The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 60 GHz technology has become a promising alternative for indoor positioning systems because it can provide very accurate temporal and spatial information for precise time of arrival (TOA) estimation. However, non-line-of-sight (NLOS) propagation in indoor environments can significantly degrade the localization accuracy with 60 GHz signals. To reduce the effects of NLOS propagation, a fingerprinting...
In this paper, we address the problem of multi-class classification of hydrophone data for acoustic events using low-dimensional features. A new iterative multiclass classification scheme is proposed based on the combination of adaptive MFCC feature set and an improved HMM-GMM classifier. The adaptive window length for MFCC is important since for acoustic sounds in the ocean, the optimum window length...
In this work we investigate radar imaging satellites' dependency on ground stations to transfer the image data. Since synthetic aperture radar images are very big, only ground stations are equipped to process that much data in realtime. This is a problem for maritime surveillance as it creates delay between imaging and processing. We propose a hardware algorithm that can be used by a satellite to...
Though the popularity and demand for machine learning infrastructures is soaring in this age of “big data”, general purpose configuration and deployment strategies are still in their infancy. This paper presents Proteus, a flexible and extensible framework allowing different machine learning algorithms to be introduced in a plug-and-play manner in order to be evaluated. Proteus enables domain experts...
The demand for fast and secure cryptographic encryption techniques has been growing over the recent years. The introduction of the CUDA programming framework by NVIDIA allowed utilizing GPUs for general purpose computing. The use of GPUs in the cryptography domain has become quite popular ever since. In this paper, we present a CUDA implementation of the blowfish encryption algorithm. The algorithm...
Various Internet of Things (IoT) Platforms are currently announced by major IT companies. Google also announced IoT open-sourced platform project which called as Physical Web. If Physical Web is released to the IoT marketplace, a number of beacons would be in demand because each service requires at least one beacon for connectivity. Small area which set multiple beacons are set up occur interference...
This paper presents a ranging approach using an improved preamble sequence of orthogonal frequency-division multiplexing (OFDM) signal for 60 GHz system. The performance of range estimation with OFDM modulation under 60GHz channel is analyzed emphatically. In order to utilize the time-frequency characteristics of OFDM signal in the ranging system, the subcarriers phase difference algorithm with an...
In earlier work, Tu and Adams proposed the ERDED method, an effective technique for generating triangle-mesh models of digital images through explicit representation of discontinuities. In this paper, we propose a modified version of the ERDED method that generates a triangle mesh which better approximates the original image using an optimization-based algorithm. The proposed method is shown to produce...
The secrecy capacity (SC) from the source to a destination in a dual-hop amplify-and-forward (AF) relay network using cooperative jamming (CJ) is investigated. Conditions for achieving a positive SC are derived. An energy constrained untrusted cooperative relaying protocol is considered in which the relay forwards information from the source to the destination while harvesting energy from the source...
We propose a spectrum-sharing mechanism for LTE networks taking into account the needs of different network operators and individual QoS requirements. It increases the utilization of spectrum by regarding operators' allocations of spectrum as a shared resource and sets user priorities for accessing this spectrum. In this paper, the example scenario given explains our approach in depth: it has better...
Recent reports on Internet security have indicated that the DNS (Domain Name System) protocol is being used for botnet communication in various botnets; in particular, botnet communication based on DNS TXT record type has been observed as a new technique in some botnet-based cyber attacks. One of the most fundamental Internet protocols, the DNS protocol is used for basic name resolution as well as...
The coupling of microwaves into apertures plays an important part in many electromagnetic physics and engineering fields. When the width of apertures is very small, Finite Difference Time Domain (FDTD) simulation of the coupling is very time-consuming. As a many-core architecture, the Intel's Many Integrated Core (MIC) architecture owns 512-bit vector units and more than 200 threads. In this paper,...
In August 2014, ATSC adapted 3DTV standard which is service compatible 3DTV using main and mobile hybrid delivery (SC-MMH), and the 3DTV standard uses the ATSC M/H transmission system. Because the M/H system transmits both main and mobile training sequences for equalization, ATSC 3DTV reception performance can be improved by using both training sequences. This paper introduces the LMS-DFE and proposes...
Large sets of similar images are produced in many applications. To store these images more efficiently, redundancy among similar images need to be exploited. A number of methods have been proposed to reduce such inter-image redundancy in lossy image set compression. These methods encode each image either using a conventional image compression algorithm, or predicts the image from a similar image already...
A 60 GHz ranging model is established and a strongest path search ranging algorithm based on beamforming is proposed. The range error caused by a non-line of sight (NLOS) channel is mitigated by modeling the corresponding delay bias. Outlier detection is employed to improve the accuracy. Performance results are presented which show that 60 GHz ranging can achieve centimeter level accuracy in indoor...
This paper focuses on the use of machine learning techniques for the analysis of computer programs in order to acquire information about an author's gender. There are few existing studies that address the relationship between linguistics and programming; however, in many areas where language is analyzed it is possible to mine important information about the users of that language associated with set...
In this paper, we proposed a scalable RDF triple store for massive-scale RDF data that processes the SPARQL query with many join operations in efficient manner. Graph characteristic of RDF data model hinders scalable and efficient indexing and querying over RDF triples. To address the problem, our query processing uses the pruning algorithm based on Bit-structure and summarized information to minimize...
The spectrum of an object moving in 5-D light field videos (also known as plenoptic videos) with constant velocity and at non-constant depth is analyzed. Based on this analysis, a novel 5-D IIR adaptive depth-velocity filter is proposed for enhancing such objects. The time-variant coefficients of the proposed 5-D IIR adaptive depth-velocity filter are derived in closed form. Numerical simulation results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.