In the conventional zero-forcing successive interference cancellation (ZF-SIC) detection algorithm of vertical Bell-Labs layered space-time (V-BLAST) architecture, the detection algorithm does not attempt to eliminate...
详细信息
In the conventional zero-forcing successive interference cancellation (ZF-SIC) detection algorithm of vertical Bell-Labs layered space-time (V-BLAST) architecture, the detection algorithm does not attempt to eliminate the effect of the error propagation, which is significantly deleterious to hybrid automatic repeat request (H-ARQ) scheme using bit-level Chase combining. Based on two ordering approaches respectively, we propose two novel H-ARQ bit-level Chase combining algorithms in this paper, which employ a new log-likelihood ratio (LLR) calculation algorithm to minimize the effect of the error propagation. Additionally, we bring forward a new pairwise LLR combining technique to enhance the reliability of ordering stage considerably. Through simulation results, it is shown that the new proposed algorithms outperform the conventional ones in system performance.
In this paper we present the research results concerning the performance of Hough detector with an Order Statistic False Alarm Rate (OS CFAR) processor, in the presence of randomly arriving impulse interference with P...
详细信息
In this paper we present the research results concerning the performance of Hough detector with an Order Statistic False Alarm Rate (OS CFAR) processor, in the presence of randomly arriving impulse interference with Poisson distributed flow and Raleigh amplitude distribution. In the presented contribution are investigated two types of Hough detectors with CFAR processors, in order to choose the most efficient one in the presence of clutter and randomly arriving impulse interference. The Hough detector with OS CFAR processor is compared to Hough detector with CA CFAR processor. The achieved results reveal that the Hough detector with the OS CFAR algorithm is more effective. The experimental results are obtained by numerical analysis. We have studied the detection probability and the average decision threshold of Hough detector with two types of CFAR processors. The results show that the use of this structure of Hough detector allows drastically reducing the detectability losses in comparison to the conventional OS CFAR detector and that it is effective for small signal-to-noise ratios. The research work is performed in MATLAB computational environment. The obtained analytical results for Hough detector with an Order Statistic CFAR processor can be used in both, radar and communication receiver networks.
The performance of four algorithms for detecting the presence of short pulsed sinusoidal interference in microwave radiometry is compared. The pulsed sinusoidal interference sources considered have unknown frequency, ...
详细信息
The performance of four algorithms for detecting the presence of short pulsed sinusoidal interference in microwave radiometry is compared. The pulsed sinusoidal interference sources considered have unknown frequency, initial phase, amplitude, arrival time, and duration. Statistical properties of three of the algorithms can be determined analytically, although numerical integrations are required in some cases in order to compute the obtained probabilities of detection. The performance of the fourth algorithm was evaluated using Monte Carlo procedures. Results show that three of the algorithms have a performance that is roughly comparable for the cases considered, while the fourth yields reduced sensitivity.
Accurate reference point detection is crucial for features extraction to improve the performance of fingerprint recognition system. Many reference-point detection algorithms work well in good-quality fingerprints, how...
详细信息
Accurate reference point detection is crucial for features extraction to improve the performance of fingerprint recognition system. Many reference-point detection algorithms work well in good-quality fingerprints, however, most fail to correctly locate the reference point in poor-quality fingerprints with cracks and scars, dry skin, or poor ridge-and-valley contrast. In this paper, we propose a method to detect a reference point in an enhanced fingerprint image by using a novel and effective enhancement approach. It preserves true ridges and valleys, and it also repairs the damaged ridges and valleys, which in turn helps to detect reference points reliably and accurately. Experimental results on public databases show that the proposed method has better results when a reference point detection method applies to the enhanced image, than to the original image.
This paper proposes a systematic approach to evaluate algorithms for extracting road marking features from images. This specific topic is seldom addressed in the literature while many road marking detection algorithms...
详细信息
This paper proposes a systematic approach to evaluate algorithms for extracting road marking features from images. This specific topic is seldom addressed in the literature while many road marking detection algorithms have been proposed. Most of them can be decomposed into three steps: extracting road marking features, estimating a geometrical marking model, tracking the parameters of the geometrical model along an image sequence. The present work focuses on the first step, i.e. feature extraction. A reference database containing over 100 images of natural road scenes was built with corresponding manually labeled ground truth images (available at http://***/en/produits/ride/). This database enables to evaluate and compare extractors in a systematic way. Different road marking feature extraction algorithm representing different classes of techniques are evaluated: thresholding, gradient analysis, and convolution. As a result of this analysis, recommendations are given on which extractor to choose according to a specific application.
The detection of MIMO signals presents a formidable computation challenge due to the inherent complexity incurred by matrix-type wireless fading channels. To reduce the hardware cost, linear MIMO detection algorithms ...
详细信息
The detection of MIMO signals presents a formidable computation challenge due to the inherent complexity incurred by matrix-type wireless fading channels. To reduce the hardware cost, linear MIMO detection algorithms can be used instead of non-linear space-time processing. Conventionally, adaptive linear algorithms such as RLS and LMS are treated separately in implementation from matrix inversion based algorithms such as ZF and MMSE. In this paper, we identify the similarities between the QR-decomposition based forms of RLS and MMSE MIMO detection and present a unified systolic array implementation that can accommodate both. In the meanwhile, some subtle but important differences also exist. As a result, the unified array must have a size of N r x N r (assuming N t les N r ) and both array inputs and array operations need to be controlled accordingly. As special cases of RLS and MMSE, LMS and ZF can also be realized in the same array, making the array flexible enough for all linear MIMO detection algorithms.
The paper introduces a novel interdisciplinary project addressing the analysis of historical artistic films. The type of employed material has not been subject to automatic analyses, so far. It poses challenges in all...
详细信息
The paper introduces a novel interdisciplinary project addressing the analysis of historical artistic films. The type of employed material has not been subject to automatic analyses, so far. It poses challenges in all areas of content-based analysis and retrieval due to its complex temporal structure and due to substantial degradations. We propose robust features and a method for shot cut detection for this material that outperforms established techniques.
Multilevel coding with sigma-mapping is one simple way to obtain coding gain as well as shaping gain, while power-allocation, by allocating proper powers to different levels, can facilitate the iterative decoding/dete...
详细信息
Multilevel coding with sigma-mapping is one simple way to obtain coding gain as well as shaping gain, while power-allocation, by allocating proper powers to different levels, can facilitate the iterative decoding/detection algorithms. In this paper, we utilize the EXIT chart to calculate the convergence threshold for each level by treating the signals from other levels as Gaussian noise. Based on the threshold, we propose a simple power allocation scheme. Numerical results show that the proposed EXIT-based power allocation scheme improves the performance when compared with the existing Gaussian approximation power allocation scheme while still keeping a reasonable complexity.
Recently, some manifold learning methods have aroused a great of interest in many fields of information processing. However, these manifold learning methods are not robust against outliers. In this paper, an outlier d...
详细信息
Recently, some manifold learning methods have aroused a great of interest in many fields of information processing. However, these manifold learning methods are not robust against outliers. In this paper, an outlier detection algorithm is proposed, and we propose a robust and stable locally liner embedding(RSLLE) algorithm by introducing multiple linearly independent local weight vectors to represent the local geometry for each neighborhoods of clean data points. For the outlier points, RSLLE learns the local geometry by using a single weight vector. Numerical examples are given to show the improvement and efficiency of the proposed algorithm.
Internet applications, such as Email, VoIP and WWW, have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature ...
详细信息
Internet applications, such as Email, VoIP and WWW, have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction-FI. FI resolution may be implemented by a Feature Manager, which is directed by a set of interdiction formulas. On the other hand, the approach by interdiction may eliminate all features candidate for execution, and this result on a feature denial of service. In this paper we analyze how feature denial of service can be detected, with a design stage algorithm. The detection algorithm has a time complexity of the quadratic of interdiction formulas.
暂无评论