Abstract: HyperSpectral Image(HSI) has nanometer-level spectral discriminative ability, capturing the spectral and spatial information of the ground objects simultaneously, within the integration of three-dimensional image cube. The capability to finely sense ...
Abstract: Recently, ship target detection in Synthetic Aperture Radar (SAR) imagery based on deep learning has been widely developed. However, a large number of labeled samples are needed in traditionally supervised learning to train the network. Therefore, a ...
Abstract: Recent researches on semi-supervised bearing fault diagnosis based on Graph Neural Network (GNN) still have some problems, such as insufficient label information mining and relatively ideal diagnosis scenarios. In engineering practice, bearings are o...
Abstract: In most target localization applications, achieving high spatial resolution on angle and range is requested. Addressing this demand, a novel Graph Signal Processing (GSP) based target localization method for monostatic Frequency Diverse Array (FDA) i...
Abstract: The marine physical environment and electromagnetic environment are becoming increasingly complex, making the weak and slow small target detection in the sea clutter background be both emphasis and difficulty of radar target detection research. Due t...
Abstract: Considering the shortcomings of the Adaptive Visibility Graph (AVG) algorithm being too complex and the accuracy improvement is not significant, an Automatic Modulation Recognition(AMR) framework based on Single-channel Multi-scale Graph Neural Netwo...
Abstract: For the reconstruction of large-scale network data, a Distributed Batch Reconstruction algorithm via Sobolev Smoothness on Cartesian product graph (DBR-SSC) is proposed, which is based on the Graph Signal Processing (GSP) theory. In the proposed algo...
Abstract: In the post-Moore era, Chiplet is the most hottest integration technique for heterogeneous integrated circuit, which is characterized by complex multi-core stacked structures. In order to solve the post-bonding test problem of Chiplet in different st...
Abstract: For radar maritime target detection method of feature class, the convex hull classification algorithm is usually used in existing three feature detectors to complete detection. It is found that the decision region generated by convex hull learning al...
Abstract: Even though the internal and external SAR system calibration is very accurate, the accuracy of airborne fully polarimetric SAR measurement still changes to some extent under different flight conditions. In the condition of non-stationary and high fre...
Abstract: In-Band Full Duplex (IBFD) technique is expected to be the most potential scheme for modern wireless communication system, since it can prove the spectral efficiency. However, in the application process, it faces the great challenge of Self-Interfere...
Abstract: Phase noise limits the cancellation capability of a Full-Duplex (FD) transceiver receiver and degrades the demodulation performance of the signal-of-interest, even for the transceiver receiver which deploy one common oscillator for its transmitter an...
Abstract: In recent years, the deployment of Unmanned Aerial Vehicles (UAVs) equipped with Mobile Edge Computing (MEC) servers to provide computing services for ground users has become an emerging method. Considering an UAV-assisted MEC system with multi-users...
Abstract: In view of the surge in data traffic and the diversified needs of users in the future 6G network, using UAV to assist the cellular network can provide users with better services. This paper proposes a UAV trajectory planning and resource allocation j...
Abstract: To address the path planning and inter-aircraft collision avoidance problems in Unmanned Aerial Vehicle (UAV) formation reconstruction in complex electromagnetic environment, the repulsion function is improved by using distance factor on the basis of...
Abstract: A hybrid mapping scheme is proposed in this paper to improve further the Bit Error Rate (BER) performance of Orthogonal Frequency Division Multiplexing with Index Modulation (OFDM-IM) system for high Signal-to-Noise Ratio (SNR). By taking advantage o...
Abstract: To address the single point failure of group key management in the existing hierarchical Unmanned Aerial Vehicle (UAV) network, and the incapability of timely group key calculation and update caused by offline group members, a decentralized group key...
Abstract: With the rapid development of Internet of Things (IoT), the deep integration of Artificial Intelligence (AI) and Edge Computing (EC) has formed Edge AI. However, since IoT devices are computationally and communicationally constrained and these device...
Abstract: To improve the secure transmission performance of physical layer, a novel Multiple Parameters Weighted-type FRactional Fourier Transform (MP-WFRFT) secure communication method based on Two-Dimensional Cosine Power-Activation (2D-CPA) discrete hyperch...
Abstract: In the case of large gathering of users such as sports venues or sudden disasters, the ground base stations often face the problem of overloading or even paralysing. In this case, the multi-Unmanned Aerial Vehicle (UAV) auxiliary network system can p...
Abstract: A Reconfigurable Intelligent Surface (RIS)-assisted spectrum sharing Cognitive Radio (CR) Multiple-Input Multiple-Output (MIMO) wireless secure communication system is considered. In the case of eavesdropper, the secondary transmitter equippes with m...
Abstract: To demodulate the Weighted FRactional Fourier Transform encrypted Chaotic Direct Sequence Spread Spectrum (WFRFT-CD3S) signal over multipath fading channels, a generalized channel differential demodulation algorithm is proposed. The transmitter of th...
Abstract: Secure Multiparty Computation (SMC) of sets has wide applications in joint data analysis, secure search over sensitive data, data security exchange. Based on geometric coding of rational numbers and the scalar product protocol, two secure computation...
Abstract: Constructing quantum codes with good parameters is an important part of quantum error-correcting codes research. In this paper, \begin{document}$ {2^m} $\end{document}-ary quantum codes are derived through Hermitian dual-containing constacyclic codes...
Abstract: To cope with the moving objects in dynamic environments and make the robots truly understand the surroundings, a visual Simultaneous Localization And Mapping (SLAM) system is proposed to estimate simultaneously trajectory and object-level dense 3D se...
Abstract: To address the problem of insufficient target feature mining in nighttime marine boat detection based on low light remote sensing images, a new sparsity index is designed to minimize the misclassification of boat lights samples and background noises ...
Abstract: Considering the problems of the existing in the process of multi-party human-computer interaction system, such as lack of propriety and low autonomy, a dialogue psychological model based on Stackelberg game is proposed in this paper. The multi-party ...
Abstract: An efficient photodetector placement method using Linear Optimization Fuzzy C-Means (LOFCM) and Artificial Neural Networks (ANN) is proposed for the problem that the current photodetector placement method is computationally intensive, energy intensiv...
Abstract: Considering the problems of breast tumor size and shape change, blurred boundary and severe class imbalance between foreground and background, a multi-scale residual dual-domain attention fusion network is proposed. In this network, multi-scale resid...
Abstract: micro RiboNucleic Acid (miRNA) plays an important role in the process of gene expression and transcription, and is closely related to the production of diseases. Biological experimental methods for disease miRNA association prediction are costly and ...
Abstract: Considering the characteristics of irregular retinal blood vessel topology, complex morphology and diverse scale changes, a Multi-resolution Fusion Input U-Netword (MFIU-Net) is proposed to achieve accurate segmentation of retinal blood vessels. A ro...
Abstract: Cross-modal medical images can provide more semantic information at the same lesion. In view of the U-Net network uses mainly single-modal images for segmentation, the cross-modal and contextual semantic correlations are not fully considered. Therefo...
Abstract: To realize the generation of the navigation knowledge and the running control driven by goal for the intelligent and autonomous vehicle, a biological inspired Goal-Oriented (GO) navigation model based on spatial exploration and construction of cognit...
Abstract: For the training time of deep learning network is long, as well as larger distribution difference between source domain and target domain data of rolling bearings under different loads, a fast classification method of rolling bearing state based on i...
Abstract: Due to its relatively higher accuracy, the Anchor base algorithm has become a research hotspot for pedestrian detection in crowded scenes. However, the algorithm needs to design manually anchor boxes, which limits its generality. At the same time, a ...
Abstract: In the face verification task of the face recognition model, traditional adversarial attack methods can not quickly generate real and natural adversarial examples, and the adversarial examples generated for one model under the white-box setting perfo...
Abstract: A multiple valued current mode comparator is introduced to control the threshold of current mode CMOS circuits. Compared with binary logic circuits, a single wire of multiple valued logic circuits allows more information transmission. Compared with v...
Abstract: With the rapid development of new technologies, such as the Internet and big data, more and more distributed data need to be processed by multiple parties. Therefore, privacy protection technology is facing greater challenges. Secure multi-party comp...
Abstract: Compared with the Fifth Generation mobile network (5G), the Sixth Generation mobile network (6G) is expected to introduce new performance indicators and application scenarios. Global coverage, high spectrum/energy/cost efficiency, high level of intel...
Abstract: Memory wall has become one of the key challenges in Von Neumann architecture, memory-centric computing architectures, such as In-Memory Computing (IMC) and Near-Memory Computing (NMC) are expected to break the Von-Neumann bottleneck, improving comput...
Abstract: Software-Defined Networking (SDN) is the key technique of the next-generation network. Recently, SDN has become a hot spot in both academia and industry. Wide Area Network (WAN) is one of the primary application scenarios in the industry for SDN, whi...