The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAr and In ISAr signal formation and imaging are analyzed by the perspective of analyzing th...
详细信息
The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAr and In ISAr signal formation and imaging are analyzed by the perspective of analyzing the target linear frequency modulation echo signal and combining with ISAr imaging *** proposed a method of In ISAr scattering point extraction technology based on CLEAN algorithm and threshold *** compare it to the method of image matching *** simulation results show that the In ISArreconstruction technique based on scattering point extraction method is a more effective one,with higherdetection probability and has an ability to suppress the influence of noise and sidelobe effect,under the condition of noise.
Currently, the inversion of tropospheric duct refractivity from clutter (rFC) becomes a research hot spot. Sea clutter power model is essential forrFC. This paper investigates the effect of radar parameters on the se...
详细信息
Currently, the inversion of tropospheric duct refractivity from clutter (rFC) becomes a research hot spot. Sea clutter power model is essential forrFC. This paper investigates the effect of radar parameters on the sea clutter power in horizontally inhomogeneous surface duct environment, and further proposes a method to calculate sea clutter power based on radar parameters.
To investigate the predictive ability of radiomics signature for preoperative pathological grading of Hepatocellular Carcinomas (HCC), the no contrast MrI images were integrated and a comprehensive analysis was conduc...
To investigate the predictive ability of radiomics signature for preoperative pathological grading of Hepatocellular Carcinomas (HCC), the no contrast MrI images were integrated and a comprehensive analysis was conducted to predict clinical outcomes using the radiomics features. Variable selection via LASSO and logistic regression were used to select the most-predictive radiomics features for the pathological grading. Cross-Validation with receiver operating characteristic (rOC) analysis was performed and the area under the rOC curve (AUC) was employed as the prediction metric. Overall, the prediction performances by radiomics features showed statistically significant correlations with pathological grading, however, improvement on the prediction performance by combining T1WI and T2WI data, classification performance obtained the AUC 0.829 in training dataset and the AUC 0.742 in validation dataset. This study consisted of 170 consecutive patients (training dataset: n=125; validation dataset, n=45). The results showedradiomics signature was developed and validated to be a significant predictor fordiscrimination HCC pathological grading, which may serve as a complementary tool for the preoperative tumour grading in HCC.
The projection matrix model is used to describe the physical relationship between reconstructed object and *** a model has a strong influence on projection and backprojection,two vital operations in iterative computed...
详细信息
The projection matrix model is used to describe the physical relationship between reconstructed object and *** a model has a strong influence on projection and backprojection,two vital operations in iterative computed tomographic *** distance-driven model(ddM) is a state-of-the-art technology that simulates forward and back *** model has a low computational complexity and a relatively high spatial resolution;however,it includes only a few methods in a parallel operation with a matched model *** study introduces a fast and parallelizable algorithm to improve the traditional ddM for computing the parallel projection and backprojection *** proposed model has been implemented on a GPU(graphic processing unit) platform and has achieved satisfactory computational efficiency with no *** runtime for the projection and backprojection operations with our model is approximately 4.5 s and 10.5 s per loop,respectively,with an image size of 256×256×256 and 360 projections with a size of 512×*** compare several general algorithms that have been proposed for maximizing GPU efficiency by using the unmatched projection/backprojection models in a parallel *** imaging resolution is not sacrificed andremains accurate during computed tomographic reconstruction.
disambiguating named entities is an important problem in natural language processing, knowledge base, question answering systems. In the paper, we propose a Markov logic network knowledge graph solution for solving en...
详细信息
We consider a cellular network with a full-duplex base station, multiple uplink users and an eavesdropper. The full-duplex base station transmits jamming signals to degrade the eavesdropper channel when receiving secu...
详细信息
We consider a cellular network with a full-duplex base station, multiple uplink users and an eavesdropper. The full-duplex base station transmits jamming signals to degrade the eavesdropper channel when receiving secure multi-user signals. To maximize the secrecy rate of uplink communications, we propose a distributed ascending-clock auction(ACA) algorithm to allocate subcarriers and jamming power. Specifically, the impact of the self-interference of the full-duplex base station on the secrecy rate is considered. The proposed algorithm consists of two parts. Firstly, subcarriers and the jamming power are respectively priced by the base station. Secondly, users select the subcarrier and the jamming power based on the price. Moreover, the convergence of the proposed auction algorithm is mathematically proved. Simulation results show that the proposed auction algorithm is more beneficial to improve the uplink secrecy performance compared to traditional auction algorithms.
The traditional collaborative recommendation algorithm doesn't take the non-lineardependence between users into consider, which is not accurate enough in prediction. The collaborative filtering algorithm based on...
详细信息
The traditional collaborative recommendation algorithm doesn't take the non-lineardependence between users into consider, which is not accurate enough in prediction. The collaborative filtering algorithm based on entropy can measure the nonlinear characteristics of users, but it can't reasonably describe the relationship between users and is subject to sparsity. To address this problem, conditional entropy trust model is proposed, which uses the conditional entropy to describe the non-lineardependence between users, and Laplace estimation is introduced to alleviate sparsity. A collaborative filtering algorithm based on the conditional entropy trust model(CECF) is designed. The experiments show that this algorithm doesn't increase the time complexity and significantly improve the degree of accuracy.
When extracting physical layer security secret key with multiple wireless channel samples, its capacity is affected by the time difference of channel sounding, terminal's moving speed, sampling period, the number ...
详细信息
ISBN:
(纸本)9781509013296
When extracting physical layer security secret key with multiple wireless channel samples, its capacity is affected by the time difference of channel sounding, terminal's moving speed, sampling period, the number of samples, and additive noise. In order to quantitatively analyze their effects anddetermine the constrains on the optimal sampling period, a closed-form solution to the physical layer secret key capacity in the time domain is derived over the uniform scattering environment. Simulation results indicate that the results of this paper can be applied to both the uniform and non-uniform scattering environment. Furthermore, the feasibility to extract physical layer secret key from the commercial Td-LTE and the promising co-frequency co-time full duplex communication systems is verified.
This paper using vectordiagram illuminates the operation principle of vector synthesis predistortions and proves they can control amplitude modulation to amplitude modulation (AM/AM) and amplitude modulation to phase...
详细信息
ISBN:
(纸本)9781509013180
This paper using vectordiagram illuminates the operation principle of vector synthesis predistortions and proves they can control amplitude modulation to amplitude modulation (AM/AM) and amplitude modulation to phase modulation (AM/PM) separately. A vector synthesis predistortion linearizer is designed to verify this thought and the results show the correctness of this thought.
To solve the problem that the positioning strategy with sliding window approache requires exhaustive search in feature pyramids,the paper proposes an object detection algorithm based on deformable part models with Bin...
详细信息
To solve the problem that the positioning strategy with sliding window approache requires exhaustive search in feature pyramids,the paper proposes an object detection algorithm based on deformable part models with Bing features to help object *** of all,input image are preprocessed with the objectness detection algorithm with Bing features and a set of potentia windows that may contain target objects are obtained,and then the deformable part model is regarde as the class-specific detector to match potential windows,at last Non-Maximum Suppression is use to merge andreduce window areas of results to obtain final detection *** experimental resul on Pascal VOC 2007 dataset show that the algorithm in the paper outperforms the original dPM in 1out of 20 classes,achieving an improvement of 2.7% mA P.
暂无评论