期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Asynchronous QR-RLS-CMOE Blind Multiuser Detection
1
作者 宋春玲 吕明 徐洋波 《Journal of Electronic Science and Technology of China》 2005年第2期130-133,共4页
The QR-RLS-CMOE algorithm which was applied to synchronous DS/CDMA systems in AWGN channel, is modified and applied to asynchronous DS/CDMA systems in multi-path fading channel in this paper. Computer simulation exper... The QR-RLS-CMOE algorithm which was applied to synchronous DS/CDMA systems in AWGN channel, is modified and applied to asynchronous DS/CDMA systems in multi-path fading channel in this paper. Computer simulation experiences show that the asynchronous QR-RLS-CMOE (A-QR-RLS-CMOE) blind multiuser detection algorithm can well cancel multiple access interference and overcome multipath fading, and has a good anti-near-far effect in the case of τ<<bT . 展开更多
关键词 multiple access interference blind multiuser detection A-QR-RLS-CMOE CDMA
在线阅读 下载PDF
Wavelet Transform Modulus Maxima-Based Robust Digital Image Watermarking in Wavelet Domain
2
作者 骆婷 洪帆 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期1-8,共8页
A new robust watermarking approach was proposed in 2D continuous wavelet domain (CWT). The watermark is embedded into the large coefficients in the middle band of wavelet transform modulus maxima (WTMM) of the hos... A new robust watermarking approach was proposed in 2D continuous wavelet domain (CWT). The watermark is embedded into the large coefficients in the middle band of wavelet transform modulus maxima (WTMM) of the host image. After possible attacks, the watermark is then detected and extracted by correlation analysis. Compared with other wavelet domain watermarking approaches, the WTMM approach can endow the image with beth rotation and shift invariant properties. On the other hand, scale invariance is achieved with the geometric normalization during watermark detection. Case studies involve various attacks such as shifting, lossy compression, scaling, rotation and median filtering on the watermarked image, and the result shows that the approach is robust to these attacks. 展开更多
关键词 Image watermarking Wavelet transform modulus maxima Geometric invariant blind detection
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部