The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hand gestures are tools for conveying information, expressing emotion, interacting with electronic devices or even serving disabled people as a second language. A gesture can be recognized by capturing the movement of the hand, in real time, and classifying the collected data. Several commercial products such as Microsoft Kinect, Leap Motion Sensor, Synertial Gloves and HTC Vive have been released...
This paper studies the physical layer security in a multi-user downlink, where a single user is selected for secret transmission during each time frame. Current works usually assume a worst case where all unselected users are curious and act as eavesdroppers, and conclude that no multiuser diversity is achievable for secrecy when the number of users is pretty large. However, the worst case may happen...
Secret communication has long been an import issue in recent years. To protect a secret, encryption is a general way to help owners encrypt the secret into meaningless information for non-owners in order to prevent secret leakage. Since fine-grained encryption provides more flexibility in information protection, it has drawn more attention in recent years, but effective methods are rare in this new...
A 25Gb/s hybrid-integrated microring receiver which includes a thermal tuning loop that stabilizes the drop filter resonance wavelength is implemented. The multi-channel 65nm CMOS source-synchronous receiver achieves −8.2 dBm sensitivity at BER <10−12 and 0.68pJ/b.
QR code is the commonly used two-dimensional (2D) barcode recently with the advantages of larger QR content and error correction capability. Based on the error correction property of QR code, we designed a secret hiding technique for QR barcode. The proposed scheme can conceal the secret data into the cover QR code without distorting the readability of QR content. That is, general browsers can read...
Spatial multiplexing is an efficient transmission technique for video streaming in multiple-input multiple-output (MIMO) wireless communication links due to its capability to support the high transmit rate. Nevertheless, the video quality is sensitive to packet losses resulting from channel fading and co-interference between transmit antennas in spatial multiplexing systems. Antenna selection techniques...
A bistatic Synthetic Aperture Radar (Bis-SAR) imagery simulation of an extended sea surface is presented which is based on a facet scattering model. A semi-deterministic approach is developed to calculate high frequency bistatic raw data from the model of large sea surface. An effective method of modified nonlinear chirp scaling (NLCS) algorithm is presented to handle a general case of bistatic raw...
Wet paper coding is a technique that can be used to embed secrets into some specific pixels, called dry pixels, of a digital image. The fully exploiting modifications method (FEM) is a method applied to convey secrets securely from senders to receivers using a stego-image that is slightly modified from the original digital image. Based on FEM, before embedding, we randomly choose pixels in the image...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
In this paper, for the first time, we demonstrate the closed-loop operation of an integrated coherent receiver with the grating-based beam splitter. The drive voltage to the modulator pair is obtained through the integration of the detector current across the capacitance of the detector and the modulator, and hence, the level of this drive voltage is proportional to the detected photocurrent level...
Data embedding is one of the important issues for securely conveying secrets from senders to receivers without arousing any notices to attackers. Wet paper coding (WPC) is one of the data embedding schemes which embeds secrets into a subset of pixels of an image. The pixels in the subset are also called dry pixels. Inspired by wet paper coding, a novel data embedding scheme with a magic matrix is...
Channel mismatch, including amplitude and phase mismatch, has severely affected the performance of space-time adaptive processing (STAP). In order to ascertain the specification of the effects on STAP, theory analysis of relation between clutter covariance matrix (CCM) with and without channel mismatch is done based on the model provided by literature, and the effect to signal is also analyzed. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.