Gan L.,Chongqing University of Posts and Telecommunications |
Zhu J.,Chongqing University of Posts and Telecommunications |
Miao D.,Sichuan Jiuzhou Electrical Group Co.
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | Year: 2010
Eye detection plays a very important role in the face recognition. This paper expands a Haar features by using Adaboost algorithm to accurately detect the eye. By combining an extremely efficient classifier based on Adaboost algorithm, the wide outlines of eye and eyebrow are detected, and then the templates of these wide doutlines are formed. Finally, these templates are used to match the pictures with eyes and eyebrow. Result shows that the wrong judgement due to the similitude of the eyes and eyebrow can be avoided.
Chen X.-D.,China Academy of Engineering Physics |
Peng B.,Sichuan Jiuzhou Electrical Group Co.
Advanced Materials Research | Year: 2011
In this paper, we address wireless sensor network localization problems that have high reliability in an environment where physical node destruction is possible. We propose a range-independent location algorithm called security location based on genetic algorithm (GASL) that allows sensors to passively determine their location with high reliability, without increasing the number of reference points, or the complexity of the hardware of each reference point or node. In GASL, sensors determine their location based on the optimization of select function by the reliability by aim at some reference point process location compute confirm and remainder energy and distance of node to reference point. By combining the communication range constraints imposed by the physical medium with computationally efficient cryptographic primitives that secure the beacon transmissions. We show that GASL is robust against diversified known attacks and mostly unknown attacks on WSN, such as the wormhole attack, the sybil attack, and inject misdate attack, etc. Finally, our performance evaluation shows that GASL leads to significant improvement in location accuracy and security compared with state of the art range independent location schemes.
Bao P.,Shenzhen Institute of Information Technology |
Bao P.,Southwest University of Science and Technology |
Bao P.,Sichuan Jiuzhou Electrical Group Co. |
Bao P.,University of Electronic Science and Technology of China
Applied Mathematics and Information Sciences | Year: 2012
Localization is crucial to many applications in wireless sensor networks (WSN). In some applications, all nodes are constantly moving in the network. The current algorithms do not appropriately address the problem of enabling nodes of mobile wireless sensor networks (MWSN) to determine their locations. To solve this problem, a new range-free localization algorithm (SSML) based on the idea of sector scan for MWSN is proposed. By using sector scan, the proposed algorithm minimizes the overlapping areas determining the location of the unknown nodes. Therefore, the localization accuracy can be improved. The simulation results shows that SSML algorithm can obviously improve the localization accuracy compared with Convex and Monte Carlo Localization (MCL), and the accuracy of the SSML is lower than 10%. © 2012 NSP Natural Sciences Publishing Cor.
Wang W.-Q.,Northwestern University |
Wang W.-Q.,Sichuan Jiuzhou Electrical Group Co. |
Song Z.-X.,Northwestern University |
Mao X.-F.,Northwestern University
Applied Mechanics and Materials | Year: 2014
Nowadays, there are so many requirements for time-sensitive in designing Ad Hoc network. However, the existing protocols of MAC, such as ALOHA, CSMA, IEEE802.11 etc. which use the "back-off" to avoid collision, or use the "hand shaking" to order the channel bring the time-delay to MAC. The paper promote a MAC protocol named ISA-MAC which adopts FH-TH combine concatenated coding to relieve channel-collision, improve the efficiency of communication and provide the ability "sending at anytime". © (2014) Trans Tech Publications, Switzerland.
Gong M.,Sichuan Jiuzhou Electrical Group Co. |
Guo F.,Southwest University of Science and Technology
Journal of Statistical Physics | Year: 2011
The influence of delayed-time and colored-noise in a bistable system subject to asymmetric dichotomous noise and colored noise is studied. Applying small delay-time approximation, under the adiabatic limit condition, the expression of the signal-to-noise ratio (SNR) of the system is obtained. It is found that, the SNR varies non-monotonously with the delayed-time and the correlation of the colored noise. Moreover, the SNR exhibits SR behavior when it is plotted as a function of the intensity and asymmetry of the dichotomous noise, and as a function of the strength of the colored noise. © 2011 Springer Science+Business Media, LLC.
Gong M.,Sichuan Jiuzhou Electrical Group Co. |
Guo F.,Southwest University of Science and Technology
Chinese Journal of Physics | Year: 2011
The phenomenon of stochastic resonance (SR) in a time-delayed bistable system with square-wave signal, asymmetric dichotomous noise, and colored noise is investigated. Applying the small delay-time approximation, under the adiabatic limit condition, we obtain the expression of the signal-to-noise ratio (SNR) of the system. It is found that the SNR varies non-monotonically with the delay-time and the correlation of the colored noise. Moreover, the SNR exhibits SR behavior as a function of the intensity and asymmetry of the dichotomous noise, as a function of the amplitude of the square-wave, as well as of the strength of the colored noise. The non-linear effect of the system parameters on the SNR is also analyzed. © 2011 The Physical Society of the Republic of China.
Li H.,Sichuan Jiuzhou Electrical Group Co. |
Sun S.,Sichuan Jiuzhou Electrical Group Co.
Yadian Yu Shengguang/Piezoelectrics and Acoustooptics | Year: 2014
Like phase-coded signals, when processed by match filtering, MSK spectrum signals will have higher sidelobes which affects the detection of weak targets. Phase-coded signals usually use the iteratively reweighed least-square algorithm to suppress sidelobes. When this algorithm is applied to MSK spectrum signals for sidelobe suppression, it is found that the ratio of mainlobe to sidelobe can be improved significantly. The simulation results show that the ratio of mainlobe to sidelobe has been raised over 10 dB while the loss of SNR is only around 1 dB.
Liu J.,Sichuan Jiuzhou Electrical Group Co. |
Ye P.,Sichuan Jiuzhou Electrical Group Co.
Proceedings - 3rd International Conference on Instrumentation and Measurement, Computer, Communication and Control, IMCCC 2013 | Year: 2013
Conventional quantization-based data hiding algorithms used uniform quantization. This scheme may be easily estimated by averaging on a set of embedded signals. Furthermore, by uniform quantization, the perceptual characteristics of the original signal are not considered and the watermark energy is distributed uniformly within the original signal, which introduces visual distortions in some parts of it. Therefore, we introduce a logarithmic quantization-based data hiding method based on the visual model by using the wavelet transform that takes advantage of the properties of Watson's visual model and logarithmic quantization index modulation (LQIM). Its improved robustness is due to embedding in the high energy blocks of original image and by applying the logarithmic scheme. In the detection scheme, we model the wavelet coefficients of image by the generalized Gaussian distribution (GGD). Under this assumption, the bit error probability of proposed method is analytically calculated. Performance of the proposed method is analyzed and verified by simulation. Results of experiments demonstrate the imperceptibility of the proposed method and its robustness. © 2013 IEEE.
Tan Y.,Sichuan Jiuzhou Electrical Group Co Ltd |
Zhang K.,Sichuan Jiuzhou Electrical Group Co Ltd
Dianbo Kexue Xuebao/Chinese Journal of Radio Science | Year: 2014
The range history of bistatic synthetic aperture radar(SAR) echo is more complicated than the monostatic case, which increases the difficulty of educing the three imaging factors in chirp scaling algorithm. At present, most of the bistatic SAR processing method processes the bistatic SAR echo according to the bistatic characteristic, but this paper processes the bistatic SAR echo as monostatic SAR echo through transfering the bistatic range course into monostatic range course and introducing the bistatic speed ratio.Further more, it analyzes the error of the method of processing bistatic SAR echo as monostatic case under the situation of transational invariant mode and transational variant mode, which provides the guideness for choosing parameters during SAR imaging process. Copyright © 2014 by Editorial Department of Chinese Journal of Radio Science.
Sichuan Jiuzhou; Electrical Group Co. | Date: 2013-06-22
Data processing equipment, namely, radio-frequency identification (RFID) readers, bar code readers, chip card readers, electronic memory card readers, smart card readers; Blank integrated circuit cards in the nature of blank smart cards; electronic tags for goods; punched card machines for offices; electronic notice boards; Aerials in the nature of antennas; radios; radar apparatus; Satellite-aided navigation systems, namely, satellite navigational apparatuses; modems; portable telephones; Remote video monitoring system consisting primarily of a camera and video monitor for recording and transmitting images to a remote location; Closed circuit TV systems for security and surveillance, namely, cameras, switchers, monitors, microphones, and recorders; Audio-receivers and video-receivers; Audio-video receivers; sound transmitting apparatus; Materials for electricity mains, namely, electric cables and wires; Fiber optic cables, namely, AM fiber optic cables; light-emitting diodes (LEDs); converters, electric; electric installations for the remote control of industrial operations; Alarm monitoring systems. Lighting apparatus, namely, lighting installations; lamps; lighting installations for air vehicles; Lights for vehicles, namely, automobile lights.