The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, Layered Low Density Parity Check (LDPC) Decoder algorithm in Error Correction Codes is implemented on FPGA. Firstly, Layered LDPC Decoder algorithm is designed with floating point in MATLAB, then fixed point model is developed. By testing Floating and Fixed point designs, transmitted information that is deformed by AWGN model is corrected by decoding iteratively. After this step, fixed...
In this study, min-cost network flow formulation for multi-target tracking is adopted for the tracklet merging problem in wide area surveillance. In order to improve the continuity of the computed flows by the min-cost network flow framework, a novel tracklet association cost is proposed to be utilized in this network. The proposed cost is based on connecting two tracklets by considering the traffic...
In this work, an image processing based lane-detection approach is proposed. In the proposed approach, candidate pixels that can be used for lane markings are detected by making use of 1-bit transform as a pre-processing step. Next, feature points are extracted via Sobel filter and candidate lane markings are decided employing a correlation and Hough transform based approach. Finally, Kalman filter...
The increase in the number of devices and users online with the transition of Internet of Things (IoT), increases the amount of large data exponentially. Classification of ascending data, deletion of irrelevant data, and meaning extraction have reached vital importance in today's standards. Analysis can be done in various variations such as Classification of text on text data, analysis of spam, personality...
Sleep stage binary classification is studied using single channel EEG signals. The proposed approach is composed of two steps. In the first step, cepstrum coefficients based features are obtained from EEG signals using a filter bank approach which is tuned for sleep stage classification in terms of number of filters and their type. In the second step, these features are used with support vector machine...
Satellite technologies are used in various disciplines with the improvements in resolutions of sensors. Although spatial resolution of remotely sensed images has increased, automatic information extraction from these images could not reach the desired accuracy. Different studies have been conducted for eliminating the automatic information extraction errors and producing highly accurate spatial information...
The idea of using power line systems for energy transmission as well as for data transmission is an alternative to wireless and wired communication systems. Communicating over the existing power line is quite advantageous in terms of cost. Power line systems are subject to frequency selective fading due to intense ambient noise and multipath transmission in the transmission environment. To overcome...
Scene text localization and recognition keeps attracting an increasing interest from researchers due to its valuable advantage in extracting content from real world images and in image retrieval via text search. Nevertheless, due to the fact that the majority of the image datasets that are commonly used in this field is comprised of text in English, the related studies have mostly been limited to...
In this paper, handwritten character recognition by using characters' writing movements is investigated. To obtain the information about writing movements a 3-axis accelerometer is used. Just like most of other sensors, 3-axis accelerometers give the actual movement signal as well as noise. Before the recognition step, all of the signals need to be preprocessed and the noisy parts need to be removed...
In this research, a method which is implemented on FPGA for real-time extraction of the instantaneous frequency parameters of two simultaneous radar pulses (POP) in electronic support systems is presented. The frequency parameters of two different radars overlapped on time are extracted separately by using digital instantaneous frequency measurement (DIFM) method. Estimation performances of this method...
In recent years, fast development of video editing software has made video forgery applicable. One of the most frequently encountered forgery types in video forensics is the frame duplication forgery. Researches have proposed methods to deal with this type of forgery. The two main drawbacks of this methods reported in the literature are execution time and low detection accuracy. In this work a new...
The purpose of this study is learning and classification of video activities using video color and motion information. The video activity labeling is important for many applications such as video content modeling, indexing, and quick access to content. In this study video activity recognition is performed by deep learning. In order to learn visual features of video, Convolutional Neural Network (CNN)...
Hyperspectral imaging is a popular research topic and it has wide range of application areas. Despite all the advantages, because its huge amount of data, compression is required. In some compression methods, performing a band-ordering as a preprocessing step increases compression performance. In this paper, 1-bit transform (1BT), two-bit transform (2BT), constrained 1-bit transform (C-1BT) and weighted...
Optimum localization problem, which has a wide range of application areas in real life such as emergency services, command and control systems, warehouse localization, shipment planning, aims to find the best location to minimize the arrival, response or return time which might be vital in some applications. In most of the cases, uncertainty in traffic is the most challenging issue and in the literature...
Age of Information is a measure of the freshness of status updates in applications where the timeliness of information is crucial. We study an energy harvesting communication system in which status updates are sent through a link with negligible delay. We consider the average of a cost which is a non-decreasing function of the status age and investigate the optimal policy particularly for the scenario...
In this study, pattern recognition based brain computer interface is designed using EEG p300 component elicited by visual stimuli. A novel EEG database obtained from 19 subjects is constructed with EMOTIV EPOC+ amplifier and OPENVIBE software. Extreme Learning Machine, a type of single layer neural network, Λ-nearest neighbour, Bayesian network and Multi-Layer Perceptron classifiers are compared for...
Brain computer interface applications have big importance in becoming a bridge between the human brain and devices. The studies in this area increase every day with the use of different feature extractions and classification methods In this study, classification is done by Random Forest method using Data Set III presented in BCI Competiton 2003, and it has been shown that combining the Fast Walsh...
In this paper, spatial modulation (SM) technique and low density parity check code (LDPC) are combined. SM technique seems to provide transmissions speed and spectral efficiency at same levels under the low system complexity and cost compared to traditional multiple input multiple output (MIMO) transmission systems. However, SM may give high bit error rate (BER) values at low signal to noise ratios...
4G/LTE (Long Term Evolution) is the state of the art wireless mobile broadband technology. It makes use of the OFDM technology to offer high speed and provides the system resources both in time and frequency domain. A scheduling algorithm running on the base station holds the allocation of these resources. In this paper, the performance of existing downlink scheduling algorithms has been investigated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.