Results 11 to 20 of about 35,085 (261)
Hyperspectral anomaly detection is an important technique in the field of remote sensing image processing. Over the last few years, low rank and sparse matrix decomposition (LRSMD) has played an increasingly significant role in hyperspectral anomaly ...
Xiaoyi Wang +4 more
doaj +1 more source
In Wi-Fi fingerprint positioning, what we should most care about is the distance relationship between the user and the reference points (RP). However, most of the existing weighted k-nearest neighbor (WKNN) algorithms use the Euclidean distance of ...
Boyuan Wang +6 more
doaj +1 more source
Blind recognition of BCH codes in faster‐than‐Nyquist signalling system
Proposed is a blind recognition method for Bose–Chaudhuri–Hocquenghem (BCH) codes in the faster‐than‐Nyquist (FTN) signalling system which is based on the Galois field Fourier transform of the code polynomial.
Gang Wu +3 more
doaj +1 more source
On the basis of realizing regional navigation, the Quasi-Zenith Satellite System (QZSS) has advanced navigation function, which leads to the broadcasting of more signals in a single frequency of QZSS signals. Current signal transmission technology cannot
Hongjun Ye +6 more
doaj +1 more source
A Modified Regular Perturbation Model for the Single-Span Fiber Transmission Using Learnable Methods
In fiber optic communication systems, the dispersion and nonlinear interaction of optical signals are critical to modeling fiber optic communication, and the regular perturbation (RP) model is a simplified modeling method composed of parallel branches ...
Shuhong He +11 more
doaj +1 more source
To remove the impacts of polarization interference on satellite-to-ground high-speed data transmission systems, the major factors that affect polarization interference are concluded, the deteriorations of bit error rate (BER) of different modulation ...
Zhisong Hao, Zhiming Zheng
doaj +1 more source
Methodology to Enhance the Predictability of I/O Data Exchange Between Device and Tasks [PDF]
Data coming from devices shall be transported to a specific task to be used in a software with the most accurate time and data integrity. During this process, a potential cause for invoking structured hazard and performance degradation is dormant.
Cheol-Hea Koo +2 more
doaj +1 more source
Encrypted malicious traffic detection based on neural network
With the widespread application of encrypted communications, traditional malicious traffic detection methods based on content analysis have gradually become ineffective.
Xia Longfei +5 more
doaj +1 more source
A Study on Fuel Estimation Algorithms for a Geostationary Communication & Broadcasting Satellite [PDF]
It has been developed to calculate fuel budget for a geostationary communication and broadcasting satellite. It is quite essential that the pre-launch fuel budget estimation must account for the deterministic transfer and drift orbit maneuver ...
Jong Won Eun
doaj
Wideband Cooperative Localization Through Generalized Cross-Correlation
This work proposes a novel algorithm for robust cooperative localization using wideband time difference of arrival (TDoA) measurements and information coupling between nodes.
Andreas Fuchs +2 more
doaj +1 more source

