This paper presents an eID based solution to use for mobile internet, namely a platform structure and some key devices to realize the solution, in order to bring us an approach more secure and convenience to access on...
详细信息
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position *...
详细信息
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position ***,the condition that the number of antennas at the multi-antenna agent/anchor node should be larger than the number of multipath signal components(MPCs) constrains its actual *** this paper,we provide a more practical approach to achieve AOD information estimation under multipath *** that the sensor node can not identify the line of sight(LOS) signal component due to the insufficient degree of freedom,which is determined by the above limiting condition,we introduce a synthetic aperture technique with the aid of a fast moving multi-antenna agent/anchor *** operation greatly enlarges the degree of freedom of the equivalent antenna array constructed at sensor node end but without requiring other extra physical antennas equipped at agent/anchor node or sensor node end,which means that it relaxes the limiting ***,the AOD information of LOS signal component can be estimated and extracted successfully in complex multipath *** analysis proves the effectiveness of our proposed synthetic aperture technique and numerical simulations show great performance improvement.
A new security test for substitution boxes (S-boxes), the nonlinearity profile test, is presented, together with its results over the S-boxes of DES and AES. The test can be used to measure the global nonlinearity for...
详细信息
In this paper,a novel method for synthetic aperture radar(SAR)imaging is *** approach is based on L1/2 regularization to reconstruct the scattering field,which optimizes a quadratic error term of the SAR observation p...
详细信息
In this paper,a novel method for synthetic aperture radar(SAR)imaging is *** approach is based on L1/2 regularization to reconstruct the scattering field,which optimizes a quadratic error term of the SAR observation process subject to the interested scene *** to the conventional SAR imaging technique,the new method implements SAR imaging effectively at much lower sampling rate than the Nyquist rate,and produces high-quality images with reduced sidelobes and increased ***,over the prevalent greedy pursuit and L1 regularization based SAR imaging methods,there are remarkable performance improvements of the new *** one hand,the new method significantly reduces the number of measurements needed for reconstruction,as supported by a phase transition diagram *** the other hand,the new method is more robust to the observation *** fundamental properties of the new method are supported and demonstrated both by simulations and real SAR data experiments.
In this paper, we investigate the problem of multiple Doppler frequency offsets estimation for high-mobility orthog-onal frequency division multiplexing (OFDM) systems. This scenario could arise when either the rece...
详细信息
ISBN:
(纸本)9781467321969
In this paper, we investigate the problem of multiple Doppler frequency offsets estimation for high-mobility orthog-onal frequency division multiplexing (OFDM) systems. This scenario could arise when either the receiver or the transmitter moves at very high speed resulting into various Doppler shifts for paths with different angle of arrivals. The key point is to design a particular preamble structure. Then by remodeling the received blocks through downsampling, we compact parameter space and obtain a low complexity subspace-based estimator with the performance of high-resolution. The effectiveness of the proposed scheme is verified by simulations.
In view of the present inconsistent understanding of the model definition of survivable storage network, a seven-tuple model definition and a kind of architecture of SSS were given, taking the characteristics, such as...
详细信息
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ...
详细信息
Despite the complicated conditions in the food supply chain, we identify the risks in it based on the food related standards in China. We analyze the standards and summarize the types of the risks, then map them into ...
详细信息
Parallel processing is essential to mining frequent closed sequences from massive volume of data in a timely manner. On the other hand, MapReduce is an ideal software framework to support distributed computing on larg...
详细信息
In a recent paper [C.H. Hong et al., Opt. Commun. 283 (2010) 2644], a n-user quantum key distribution protocol with n quantum channels was presented. By analyzing its security, it is shown that this protocol is insecu...
详细信息
暂无评论