77GHz Automotive radar based on SiGe technique is the hot topics. The optimal matching in the RF part of the automotive radar should be solved and considered firstly. Left hand material(LHM) has special properties suc...
详细信息
77GHz Automotive radar based on SiGe technique is the hot topics. The optimal matching in the RF part of the automotive radar should be solved and considered firstly. Left hand material(LHM) has special properties such as low loss, negative phase velocity. The paper focus on designing a new transmission line which is made by LHM and RHM (right hand material) together. We analysis the theory of the TL (transmission line) based on compositing LHM and RHM together, then design the match circuits based on the TL. Moreover, the simulating results of the circuit based on the special TL are shown. Lastly, the possibility of using the TL to match at the automotive radar system is valued.
Considering time hopping impulse radio ultra wide band (TH-IR UWB) sensor networks composed n sensor nodes which are placed according to a Poisson point process on a square and a Sink. The results demonstrate that the...
详细信息
Considering time hopping impulse radio ultra wide band (TH-IR UWB) sensor networks composed n sensor nodes which are placed according to a Poisson point process on a square and a Sink. The results demonstrate that the bounds on the lifetime of dense network increase with the increase of the number of nodes n, and that of extended network decrease with the increase of the number of nodes n. The results also indicate the bounds on the lifetime of clustering sensor networks is far more than that of non-clustering network, thus clustering can evidently improve network lifetime. Furthermore, the bounds on the lifetime of clustering TH-IR UWB sensor network which the nodes are distributed according to a Poisson point process are different from that of clustering network which the nodes are placed according to uniform distribution, thus the behavior of nodes deploying can remarkably affect the lifetime bound.
A Social network graph shows social interactions and relationships between individuals in a specific social environment, which is very helpful for analyzing social relationships, activities, structures, etc. The autho...
详细信息
This paper considers the time hopping impulse radio ultra wide band (TH-IR UWB) sensor networks, with n sensor nodes uniformly and independently located on a square and a Sink. The upper bounds on the lifetime of ordi...
详细信息
The information technology has been recognized as one of the most important means to improve health care and curb its ever-increasing cost. However, existing efforts mainly focus on informatization of hospitals or med...
详细信息
The information technology has been recognized as one of the most important means to improve health care and curb its ever-increasing cost. However, existing efforts mainly focus on informatization of hospitals or medical institutions within organizations, and few are directly oriented to individuals. The strong demand for various health services from customers calls for the creation of powerful individual-oriented personalized health care servicesystems. Web service composition (WSC) and related technologies can greatly help one build such systems. This paper aims to present a newly developed platform called a Public oriented Health care Information service Platform (PHISP) and several novel WSC techniques that are used to build it. Among them include WSC techniques that can well support branch and parallel structures.
Spam continues to inflict increased damage. Varying approaches including Support Vector Machine (SVM) based techniques have been proposed for spam classification. However, SVM training is a computationally intensive p...
详细信息
Vehicle detection in SAR image is attractive field. High moments included numerous information is proposed to exploit in the field. It not only restrains Gaussian noise automatically, but also suppresses non-gaussian ...
详细信息
Vehicle detection in SAR image is attractive field. High moments included numerous information is proposed to exploit in the field. It not only restrains Gaussian noise automatically, but also suppresses non-gaussian noise. Man-made targets in are different from the background clutter. Moreover, the influence of the shadow about man-made targets is reduced in the algorithm of high moments. We utilize high moments to avoid to analyst the complex scatter theory. By analyzing the relevent theory and practical calculated method of high order moments, we compare the difference of probability of detection between the target chip and clutter chip to achieve the goal of detection. Through processing lots of actual SAR data which is added different kinds of noise, we compare the performance between high order moments and low-order moments method.
Principal curves are a well established tool in data analysis and processing, but for complex pattern data with high curvature, high dispersion and self-intersecting, such as spiral-shaped curves, existing methods did...
详细信息
Genetic algorithms (GAs) have been shown to be very useful in a variety of search and optimization problems. In this paper, we present a new genetic algorithm for the maximum planar subgraph problem (MPSP). Previous s...
详细信息
Radio frequency identification (RFID) is a technology where a reader device can "sense'' the presence of a close by object by reading a tag device attached to the object. To guarantee the coverage quality...
详细信息
Radio frequency identification (RFID) is a technology where a reader device can "sense'' the presence of a close by object by reading a tag device attached to the object. To guarantee the coverage quality, multiple RFID readers can be deployed in the given region. In this paper, we consider the problem of activation schedule for readers in a multi-reader environment. In particular, we try to design a schedule for readers to maximize the number of served tags per time-slot while avoiding various interferences. We first develop a centralized algorithm under the assumption that different readers may have different interference and interrogation radius. Next, we propose a novel algorithm which does not need any location information of the readers. Finally, we extend the previous algorithm in distributed manner in order to suit the case where no central entity exists. We conduct extensive simulations to study the performances of our proposed algorithm. And our evaluation results corroborate our theoretical analysis.
暂无评论