This letter investigates the wavelet transform, as well as the principle and the method of the noise reduction based on wavelet transform, it chooses the threshold noise reduction, and discusses in detail the principl...
Supported by the National Natural Science Foundation of China (No. 60874060)
This paper presents an improved Voice Activity Detection (VAD) algorithm which uses the Signal-to-Noise Ratio (SNR) measure. We assume that noise Power Spectral Density (PSD) in each spectral bin follows a Rayle...
Supported by the National Natural Science Foundation of China (No.60503005);the Natural Science Foundation of Hunan Province (No.07JJ6110)
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How...
AT-InSAR(Along Track Interferometric SAR) is a technique to detect slow-moving targets. However, the detection performance is greatly influenced by noise and clutter. In this paper, the influence of noise and clutter ...
Supported by the National Natural Science Foundation of China (No.10671051);the Natural Science Foundation of Zhejiang Province (No.Y105067).
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv...
the National Natural Science Foundation of China (NSFC);the Research Grants Council of Hong Kong (RGC) joint research scheme (No.60218001/N_ HKUST617-02 and No.60272070).
In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both e...
Supported by the National Natural Science Foundation of China (No.60472057).
This letter presents an efficient scheduling algorithm DTRR (Dual-Threshold Round Robin) for input-queued switches. In DTRR, a new matched input and output by round robin in a cell time will be locked by two self-adap...
Supported by the 973 Project of China(G19990358?04)
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec...
Supported by the National Natural Science Foundation of China (No.10471152).
This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group...
Supported by the National 973 Project of China(No.G1999035803)the National Natural Science Foundation of China (No.60373104)the National 863 Project of China (No.2002AA143021)
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese...