The multilevel characteristic basis function method(MLCBFM)with the adaptive cross approximation(ACA)algorithm for accelerated solution of electrically large scattering problems is studied in this *** the conventional...
详细信息
The multilevel characteristic basis function method(MLCBFM)with the adaptive cross approximation(ACA)algorithm for accelerated solution of electrically large scattering problems is studied in this *** the conventional MLCBFM based on Foldy-Lax multiple scattering equations,the improvement is only made in the generation of characteristic basis functions(CBFs).However,it does not provide a change in impedance matrix filling and reducing matrix calculation procedure,which is *** reality,all the impedance and reduced matrix of each level of the MLCBFM have low-rank property and can be calculated ***,ACA is used for the efficient generation of two-level CBFs and the fast calculation of reduced matrix in this *** results are given to demonstrate the accuracy and efficiency of the method.
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmissi...
详细信息
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic *** be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading *** proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping *** comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective *** derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading *** results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage ***,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
A whisper intelligibility enhancement method was proposed based on the Real-valued Discrete Gabor Transform (RDGT) in the joint time frequency domain where the RDGT can change the density of the spectrum through the o...
详细信息
In this paper, we propose a method to improve localization algorithm of maximum likelihood estimation;the localization scheme relies on the distance threshold. In order to suppress effectively the effects of received ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In this paper, we propose a method to improve localization algorithm of maximum likelihood estimation;the localization scheme relies on the distance threshold. In order to suppress effectively the effects of received signal strength error to node localization precision. This paper presents an indoor localization algorithm based on received signal strength to select anchor nodes. Compared with the traditional localization algorithm, this scenario not only improve the localization accuracy, but also reduce the calculation complexity of nodes. The simulation results show that the average error of the proposed method is less than 0.15 m. Moreover, when there are a large number of anchor nodes, the computational complexity is effectively reduced. Verification result verifies the effectiveness and reliability of the algorithm.
Target detection by non-cooperative illuminator is a study hotspot in electronic warfare field, with'four countering' potential advantages for passive radar. One of the major problems in continuous wave bistat...
详细信息
Target detection by non-cooperative illuminator is a study hotspot in electronic warfare field, with'four countering' potential advantages for passive radar. One of the major problems in continuous wave bistatic radar is Direct path interference (DPI). Conventional solutions to this problem is the use of an adaptive antenna, steering null towards the interference. Unfortunately the null depth obtained by this technology is not enough for surveillance radar. First of all, DPI appeared in passive radar based on non-cooperative FM broadcast transmitter is analyzed in this paper. Secondly, a DPI cancellation based on Adaptive fractional delay estimation (AFDE) is in detail introduced how to deal with this problem. Finally, a passive radar experimental system based on non-cooperative FM broadcast transmitter is provided, simulation results by real collected data show applying the method proposed in this paper is effective in suppression DPI.
The traditional double-threshold endpoint detection method has the phenomenon of missing detection. Therefore, the speech recognition(SR) system based on vector quantization(VQ) in this paper proposes an improved algo...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
The traditional double-threshold endpoint detection method has the phenomenon of missing detection. Therefore, the speech recognition(SR) system based on vector quantization(VQ) in this paper proposes an improved algorithm for this phenomenon, which effectively avoids the problem of missing detection. Then, Mel Frequency Cepstral Coefficients(MFCC) is used to extract the characteristic parameters of the speech signal, and the multistage vector quantization is used to quantify the characteristic parameters. Experimental results show that, the proposed algorithm improves the recognition rate of the text-independent speaker recognition system by 8.7%, and it also confirms that the longer the training speech is, the higher the recognition rate will be.
At present, in related image processing field, the fuzzy set theory has also gained more successful applications to some extent. The image processing based on the fuzzy theory is an important research area. The inform...
详细信息
At present, in related image processing field, the fuzzy set theory has also gained more successful applications to some extent. The image processing based on the fuzzy theory is an important research area. The information loss brought by 3D object projection in 2D image plane makes the image have the ambiguity exist in essence, thus there exists ambiguity when defining image characteristics such as the border, area and texture, therefore, because of the complexity of the image itself, uncertainty and inaccuracy or ambiguity may occur in the different stages of the processing. The algorithm in this paper improves the degree of membership function to make it suitable for the image fuzzy enhancement. The membership function curve is S-shaped, and at the inflection point, the function value on the left side drops rapidly while the function value on the right side rapidly rises. There is certain symmetry about the inflection point, and the function inflection point position can be decided by changing function parameters, and better enhancement effect can be gained by a small amount of iteration. By the experimental simulation, it is verified that the enhanced color image by adopting the method in this paper is bright in color on the visual effect with moderate increasing proportion of brightness and contrast, and best color maintaining performance and minimum chromaticity change, and also the image information entropy is improved when compared with the original image data.
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare field. First of all, direct-path interference (DPI) suppression which is the technique of bottleneck of movin...
详细信息
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare field. First of all, direct-path interference (DPI) suppression which is the technique of bottleneck of moving target detection by a noncooperative frequency modulation(FM) broadcast transmitter is analyzed in this article; Secondly, a space-time-frequency domain synthetic solution to this problem is introduced: Adaptive nulling array processing is considered in the space domain, DPI cancellation based on adaptive fractional delay interpolation (AFDI) technique is used in planned time domain, and long-time coherent integration is utilized in the frequency domain; Finaily, an experimental system is planned by considering FM broadcast transmitter as a noncooperative illuminator, Simulation results by real collected data show that the proposed method has a better performance of moving target detection.
This paper presents a novel image fusion method based on nonsubsampled shearlet transform (NSST) and block-based random image sampling for infrared and visible images. In the method, the NSST is firstly performed on e...
详细信息
This paper presents a novel image fusion method based on nonsubsampled shearlet transform (NSST) and block-based random image sampling for infrared and visible images. In the method, the NSST is firstly performed on each of the source images to obtain their low frequency and high frequency subbands coefficients. Then the low frequency coefficients are fused by combing the block-based random image sampling and the sliding widow technique, while the high frequency coefficients are fused using classical absolute value maximum choosing rule. The fused image is reconstructed though performing the inverse NSST. The experiments are carried out on five pairs of infrared and visible images using five traditional fusion methods to verify the effectiveness and efficiency of the proposed method and by comparing the fused results visually and objectively it is demonstrated that the proposed fusion method is competitive or even superior to the other wellknown methods.
This study presents an efficient multi-resolution method to detect binary object directly. Both intensity and geometry differences are used to measure the similarity between the source object template and target objec...
详细信息
暂无评论