The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method for detecting human motion in complex scenarios based on Channel State Information (CSI) is presented. First, the sensitivity of CSI phase information to human motion is explored, especially to the strenuous motion. Through a large number of experiments, the influence of human motion on CSI phase is found out, and the characteristics of signal changes are extracted. The One-class Support...
WiFi-based Human activity recognition has attracted attention in the human-computer interaction, smart homes, and security monitoring fields. We first construct a WiFi-based activity dataset, namely WiAR, to provide a benchmark for existing works. Then, we leverage the moving variance of CSI to detect the start and end of activity. Moreover, we present K-means-based subcarrier selection mechanism...
This paper presents the design of a 6-path offset based feedforward amplifier with high linearity. It leads to both high order nonlinearity compensation and 1dB compression point (P1dB) expansion at the same time. The structure avoids the use of extra gain stages and the superposition mechanism improves the gain which saves the power. The linearized amplifier was implemented by the 130nm SiGe technology...
Graph mining is widely used in fields like social network analysis. The synchronous vertex-centric frameworks strike better balance between the performance and ease-of-use, so they are widely used in realistic. However, traditional architectures of this type, like the vertex-based push architecture and GAS, are encumbered by high communication costs. In this paper we proposed a new replica-based push...
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Device-to-device (D2D) communication is a promising technology for wireless communication in the near future. Since D2D communication usually reuses the resource of cellular users, interference management is a key element. However, when secrecy capacity is taken into consideration, the interference caused by D2D communication could be taken advantage of as a kind of help against eavesdroppers. In...
Ubiquitous computing technology has brought great attentions in recent years since it promises a simple operation to an ever increasing comprehensive digital world. For a networked home supporting advanced applications, ubiquitous media access becomes a must to offer enjoyable experience for home users. The first step of ubiquitous computing is the seamless detection of user activities in order to...
In this work, two novel local feature patterns-Modified Local Binary patterns (MLBP) and local Ternary patterns (LIP), are proposed for extrac features in the facial image, which use some distinct rule to code the values in a label, respectively. These patterns are more invariant to illuminance and face expression compared to traditional one. After getting the local feature patterns, in order to take...
As RFID tags become popular, their volume in both the number of applications and the sheer number per application is bound to increase. This increase in density of RFID tags at any given location invariably results in collision problems that occur when a reader tries to simultaneously read multiple tags that are present in its field. The Slotted ALOHA protocol and its variants have been used over...
Object recognition based on probabilistic Latent Semantic Analysis (pLSA) has shown excellent performance, but it is sensitive to background clutter. In this paper, we propose a novel framework called AM-pLSA, which combines pLSA with visual attention model, to learn object classes from unlabeled images with cluttered background. We firstly detect salient regions and non-salient regions in an image...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.