The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Object deformation and occlusion are ubiquitous problems for visual tracking. Though many efforts have been made to handle object deformation and occlusion, most existing tracking algorithms fail in case of large deformation and severe occlusion. In this paper, we propose a graph learning-based tracking framework to handle both challenges. For each consecutive frame pair, we construct a weighted graph,...
In this paper, we introduce a novel method to discover common and distinct structural connectivity patterns between SZP and MDD via a Cluster-Driven Nonnegative Matrix Factorization (called CD-NMF). Specifically, CD-NMF is applied to decompose the joint structural connectivity map into common and distinct parts, and each part is further factorized into two sub-matrices (i.e. common/distinct basis...
In this work, an automatic gain control amplifier for high voltage spindle recording is proposed. It is composed of a fix-gain amplifier and a variable gain amplifier (VGA) with threshold detecting logic to control the gain of VGA. The system provides 3 different gain set: 54dB, 60dB and 66dB. The bandwidth of the system covers from 0.5Hz to 1.5 KHz. The power is 7.7uW, and the integral input referred...
This paper studies the channel estimation and equalisation of orthogonal frequency-division multiplexing (OFDM) systems over doubly selective channels. We consider practical channel estimation schemes based on basis expansion model (BEM) and clustered pilots. We investigate the influence of the parameters of the channel estimation scheme, including the dimensionality of the BEM basis and bandwidth...
This paper discloses the development of modular front-end medium-voltage solid-state transformer (SST) to show system level design, circuit topology, and prototype test results. Each multilevel front-end module consists of two stages: (1) ac to dc boost converter with power factor correction dc and (2) isolated dc-dc LLC converter. The proposed system has been designed, simulated, and fabricated with...
WiGig enables wireless multi-gigabit communication over 60GHz band. However, its usage scenarios may be constrained by two major limitations: line-of-sight propagation and very short transmission range. We seek to boost the WiGig's usability by using WiFi to complement its limitations in tri-band (2.4/5/60GHz) wireless systems. Our goal is to let a tri-band client have multimedia services at the WiGig's...
Most GPU-based graph systems cannot handle large-scale graphs that do not fit in the GPU memory. The ever-increasing graph size demands a scale-up graph system, which can run on a single GPU with optimized memory access efficiency and well-controlled data transfer overhead. However, existing systems either incur redundant data transfers or fail to use shared memory. In this paper we present Graphie,...
Maintenance and service support scheduling for carrier aircraft on flight deck is crucial for the whole cycle of flight and support operations. In order to shorten the support operation time of carrier aircrafts, the topological constraints and resource constraints are taken into account, thus the optimization model of centralized support scheduling for carrier aircrafts is established and the Double-population...
For aerial images, the SURF algorithm is applied to image feature extraction and matching. In this paper, a novel compensation matching algorithm is proposed to improve the matching accuracy. According to the transformation matrix estimated by feature matching results from SURF algorithm, RANSAC algorithm is used to compute transformation matrix iteratively. Then under the condition of epipolar constraint,...
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic related statistics in order to provide distinguishing features for detection. The proposed IDS was evaluated using the well-known KDD Cup 99 data set. Evaluation...
This paper reviews the first challenge on single image super-resolution (restoration of rich details in an low resolution image) with focus on proposed solutions and results. A new DIVerse 2K resolution image dataset (DIV2K) was employed. The challenge had 6 competitions divided into 2 tracks with 3 magnification factors each. Track 1 employed the standard bicubic downscaling setup, while Track 2...
In this paper, balanced two-stage residual networks (BTSRN) are proposed for single image super-resolution. The deep residual design with constrained depth achieves the optimal balance between the accuracy and the speed for super-resolving images. The experiments show that the balanced two-stage structure, together with our lightweight two-layer PConv residual block design, achieves very promising...
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence,...
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence,...
Chinese character culture is the ancients will be the experience of life, into words, language, vocabulary and other forms and content, and derived from calligraphy, seal and other traditional artistic expression, with the creation of ingenuity; and for Nushu such as the disappearance of the national language there is a lack of convenient and effective design conversion model.
Two-stage precoding is a promising transmission strategy for multi-user frequency division duplex (FDD) massive multiple-input multiple-output (MIMO) systems due to its large multiplexing gain with overhead reduction in both downlink channel estimation and channel state information (CSI) feedback. The performance of existing two-stage precoding schemes mainly depends on appropriate selection and clustering...
This paper presents the Ultra-WideBand (UWB) double-balanced Gilbert-cell mixer by using CMOS 0.18-µm process. At input port, using the Marchand-balun to supply difference phase. It uses the cross-coupled pair to supply negative resistance. By utilizing the cross-coupled pair in parallel with the load(RL) to increase the conversion gain (CG). The mixer offers a peak gain of 9.04 dB, the 3 dB bandwidth...
Assigning programming homework for programming courses is a significant learning activity used to improve students' programming ability. However, it is more challenging for instructors and TAs to assess the contents of programs written by students. For instance, they do not know the histories of program writings; they have to review source code manually; and even they cannot obtain statistic information...
Mask estimation has shown a IoT of promise in speech enhancement for its simplicity and large speech intelligibility improvement. In this paper, the gammachirp filter banks are applied on the contaminated speech signal to get the auditory time-frequency representation. Robust principal component analysis with non-negative constraint is employed to decompose the auditory time-frequency representation...
Monaural speech enhancement is a key yet challenging problem in speech area, which is always used as a pre-processing step of robust speech processing. Deep learning has proved to be very successful for solving this issue. In this paper, a new approach for enhancing the noisy speech in a single channel recording is presented. We propose a modified ideal ratio mask (IRM) which calculated by normalized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.