Contents
Part 1 Signal and Information Processing
Calibration of Channel Gain and Phase and Noise Estimation for Array
Lutao LIU, Liguo WANG…………………………………………………………………………………………………………(1)
Research on Image Compression Algorithm Based on Wavelet Transforms
Min TANG, Qun CAO, Nan XIAO………………………………………………………………………………………………(6) Multi-Sensor Information Fusion Technology and the Application in Mine Pit Environmental Monitoring
Xiaoyu ZHANG, Weizhi HUANG………………………………………………………………………………………………(10)
Detection of Airport Runway by Image Fusion Based on NSCT
Changxiang LU, Yiquan WU, Jiaming WU, Jingjing GU……………………………………………………………………(14)
Interview Correlations Based Fast Reference Frames Selection Algorithm for Multiview Depth Video Coding
Yuehou SI, Gangyi JIANG, Zongju PENG, Mei YU, Feng SHAO ……………………………………………………………(18)
Research on Multi-Parameter Physiological Monitoring System Based on PC
Xin GUO, He LI, Weijie CHEN…………………………………………………………………………………………………(27)
Based on MUSIC Algorithm for DOA Estimation Using a Single Vector Hydrophone Peng WANG……(32)
Rate-Distortion Model with Visual Perception for Multi-View Video Coding
Shihua PI, Gangyi JIANG, Zongju PENG, Feng SHAO, Songyin FU, Fucui LI…………………………………………………(35)
A Stereoscopic Image Objective Assessment Model Based on Weighted Structure Similarity
Xiangying MAO, Mei YU, Junming ZHOU, Zongju PENG, Feng SHAO, Ahong WANG, Gangyi JIANG………………………(40)
New Fast Image-Based Rendering and Post-Processing Method Based on Coding Information
Jian QIAN, Mei YU, Feng SHAO, Zongju PENG, Zhidi JIANG, Fucui LI…………………………………………………………(45) Concerning the Application of Information Technology Research Jingmin LI ………(51)
Concerning the Application of Network Coding Jingmin LI ……………………………………………………… (54)
The Research of Emotion Calculating Effects Cheng TAN, Xin FAN, Songchun FAN, Han SU, YuchenHE……………………(57)
Using 2D Haar Wavelet Transform for Iris Feature Extraction
Jun ZHOU, Ting LUO, Min LI, Shijun GUO, Taiping QING ………………………………………………………………(60)
The Degradation Function of Defocused Images Jingzhong WANG, Yuanyuan WANG……………………………(65)
Part 2 Communication Theory and Technology
An Exploration of the Theory Teaching of Cryptography in the Discipline of Information Engineering
Hui ZENG, Yuejin ZHANG………………………………………………………………………………………………………(69)
Rayleigh Distribution Renyi Entropy Based Hyperbolic Tangent Step-Size Wavelet Blind Equalization Algorithm
Yecai GUO, Shuyan ZHANG………………………………………………………………………………………………………(73)
Ant Colony Optimization Algorithm Based Orthogonal Wavelet Blind Equalization Algorithm
Yecai GUO, Peipei CHEN ………………………………………………………………………………………………………(78)
MAC Layer Fast Handoff Scheme for WMN under Urban Mass Transit Condition
Shan LIU, Taorui SU………………………………………………………………………………………………………………(83) Distributed Multimedia Presentation through MHEG/DSM-CC
Xia ZHANG, Zhanguo WANG………………………………………………………………………………………………………(88)
The Completion of the Partial Inverse M-Matrix of 2-Chordal Graph and Completion Aalgorithm
Yingjie WANG, Naihua JI, Huiping YAO, Fengbo BAI …………………………………………………………………(91)
Study on Spatial Correlation and Channel Capacity in MIMO Wireless System
Zhaohua ZENG, Wang XING, Xinzhao BAI………………………………………………………………………………………(95)
Research and Implementation of MMS Monitoring Technology
Xizhe HU, Jiangtao LUO, Guangxiu SONG………………………………………………………………………………………(99)
A Kind of Satellite Link Scheme for the Navigation Constellation
Juan SUN, Bo XU ………………………………………………………………………………………………………………(103)
Rayleigh Fading Channels Based on DF Cooperative Communication Protocols of Power Distribution
Qiang HU, Feifei LIN, Tuanfa QIN, Zhenlin GAO………………………………………………………………………………(108)
Analysis of Graphical Model and Construction Algorithm of IRA-Like Codes
Jing LEI, Lei WEN, Bin CHEN, Chaojing TANG…………………………………………………………………………………(112) Analysis of Fast Encoding Algorithm with Low Complexity for QC-LDPC Codes
Lei WEN, Jing LEI, Chaojing TANG …………………………………………………………………………………………(119)
Decoding Algorithm for Non-Binary LDPC Codes
Yu ZHANG, Ying HUANG, Chaojing TANG ……………………………………………………………………………………(124)
Driving Force of Telecommunication Charges Reduction in China
Yanlong WANG, Qiming SUN……………………………………………………………………………………………………(129)
A Quantum Key Distribution Protocol Between Any Two Users in a Network
Bo CAO, Sheng ZHANG, Jian WANG……………………………………………………………………………………………(134)
Optimal Interference Performance to BPSK with Single-Tone Jamming
Hongling LI, Fei XIE, Guangchao DU …………………………………………………………………………………………(138)
Study on SNMP-Based Technology of SNMP Relay
Dan ZHANG, Min CAO…………………………………………………………………………………………………………(142) Quasineutral Numerical Solutions Limit of Drift Diffusion Poisson Model
Junna JIANG, Yuxia TONG, Hong WANG, Yongli AN ……………………………………………………………………………(146) Dynamic Layered Deficit Round Robin Scheduling Algorithm
Chao LIU, Jinyou DAI ……………………………………………………………………………………………………………(149)
Part 3 Network Theory and Technology
Intelligent Classification System of Clients’ Risk for Futures Company
Zhongxing YE, Zhangyi HE, Xinlu TANG………………………………………………………………………………………(153)
Research on QoS with Network Coding and Priority Queuing
Xiaolei LV, Hongli ZHAO, Haitao YANG, Yu HE…………………………………………………………………………………(157) Implementation and Research on the Technology of Statement Detection Based on Host Network Behavior
Dezhi REN, Kaiyu CAI, Peidong ZHU……………………………………………………………………………………………(161)
An Improved Efficient Scheme of the Forgeable Self-Certified Signature Shuting XIE, Liang LIU, Shundong LI……………………(167)
Security Login and Authentication Technology Based on eKey Digital Certificate Bailong YANG, Jing MAO, Xuanji PU………………(171)
Research on the Mechanism of Teaching Method Innovation with Student Participation Xiaoyi LI, Jun XU, Jianyuan GAO …………………(174)
Design of Hardware-Based High-Speed Intrusion Detection System for Telecommunications Network Peng HUANG, Yuanbo GUO, Wei LIU……………………………………………………………………………………………(178)
University Digital Campus and Internet of Things Ying WANG, Cui ZHOU, Gui ZHANG…………………………………………(184)
Research on CRM System Srchitecture Based on SOA and Multi-Agent …………………………………………………………(187)
Xiaopeng JI, Bo DING, Lei HUANG
Research on Wireless Mesh Network Security and Its Applications Jian MAO, Xiandong XU, Kun LI…………&
Coming soon...