A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to de...A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to deal with issues like the large computational complexity, the fluctuation of grayscale, and the noise in infrared images. Four characteristic points were selected by analyzing the grayscale distribution in infrared image, of which the series was quickly matched with an affine transformation model. The image was then divided into 32×32 squares and the gray-weighted kernel(GWK) for each square was calculated. At last, the MTD was carried out according to the variation of the four GWKs. The results indicate that the MTD can be achieved in real time using the algorithm with the fluctuations of grayscale and noise can be effectively suppressed. The detection probability is greater than 90% with the false alarm rate lower than 5% when the calculation time is less than 40 ms.展开更多
Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In th...Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In this paper, we proposed an efficient symbol timing recovery algorithm of MPSK signals named OMQ(Ordered Maximum power using Quadratic approximation partially) algorithm which is based on the Quadratic Approximation(QA) algorithm. We used ordered statistic sorting method to reduce the computational complexity further, meanwhile maximum mean power principle was used to decrease frequency offset sensitivity. The proposed algorithm adopts estimation-down sampling structure which is suitable for small packet size transmission. The results show that, while comparing with the QA algorithm, the computational complexity is reduced by 75% at most when 8 samples per symbol are used. The proposed algorithm shows better performance in terms of the jitter variance and sensitivity to frequency offsets.展开更多
In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp...In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp signals with opposite chirp rates are used as the training signal, the received training signal with timing and frequency offset is transformed by FrFT and the two peaks representing two chirps in FrFT domain are detected, then the position coordinates of the two peaks are precisely corrected and substituted into an equation group to calculate timing and frequency offset simultaneously. This method only needs one FrFT calculation to implement synchronization, the computational complexity is equal to that of FFT and less than that of correlation or maximum likelihood calculation of existing methods, and estimation range of frequency offset is Large, greater than half the signal bandwidth, while the simulation results show that even at low SNR it can accurately estimate timing and frequency offset and the estimation error is less than that of existing methods.展开更多
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ...Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.展开更多
This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, ...This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing.展开更多
The enumeration of elements of c.e. sets in the theory of computability and computational complexity has already been investigated. However, the order of this enumeration has received less attention. The enumeration o...The enumeration of elements of c.e. sets in the theory of computability and computational complexity has already been investigated. However, the order of this enumeration has received less attention. The enumeration orders of elements of c.e. sets by means of Turing machines on natural numbers are investigated. In this paper, we consider the enumeration orders of elements of c.e. sets on rational numbers. We present enumeration order reducibility and enumeration order equivalence on rational numbers and propose some lemmas and theorems on these concepts. Also, we show that the theories here hold for Rc and we could repeat the same theories in this domain, in a same way.展开更多
This paper put forward the super-resolution image algorithm based on Gauss process regression sparse solution. We establish local Gauss process regression model, to solve the feasibility problem of regression super-re...This paper put forward the super-resolution image algorithm based on Gauss process regression sparse solution. We establish local Gauss process regression model, to solve the feasibility problem of regression super-resolution problem in solving Gauss process; further use sparse algorithm, not only it can optimize the super parameter of Gauss kernel function, but also to optimize the initial entry training, so as to obtain more accurate regression Gauss process. Experimental results show that: the paper proposed algorithm can does not reduce the image reconstruction results, and it can reduce the computational complexity.展开更多
This paper presents a Modified Formula for Cotes rule with fifths derivatives of endpoint and its truncation error. It also displays an analysis on convergence order of compound formula. Though compound modified formu...This paper presents a Modified Formula for Cotes rule with fifths derivatives of endpoint and its truncation error. It also displays an analysis on convergence order of compound formula. Though compound modified formula for Cotes rule with endpoint derivatives just calculates a newly-added fifths derivative of the two endpoints for each time compared with compound Cotes formula calculation, there are 2 more ranks of the convergence order in this modified formula. Examples of numerical calculation have validated theoretical analysis.展开更多
To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle fi...To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle filter is presented in this paper. The algorithm realizes dynamic combination of multiple model particle filter and joint probabilistic data association algorithm. The rapid expan- sion of computational complexity, caused by the simple combination of the interacting multiple model algorithm and particle filter is solved by introducing model information into the sampling process of particle state, and the effective validation and utilization of echo is accomplished by the joint proba- bilistic data association algorithm. The concrete steps of the algorithm are given, and the theory analysis and simulation results show the validity of the method.展开更多
基金Project(61101185)supported by the National Natural Science Foundation of China
文摘A fast algorithm based on the grayscale distribution of infrared target and the weighted kernel function was proposed for the moving target detection(MTD) in dynamic scene of image series. This algorithm is used to deal with issues like the large computational complexity, the fluctuation of grayscale, and the noise in infrared images. Four characteristic points were selected by analyzing the grayscale distribution in infrared image, of which the series was quickly matched with an affine transformation model. The image was then divided into 32×32 squares and the gray-weighted kernel(GWK) for each square was calculated. At last, the MTD was carried out according to the variation of the four GWKs. The results indicate that the MTD can be achieved in real time using the algorithm with the fluctuations of grayscale and noise can be effectively suppressed. The detection probability is greater than 90% with the false alarm rate lower than 5% when the calculation time is less than 40 ms.
基金supported by the National Natural Science Foundation of China(NSFC.NO.61303253)
文摘Feedforward symbol timing recovery techniques are particularly important for initial acquisition in burst modems. However, these techniques either have large calculation burden or sensitive to frequency offsets. In this paper, we proposed an efficient symbol timing recovery algorithm of MPSK signals named OMQ(Ordered Maximum power using Quadratic approximation partially) algorithm which is based on the Quadratic Approximation(QA) algorithm. We used ordered statistic sorting method to reduce the computational complexity further, meanwhile maximum mean power principle was used to decrease frequency offset sensitivity. The proposed algorithm adopts estimation-down sampling structure which is suitable for small packet size transmission. The results show that, while comparing with the QA algorithm, the computational complexity is reduced by 75% at most when 8 samples per symbol are used. The proposed algorithm shows better performance in terms of the jitter variance and sensitivity to frequency offsets.
文摘In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp signals with opposite chirp rates are used as the training signal, the received training signal with timing and frequency offset is transformed by FrFT and the two peaks representing two chirps in FrFT domain are detected, then the position coordinates of the two peaks are precisely corrected and substituted into an equation group to calculate timing and frequency offset simultaneously. This method only needs one FrFT calculation to implement synchronization, the computational complexity is equal to that of FFT and less than that of correlation or maximum likelihood calculation of existing methods, and estimation range of frequency offset is Large, greater than half the signal bandwidth, while the simulation results show that even at low SNR it can accurately estimate timing and frequency offset and the estimation error is less than that of existing methods.
基金financially supported by Shenzhen Key Fundamental Research Projects(Grant No.:JCYJ20170306091556329).
文摘Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.
基金the Natural Science Foundation of China (No.60472037).
文摘This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing.
文摘The enumeration of elements of c.e. sets in the theory of computability and computational complexity has already been investigated. However, the order of this enumeration has received less attention. The enumeration orders of elements of c.e. sets by means of Turing machines on natural numbers are investigated. In this paper, we consider the enumeration orders of elements of c.e. sets on rational numbers. We present enumeration order reducibility and enumeration order equivalence on rational numbers and propose some lemmas and theorems on these concepts. Also, we show that the theories here hold for Rc and we could repeat the same theories in this domain, in a same way.
文摘This paper put forward the super-resolution image algorithm based on Gauss process regression sparse solution. We establish local Gauss process regression model, to solve the feasibility problem of regression super-resolution problem in solving Gauss process; further use sparse algorithm, not only it can optimize the super parameter of Gauss kernel function, but also to optimize the initial entry training, so as to obtain more accurate regression Gauss process. Experimental results show that: the paper proposed algorithm can does not reduce the image reconstruction results, and it can reduce the computational complexity.
文摘This paper presents a Modified Formula for Cotes rule with fifths derivatives of endpoint and its truncation error. It also displays an analysis on convergence order of compound formula. Though compound modified formula for Cotes rule with endpoint derivatives just calculates a newly-added fifths derivative of the two endpoints for each time compared with compound Cotes formula calculation, there are 2 more ranks of the convergence order in this modified formula. Examples of numerical calculation have validated theoretical analysis.
基金Supported by the National Natural Science Foundation of China (60634030), the National Natural Science Foundation of China (60702066, 6097219) and the Natural Science Foundation of Henan Province (092300410158).
文摘To solve the problem of strong nonlinear and motion model switching of maneuvering target tracking system in clutter environment, a novel maneuvering multi-target tracking algorithm based on multiple model particle filter is presented in this paper. The algorithm realizes dynamic combination of multiple model particle filter and joint probabilistic data association algorithm. The rapid expan- sion of computational complexity, caused by the simple combination of the interacting multiple model algorithm and particle filter is solved by introducing model information into the sampling process of particle state, and the effective validation and utilization of echo is accomplished by the joint proba- bilistic data association algorithm. The concrete steps of the algorithm are given, and the theory analysis and simulation results show the validity of the method.