The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Text spotting, i.e., the localization and recognition of text occurrences in natural images and videos, is a challenging problem in computer vision. Important applications of text spotting are: video indexing, retrieval and search, the support of blind persons in finding their way in unknown environments and reading street and shop signs for autonomously driving vehicles or car license plate recognition...
In this paper, we study the performance of a dualhop amplify-and-forward (AF) communication system over asymmetric links composed of Radio-Frequency (RF) and Free-Space-Optical (FSO) links in the presence of atmospheric turbulence as well as pointing error impairments under both heterodyne detection and intensity modulation with direct detection (IM/DD) techniques. The RF link is assumed to operate...
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However,...
This paper presents a secure protocol for authenticating Electronic Control Units (ECUs) in the Controller Area Network (CAN) bus and establishing session keys between them. These keys are used to introduce message source authentication for the CAN network. Our method is based on the elliptic curve cryptography (ECC) which is more suitable for embedded systems where computational power and memory...
In this paper, we investigate the combinatorial design of a new class of One-Step Majority-Logic Decodable (OSMLD) codes, based on Balanced Incomplete Block Designs of type Oval, which are derived from finite geometry. We show that the constructed OSMLD codes provides high rates in addition to good correction capacities. Simulation results shows that the proposed codes converge well under iterative...
In this work, we study the performance of a single relay Multiple Input Multiple Output (MIMO) cooperative communication system based on Decode and Forward (DF) relaying protocol for two strategies using transmit antenna selection at the source. The first strategy uses one antenna between the relay and the destination, and the second strategy uses Space Time Block Coding (STBC). All channels follow...
Collaboration between organization changes dynamically and spreads rapidly through a Collaborative Network (CN). Developing methods for handling such networks of collaboration on a real scale requires modeling social interactions between different actors in order to share, analyze, and suggest improvements for a collaboration perspective. This paper describes a new tool for collaboration modeling...
A Baseband Digital Predistorter design is proposed in this paper for a UHF 8 MHz Power Amplifier (PA) for DVB-T transmitter. A Memory Polynomial (MP) model is considered for the PA characterization and its coefficients are estimated based on Least Square Estimation (LSE) algorithm. The Indirect Learning Architecture (ILA) approach is used to estimate the coefficients of the predistorter. Simulation...
Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes...
The Internet of Things (IoT) is an important part of the information technology of the future. Technically, IoT is expected to enable people-thing and thing-thing interconnections by combining communication technologies and networks. Our Lab has been actively promoting research on 5G & IoT, in which the NB-IoT new radio interface issue is of great interest. New 5G tests put forward a lot of requirements...
Compressive Sensing (CS) is a new methodology to reconstruct sparse signals from a few number of measurements. These measurements are captured by a sensing matrix, which has a direct impact on the performance of the reconstruction algorithms. Among the sensing matrices proposed in the literature, Bernoulli and Gaussian random sensing matrices are the most prominent. In this work, we propose to improve...
Wireless Visual Sensor Network is a collective network of nodes equipped by cameras and powered by batteries. These nodes are capable of collecting, processing, and transmitting a large amount of image/video data to each other and to the Sink. In order to increase the lifetime of such a network, it is essential to decrease the energy used in both processing and transmission tasks. This paper proposes...
The latest experiences hint that the QoS (Quality of Service) approaches adopted by IMS (IP Multimedia Subsystem) technologies are still suffering from a primary containment factor due to the nondifferentiation between IPTV (Internet Protocol Television) video components. The success of IPTV services depends on how the customer perceives QoS related to the provided stream. The satisfaction of this...
Stereo matching is a fundamental task in vision applications. we propose an adaptive cross-scale aggregation method for stereo matching, which is introduced by solving an optimization problem. Unlike the original approach which introduces the same regularization term based on the inter-scale regularizer parameter to control the cost consistency among the multi-scales for all regions of the input images...
Wireless Sensor Networks are deployed in different fields of application to gather data on the monitored environment. The Wireless Body Sensor Network (WBSN) is a wireless sensor network designed to monitor a human body vital and environment parameters. The design and development of such WBSN systems for health monitoring have been motivated by costly healthcare and propelled by the development of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.