The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the problem of robust topology design of the multi-UAV formation. We use a digraph to model the topology of the multi-UAV formation, and propose the definition of anti-k-communication-destroying topology, meaning the system can still performs normally even when any arbitrary k communicating links are destroyed. By exploring the property of this kind of topology based on graph...
As a complicated distributed system, distributed MIMO radars are vulnerable to cybersecurity attacks against its three key components: the transmitters, the receivers, and the communication links that connect them and the fusion center. In this paper, we investigate the impact of cybersecurity attacks on detection performance of a distributed MIMO radar. We show that the detection performance degrades...
A distributed MIMO radar system consists of multiple transmitters, receivers, and a fusion center where the final target detection decision is made. It has previously been shown that a distributed MIMO radar offers improved performance compared with a conventional radar system due to the increased system diversity and degrees of freedom. However, as a complicated distributed system, it is vulnerable...
We investigate the structure of quantizer rules at the local sensors in distributed detection networks, in the presence of eavesdroppers (Eve), under asymptotic regime (number of sensors tending to infinity) for binary hypotheses. These local quantizers are designed in such a way that the confidentiality of sensor data is preserved while achieving optimal detection performance at the fusion center...
Coarse-grain multi-threshold CMOS (MTCMOS) is an effective power-gating technique to reduce IC's leakage power consumption by turning off idle devices with MTCMOS power switches. In this paper, we study the usage of coarse-grain MTCMOS power switches for both logic circuits and SRAMs, and then propose corresponding methods of testing stuck-open power switches for each of them. For logic circuits,...
Reactive power planning (VAR Planning) is one of the most challenging issues in the domain of power system research. It is a mixed integer nonlinear optimization problem with a large number of variables and uncertain parameters. In this paper, first, the fuzzy clustering method is employed to select candidate locations for installing new shunt VAR sources. Specifically, U/U0 index, G index, and a...
Most existing performance evaluation methods concentrate on defining separate metrics over a wide range of conditions and generating standard benchmarking video sequences for examining the effectiveness of video tracking systems. In other words, these methods attempt to design a robustness margin or factor for the system. These methods are deterministic in which a robustness factor, for example, 2...
Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness in cognitive radio networks (CRNs). The data fusion scheme is a key component of collaborative spectrum sensing. We have recently analyzed the problem of Byzantine attacks in CRNs, where malicious users send false sensing data to the fusion center (FC) leading to...
Mesh-based peer-to-peer (P2P) streaming has proven to be a robust and scalable way for delivering live video streams over the Internet. In this paper, we study how to optimize overlay in a contribution aware manner. We have designed a suite of protocols to construct and optimize the overlay. Our core idea is to promote nodes with larger contribution closer to the source node so as to keep a compact...
While statistical analysis has been considered as an important tool for nanoscale integrated circuit design, many IC designers would like to know the design-specific worst-case corners for circuit debugging and failure diagnosis. In this paper, we propose a novel algorithm to efficiently extract the worst-case corners for nanoscale ICs. Our proposed approach mathematically formulates a quadratically...
Linear motion and out-of-focus blur often coexist in a surveillance system, which degrade the quality of acquired images and thus complicate the task of object recognition and event detection. In this work, we present a point spread function-based (PSF-based) approach considering fundamental characteristics of linear motion and out-of-focus blur based on geometric optics to restore coexisting motion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.