This paper proposed a new algorithm for burst signal sorting. The proposed algorithm can be used to identify and locate TDMA users based on the continuity of carrier phase. In the proposed algorithm, the continuity of...
详细信息
The size estimation of space target is useful to help monitor the collision of space targets. The traditional methods cannot obtain accurate size of three-axis stabilized targets via narrow-band radar. This paper pres...
详细信息
In this paper, we adress the problem of time delay estimation between signals received at two spatially separated sensors at low signal-to-noise ration levels. By replacing the instantaneous square error in ETDE with ...
详细信息
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is ...
详细信息
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is ...
详细信息
In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources' signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper's channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.
Passive source location attracts a growing interest due to its usefulness in various applications such as wireless communications, microphone arrays, sensor networks and so on. This paper combines the time differences...
详细信息
ISBN:
(纸本)9781479905607
Passive source location attracts a growing interest due to its usefulness in various applications such as wireless communications, microphone arrays, sensor networks and so on. This paper combines the time differences of arrival (TDOA) and gain ratios of arrival (GROA) techniques to present a novel dual-station source location method of a known altitude object in 3D space. The closed form solution and performance evaluation are also given in the following section. The final simulation shows that the proposed method is feasible when the constraint height error is small and can reach the CRLB. GDOP analysis shows that the error is large on the midperpendicular line of the two stations.
The paper describes a test-bench model for braincomputer interface research based on EEG signals. The test-bench is going to be used for students training and education. The goal is to prepare modern Brain-Computer In...
详细信息
Dual-satellite geolocation system is an effective passive location technique. This method can locate a stationary emitter on Earth by using time and frequency differences of arrival (TDOA/FDOA).In this paper, the rank...
详细信息
A weight constrained total least-square (WCTLS) is developed for source localization by using time difference of arrival (TDOA) measurements. The WCTLS algorithm not only exploits the structure information of the meas...
详细信息
We present the Document-Entity-Topic (DET) model for semantic social network analysis which tries to find out the interested entities through the topics we aim at, detect groups according to the entities which concern...
详细信息
暂无评论