Based on the envelopes and the characteristics of Doppler spectrum of returns in single channel synthetic aperture radar (SAR) systems a method is proposed, which adopts two order keystone transform to adjust the rang...
详细信息
Based on the envelopes and the characteristics of Doppler spectrum of returns in single channel synthetic aperture radar (SAR) systems a method is proposed, which adopts two order keystone transform to adjust the range curvature of echo data, then range walk rates of echoes' envelopes are estimated to make some adjustments of walk and the Doppler parameters of moving targets are obtained through analyzing the Doppler spectrum of the moving targets. At last the images and positions of ground moving targets are gained, which make it possible that the moving targets can be indicated in right locations in SAR image. In addition the key motion parameters of moving targets can be estimated by the relationship between the Doppler parameters and motion parameters of ground moving targets. The results of the measured data show that this method can image ground moving targets and estimate motion parameters effectively
Contour information always contributes much for object analysis in imageprocessing. In this paper, a new method of constructing contours of skin regions is proposed. To obtain skin regions readily, a region splitting...
详细信息
Contour information always contributes much for object analysis in imageprocessing. In this paper, a new method of constructing contours of skin regions is proposed. To obtain skin regions readily, a region splitting scheme is first adopted to generate adaptive grids in images. Based on the grids, initial contours are then constructed. Finally, the contours are refined according to the minimum energy principle. Experimental results show that the proposed method performs well in constructing contours of skin regions
The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communica...
详细信息
The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information, This approach is more reliable, covert and securable than traditional and chaotic secure communication.
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to pro...
详细信息
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200.
<正>Cyclic adaptive beamforming(CAB) algorithm becomes an efficient blind beamforming algorithm due to its low computation complexity and fast convergence ***,the robustness of CAB is not *** overcome the shortcom...
<正>Cyclic adaptive beamforming(CAB) algorithm becomes an efficient blind beamforming algorithm due to its low computation complexity and fast convergence ***,the robustness of CAB is not *** overcome the shortcomings,a novel robust CAB algorithm is *** new algorithm is based on a combination of the ideas in the CAB algorithm and the robust capon beamforming(RCB).It still belongs to robust CAB algorithm based on diagonal loading,but the amount of diagonal loading can be calculated precisely based on the uncertainty set of steering *** results show the feasibility of the new algorithm
In this paper,two nonparametric amplitude spectral estimators,which belong to the adaptive filtering-based approach,are *** case of only several snapshots available,the filtering data,which is formed by weighting the ...
详细信息
In this paper,two nonparametric amplitude spectral estimators,which belong to the adaptive filtering-based approach,are *** case of only several snapshots available,the filtering data,which is formed by weighting the snapshots with the traditional Fourier weight vector, contains more larger residual term besides the signal term at the frequency of *** residual term dramatically reduce the accuracy of the spectral estimate at the frequency. By weighting the snapshots with Capon weight vector,the weighted data is slightly influenced by the other frequency components,and the corresponding filters perform better estimation accuracy and higher spectral *** examples are provided to demonstrate the performance of the new approaches.
In this paper, Adaboost and SVM are applied to SAR ATR (synthetic aperture radar automatic target recognition) respectively. The performance of these two classifiers is analyzed and compared in target aspect window wi...
详细信息
In this paper, Adaboost and SVM are applied to SAR ATR (synthetic aperture radar automatic target recognition) respectively. The performance of these two classifiers is analyzed and compared in target aspect window with different size. First, PCA (principal component analysis) features are selected as target feature, and then *** and SVM are used to classify, respectively. Experimental results based on MSTAR data sets show that Adaboost classifier has better robustness than SVM classifier
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information ...
详细信息
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4 Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i. e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G. 728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.
Based on Rough Sets and Mathematical Morphology theory, this paper proposes a method called membership-grade operator for binary image *** on the same structural element, the operator achieves multiform dilations, ero...
详细信息
Based on Rough Sets and Mathematical Morphology theory, this paper proposes a method called membership-grade operator for binary image *** on the same structural element, the operator achieves multiform dilations, erosions and edge extractions by proper choice of membership grade obtained by binary *** to noise image, the operator can achieve the above processing and noise reduction, and good effect is obtained by image simulation. Finally, this paper analyzes the characteristics of the membership-grade operator by comparing it with the morphology operator.
The fuzzy hit-or-miss transformation is a fuzzy morphological operator, which is a key for the feature extraction in the ambiguous information. In this paper, a neural network implementation for fuzzy morphological op...
详细信息
The fuzzy hit-or-miss transformation is a fuzzy morphological operator, which is a key for the feature extraction in the ambiguous information. In this paper, a neural network implementation for fuzzy morphological operators is proposed, and by means of a training method and differentiable equivalent representations for the operators, efficient adaptive algorithms to optimize structuring elements are derived. The gradient of the fuzzy morphology utilizes a set of structuring elements to detect the edge strength with a view to decrease the spurious edge and suppressed the noise. Results will be presented for images in comparison with the others edging detectors.
暂无评论