The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to realize practical dynamic spectrum access (DSA), implementing spectrum sensing with reasonably low cost is very challenging due to the required detection accuracy and quickness. For this issue, we have introduced an extended DSA, smart spectrum access (SSA), where any useful information in terms of spectrum utilization, such as statistics regarding spectrum utilization, is used not only...
This paper presents a formal analysis of multiple popular approximate counting schemes that employ the conservative update policy, such as CU-Sketch and Minimal Increment Spectral Bloom Filters, under a unified framework. It is also shown that when applied to items picked from a skewed distribution, such as Zipf-like functions, the analysis follows very closely empirical results obtained through simulations...
Detection of moving objects is one of the key steps for vision based applications. Many previous works leverage background subtraction using background models and assume that image sequences are captured from a stationary camera. These methods are not directly applied to image sequences from a moving camera because both foreground and background objects move with respect to the camera. One of the...
In this work, we present a novel method for accurate affine transformation estimation of image regions. We illustrate the benefits of using such a method in a point matching mechanism that enables locating large amount of point matches with high geometric precision and low rate of false matches. Recent publications have shown that considering the affine transformation model of local regions, is extremely...
Camera-based photoplethysmography provides a mean to monitor cardiovascular parameters remotely. This contribution tackles heart beat detection from remote photoplethysmograms (rPPG) by using a Wavelet-based detection algorithm and time delay estimation. Using experimental recordings of 18 healthy volunteers under resting conditions we demonstrate that depending on the used region of interest detection...
We present a framework for Tensor-based subspace Tracking via Kronecker-structured projections (TeTraKron). TeTraKron allows to extend arbitrary matrix-based subspace tracking schemes to track the tensor-based subspace estimate. The latter can be computed via a structured projection applied to the matrix-based subspace estimate which enforces the multi-dimensional structure in a computationally efficient...
The objective of this work is to investigate potential accuracy improvements in the fingerprint-based indoor positioning processes, by imposing map-constraints into the positioning algorithms in the form of a-priori knowledge. In our approach, we propose the introduction of a Route Probability Factor (RPF), which reflects the possibility of a user, to be located on one position instead of all others...
Short range wireless is an emerging technology that is deployed to serve an increasing number of research projects and applications in various fields. Location estimation of an object comes on top of them. It is considered a major research for remote sensing, navigation and intelligent transportation systems (ITS). Studies show that the location of base stations is of great impact on the position...
Many application areas that use supervised machine learning make use of multiple raters to collect target ratings for training data. Usage of multiple raters, however, inevitably introduces the risk that a proportion of them will be unreliable. The presence of unreliable raters can prolong the rating process, make it more expensive and lead to inaccurate ratings. The dominant, "static" approach...
Vehicular networks are expected to enable vehicles on the road to exchange safety information; enhancing traffic flow and minimizing accidents. With vehicle positions being the most frequently exchanged information in vehicular networks, it becomes imperative to establish a strong level of trust in the announced positions before a vehicle initiates a response. This paper proposes a position verification...
BitTorrent(BT) has emerged as one of the most popular protocols for content sharing in recent years. Most BT applications are network-oblivious which brings great challenges to traffic engineering. As basic input information, network-wide BT traffic distribution is of vital importance for service providers (SP) or carriers to enforce appropriate control policies. Direct online measurement of network-wide...
In this paper we propose a new method for appearance-based pose estimation, called Local Procrustes Regression (LPR). In LPR, rather than learning a map between all available training samples and pose space, as is common for appearance-based pose estimation algorithms, the pose of an unknown sample is recovered locally from a small subset of the training samples, by utilizing their inter-point distances...
This paper proposes a novel trust evaluation method for service choreography. Compared with current work towards this problem, it considers not only the trust for individual partner services and the explicit trust relation among partner services that have logical dependencies for each other, but also the implicit trust relation implied in data-dependencies among services. A serial of experiments,...
Current markerless 3D registration methods usually utilize a single specified category of natural features. However, the richness of various natural features is ignored. They cannot meet users' diversified registration requirements. This article proposes an integration strategy of 3D registration methods based on multiple natural features. Utilizing feature detection and tracking and 3D registration...
The manipulation of text on a sign or billboard is relatively easy to do in a way that is perceptually convincing. When text is on a planar surface and imaged under perspective projection, the text undergoes a specific distortion. When text is manipulated, it is unlikely to precisely satisfy this geometric mapping. We describe a technique for detecting if text in an image obeys the expected perspective...
Accuracy is a very important criterion for the classifier in the process of classification. In this paper, a unified paradigm for the calculation of accuracy evaluated different classifier, using topological covering-based granular computing, is presented under the given sample space and different ideal classification assumptions. And corresponding examples for the calculation of accuracy in different...
The localization principle and error source of DV-Hop algorithm which is classic self-localization algorithm in wireless network are introduced in this paper. Aiming at the disadvantage of DV-Hop algorithm on localization accuracy, an improved scheme by modifying the average hop distance is proposed. The simulation results show that the comprehensive properties of the improved algorithm (including...
This research addresses the problem of counting in Delay Tolerant Networks (DTNs). The goal is to estimate the total number of nodes in the network with short delay time, high accuracy and small storage overhead. DTNs are occasionally connected networks that may suffer from frequent partitions. While counting in conventional (well-connected) networks has been extensively studied, it remains challenging...
In this paper, the Radio Frequency Identification (RFID) technology is used for indoor localization (i.e. location estimation). The location of a RFID reader is estimated based on the known locations of the RFID tags attached to the ceiling with 60 cm separation. Two arranged pattern of tags are considered. One is a square arranged pattern and another one is a triangle arranged pattern. Then, two...
Most monitoring or tracking applications require the localization information in wireless sensor network. The DV-Hop provides a basic scheme to retrieve the localization without GPS information. DV-Hop scheme only uses the localizations of the reference nodes and the hop-count, so the fundamental estimation may cause the larger error than range-based schemes. The proposed scheme uses the neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.