abstract: To address the problems of channel interference and inadequate utilization of spectrum resources in Wireless Mesh Networks (WMN) in the context of emergency communications, an Improved Discrete Bat Algorithm (IDBA) is proposed for solving the optimal...
Abstract: With the pervasiveness of secure data transmission techniques and increasing requirements of information authentication, the public key-based digital signature scheme has been extensively used in various fields. However, the process speed of digital ...
Abstract: For improving the resolution of quantum decrypted image and computation complexity under the premise of ensuring quantum image cryptography algorithm security, an approach to quantum image chaotic encryption scheme based on Arnold transforms is propo...
Abstract: At present, network security and privacy have attracted extensive attention. Forward security is a security attribute of Authenticated Key Agreement protocol (AKA) proposed by Günther in 1989. Since then, this property has become one of the hot topic...
Abstract: Based on orthogonal matrices, constructions of two Zero Correlation Zone (ZCZ) Aperiodic Complementary Sequence Sets (ZACSS) are proposed through different matrix transformation methods. Under the condition that the order of the orthogonal matrices c...
Abstract: Few-weight linear codes have important applications in constructing authentication codes, association schemes and secret sharing schemes. How to construct few-weight linear codes has always been an important topic of coding theory. In this paper, irr...
Abstract: Timed-Release Encryption (TRE) is a cryptographic primitive called "sending messages into the future", the receiver can not decrypt the ciphertext until a designed time in the future. Currently, most TRE schemes use a non-interactive single time serv...
Abstract: The nonlinear functions introduced into the existing multi-scroll attractor chaotic systems are mostly step function, saturation function, multi-logic level pulse function and so on. Therefore, the system hardware complexity increases with the increa...
Abstract: In order to solve the problems of low embedding rate of reversible data hiding in encrypted domain with multi-users and weak disaster tolerance of cover image, a reversible data hiding in encrypted images based on polynomial secret sharing scheme is ...
Abstract: Medical cloud storage service is one of the most significant applications in cloud computing. Simultaneously, the integrity of outsourced medical data and users’ identity privacy-preservation have been more and more important. To this end, an outsour...
Abstract: Three Dimensional-High Efficiency Video Coding (3D-HEVC) standard is the latest Three-Dimensional (3D) video coding standard, but the coding complexity increases greatly due to the introduction of depth map coding technology. Among them, the quad-tre...
Abstract: Hive's existing audit function can not make compliance judgment on the purpose of data operation. To solve the above problems, a Hive data operation compliance analysis method based on subgraph isomorphism is proposed. Firstly, the modeling method of...
Abstract: In order to solve the problems that traditional knowledge reasoning methods can not combine computing power and interpretability, and it is difficult to learn quickly in few-shot scenarios, a Model-Agnostic Meta-Learning (MAML) reasoning framework is...
Abstract: In order to reduce the co-adaptability interference of the original feature to the Non-negative Matrix Factorization (NMF) algorithm and improve the performance of non-negative matrix factorization subspace learning and clustering performance, a nove...
Abstract: With the continuous development of video acquisition equipment and technology, the number of videos has grown rapidly. It is a challenging task in video retrieval to find target video moments accurately in massive videos. Cross-modal video moment ret...
Abstract: Infrared and visible image fusion algorithms based on deep learning rely on artificially designed similarity functions to measure the similarity between input and output. The unsupervised learning method can not effectively utilize the ability of neu...
Abstract: With the rapid development of aerospace electronic technology, especially the wide use of Commercial Off-The-Shelf(COTS), the space computing capacity has increased significantly. Space edge computing organizes the widely dispersed space-based comput...
Abstract: The rapid development of depth sensor and laser scanning technology allows people to collect easily a large amount of point cloud data. Point cloud data can provide rich scene and object information, and has become the preferred research object for a...