The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a monocular vision system for the detection and distance computation of preceding vehicles under foggy weather conditions. It is divided in three major steps. Firstly, adaboost algorithm is used to detect vehicles in front of the host vehicle. Secondly, these vehicles will be tracked by camshaft algorithm; the initial points for camshift algorithm are the centers of the preceding...
In this paper, we investigate opportunistic relay (OR) selection in multi-antenna amplify-and-forward (AF) relay communication networks with secrecy constraints. To reveal the capability of the multiple-antenna relay in improving the secrecy performance, we proposed three selection criteria, namely, minimum selection (MS), conventional selection (CS) and optimal selection (OS). The first scheme tries...
Backscatter communication system is the backbone of many low cost and low power distributed wireless systems. This paper studies the physical layer security (PLS) performance of a backscatter system which contains several relays and an eavesdropper. We discuss the conditions for a positive secrecy rate of the system in two different situations. First, in the case of known information of eavesdropper,...
The Physical Layer Security (PLS) technology has been proved to be an effective way to reduce information leakage in wireless communication networks. This paper discusses the problem of secure transmission for Amplify-and-Forward (AF) cooperative network which contains both an external eavesdropper and some untrusted relays at the same time, where each relay acts as a helper of transmitting information...
This paper proposes a new optimal cooperative jamming (CJ) strategy in the analog network coding (ANC) system against both external and internal eavesdroppers. Firstly, we derive the ANC system security capacity with CJ against eavesdroppers. On this basis, we analyze the jamming power allocation between two time slots subject to a total jamming power constraint. The simulation results show that using...
The fusion of visible and infrared videos can improve the perceptual quality of videos under severe environments, which is important for video surveillance. Since the infrared and visible videos have different spectrum characteristics, it is difficult to retain the hot targets in the fused videos and enhance the textures at the same time. Moreover, a real-time fusion algorithm is highly required in...
Video denoising is important for display and subsequent analysis, but remains to be a challenging problem. Key insights that limit the performance of algorithms include two main aspects. First, low-frequency scene information and the coarse-grained noise in the chroma are mixed with each other, which is different from that in the luma. Thus, denoising the chroma by using only its own information is...
In this paper, we study the generating methods of MSK (minimum-shift keying) signal and present 8 types of MSK modulator structures. Results show that the MSK modulator structure has the certain waveform encryption function for the input messages. Base on this discovery and the idea of frequency-hopping communication, we propose a physical layer transmission scheme with MSK modulation, where the MSK...
This paper investigates the cooperative communication system with untrusted relay using the new scheme that the source transmits the jamming signals and the source signals at the same time. We exploit greedy power allocation algorithm to divide the source power to ensure maximum secrecy capacity. Besides, we analyze the situation that external eavesdropper and untrusted relay exist at the same time...
A novel acquisition method of the Long-range navigation (Loran)-C signal based on matched filter is proposed to improve the acquisition performance of Loran-C signal under heavy noise environment. Higher signal to noise ratio (SNR) could be obtained through matched filtering the received signals. Then outputs are correlated with standard pulse signal and the correlation peaks are judged. Theoretical...
This paper introduces the principle of frequency synthesizers for BPM timing simulator, demands for modernization of BPM timing system, design a kind of frequency synthesizers based on DDS (direct frequency synthesis technology) chip AD9854 and embedded micro-controller processor; it is characterized by output any frequency within the frequency range 0 ∼ 18MHz and the frequency interval is 0.1Hz,...
This paper studies the massive MIMO full-duplex relaying (FDR), where multiple source-destination pairs communicate simultaneously with the help of a common full-duplex relay equipped with very large antenna arrays. In contrast to the conventional MIMO system, massive MIMO must be built with low-cost components which are prone to hardware impairments. In this paper, the effect of hardware impairments...
A novel acquisition method of the Long-range navigation (Loran)-C signal based on matched filter is proposed to improve the acquisition performance of Loran-C signal under heavy noise environment. Higher signal to noise ratio (SNR) could be obtained through matched filtering the received signals. Then outputs are correlated with standard pulse signal and the correlation peaks are judged. Theoretical...
Node cooperation is a promising feature in wireless sensor network, since the application of cooperative communication (CC) can vastly improve the energy efficiency of the network. In this paper, we investigate the Leach based clustering scheme, where the neighboring nodes dynamically form clusters to cooperatively transmit the gathered information to the sink. We model the wireless sensor network...
The two-way relaying system is a promising research direction, for which there are two well-known amplify-and-forward (AF)-based protocols: analog network coding (ANC) and time division broadcast (TDBC). In this paper, we first compare the outage probability performance of these two protocols under the same conditions. It can be observed that ANC performs better under the low SNR circumstance, while...
Ray tracing, as a global illumination based rendering method, is famous for generating high-fidelity images of 3D scene and is widely used in computer graphics. Implementations of ray tracing based on Central Processing Unit (CPU), Graphic Processing Unit (GPU) and Field-programmable Gate Array (FPGA) have been proposed in the past few decades. In this paper, we present a hardware acceleration engine...
A novel algorithm for 3-Dimension traffic reconstruction by automatic and dynamic camera calibration based on dark channel prior in homogenous fog weather condition is presented in this article. Camera fixed in the middle of road is calibrated by scene distance information implicated in homogenous fog weather condition. Unlike other works in 3-D traffic scene reconstruction, this proposed algorithm...
In this paper, a motor learning model based on the basal ganglia (BG) in operant conditioning (OC) using actor-critic (AC) learning is presented. The model has three networks for realizing action selecting function of the BS, such as actor network, critic network and explorer network. Actor network uses a probabilistic fuzzy controller for action selection which is enhanced by the introduction of...
Cooperative communication (CC) technology has emerged as a hot issue in wireless communication nowadays. Cooperative diversity has showed the significant effects on enhancing the system capacity, mitigating the bit error rate caused by the Rayleigh fading channel and improving the quality of the communication system. Based on the previous researches on problem of the relay node placement (RNP), this...
In this paper, the joint effect of both imperfect channel state information (CSI) and co-channel interference (CCI) on the dual-hop two-way amplify-and-forward relaying system (AF TWRS) is investigated. Assuming a Nakagami-m fading environment, we firstly obtain the effective end-to-end signal-to-interference plus noise ratio (SINR) expressions and then derive the closed-form approximate expression...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.