The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By adopting embedded system, the wellhead remote control equipment is designed by choosing an ARM processor and RF2401. In the processing that Wireless transmission to achieve petroleum logging the data of communication between the wellhead, winches, ground equipment vehicles, or other data acquisition devices, so the operation of the downhole tool can be grasped by wellhead staff timely and accurate,...
In this paper, an underwater chaos-based DS-CDMA system is proposed. This system adopts a novel spreading sequence called chaotic phase modulation (CPM) sequence. Comparing with conventional pseudo-noise (PN) sequences, CPM sequence possesses series of advantages, such as higher security, much more quantity available and smaller cross-correlation coefficient, etc. The bit error rate (BER) is compared...
In this paper, we address a sparse signal reconstruction problem of nonlinear dynamic system in Wireless sensor networks (WSNs). A distributed reconstruction algorithm of sparse nonlinear signal is proposed based on sigma-point filter and consensus filter with embedded pseudo-measurement (PM) technology. For numerical accuracy, its square-root version is further developed. By embedding the PM equation,...
Detection of weak stochastic signal under non-Gaussian background is a difficult problem, especially when the prior knowledge of the background as well as the signal is lacking. Traditional detection methods hardly consider both non-Gaussian background and lack of prior knowledge condition simultaneously. This paper proposes an unknown stochastic signal detection algorithm using information geometry...
We introduce a new information theoretic power allocation scheme applicable to distributed multiple-hypothesis detection systems communicating over slow fading channels. In earlier work, it was demonstrated that performance could be improved by adjusting transmit power to maximize the J-divergence measure of a binary detection system and the J-divergence method is extended for a distributed multiple-hypothesis...
Water quality assessment is very important for monitoring water sources and main canal, which is beneficial to offer strategies for the management of water quality and environment. This paper proposes a water quality assessment method based on a sparse autoencoder network. In the proposed approach, a representation model is firstly learned via a sparse autoencoder trained by unlabeled water monitoring...
In this paper, the Positive constrained Least Absolute Shrinkage and Selection Operator (P-LASSO) is studied for sparse support recovery using the correlation information in Compressive sensing (CS). A structural constraint is obtained for selecting the regularization parameter in the case of additive Gaussian noise. Since the measurements are finite in practice, the probability of successful recovering...
Pulse diagnosis is one of the most important methods in traditional Chinese medicine diagnosis. In order to classify the human pulses effectively, feature extraction and pattern recognition are needed. In this paper wavelet transform is used to the feature extraction and the third layer wavelet energy and the wavelet entropy values are selected as the wavelet domain features. Therefore a new feature...
Cryptanalysis of Chang et al. proposed a communication-efficient three-party password authenticated key exchange protocol, we found that their protocol easily suffers from password-compromise impersonation attack and privileged impersonation attack. In this paper, we introduce a novel three-party password authenticated key exchange protocol based on IB-KEM under HDH assumption. Security analysis has...
In this paper, we propose a new error concealment algorithm for video/image based on canonical correlation analysis (CCA). Motivated by the Intra prediction in H.264/AVC, it is reasonable to assume that there is a strong spatial correlation relationship between the lost regions and their known adjacent regions. Based on the above idea, we use CCA to estimate a correlation projection matrix which utilizes...
Aiming at the low rate of human gait recognition and other issues, a novel gait recognition based on gait energy image and linear discriminant analysis is proposed in this paper. Firstly, using background subtraction to segment contours of human body, then a gait cycle is computed with the change of body silhouette width; Secondly, using the images in gait cycle sequences to calculate the gait energy...
The encrypted data in security chips will leaked by side-channel information such as running time, power consumption, electromagnetic signals. Which make it possible to side-channel attack. But the side-channel power consumption data used in the actual attack usually contains a lot of noise, which greatly reduces the success rate. In this paper, the wavelet de-noising research is based on power consumption...
Traditional Support Vector Regression (SVR) Machine acts as approximating a regression function. This paper, however, proposes a novel multi-class classification approach based on the SVR framework, called Support Vector Regression Machine with Consistency (SVRC). The contributions of this paper are: (1) To implement multi-class classification task, were place the margin term with its l1 norm in the...
In this paper, we propose a distributed deployment algorithm for mobile sensor networks. The algorithm imitates the flocking behavior to drive sensors to suitable positions around the target of interest (TOI), such that the distance between each pair of neighboring sensors approaches a desired value, which could be determined by practical communication model. The movement of each sensor is governed...
Underwater acoustic channel has some special properties: large propagation delay, limited bandwidth and poor quality of the physical link. The design of MAC protocol for underwater acoustic sensor networks is more difficult than terrestrial wireless networks. Because of the large propagation delay, the MAC protocol of the terrestrial wireless networks is not suitable for the underwater acoustic sensor...
Aiming at classic Mean Shift based on tracking algorithm can not track target when the speed changed, the paper proposed an improved algorithm based on corrected background weighted histogram(CBWH), the algorithm used two iterations on target, first time used mean shift to iterate and calculated the similarity coefficient, second iteration used twice the current frame center minus the previous frame...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.