The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a 3D panning method based on particle velocity and sound pressure by four loudspeakers for synthesizing a virtual sound source. Firstly, according to the requirements of maintaining sound physical properties strictly, the distribution coefficients of four loudspeakers are calculated by the coordinates of four loudspeakers and a virtual sound source. If the distribution coefficients...
This paper proposes background segmentation methods that integrate color, Ibp contrast and motion cues so as to improve the segmentation results. The background color models based on GMMs are developed to describe the scene. Motion cues is presented to detect the legitimate moved foreground pixels combining with the background subtraction. Lbp contrast features are used to calculate the image contrast...
In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it's immune to many existing attacks.
In this paper, we redefine the roles in Mobile-TV systems from two parties(service provider and user) to three par-ties(network operator, content provider and user). Afterwards, we concentrate our discussion on service authentication problem in three-party model. Our proposed scheme is based on Identity Based Encryption(IBE) scheme, give a novel way to solve the mutual authentication and batch authentication...
Broadcast encryption schemes are suitable for one-way content distribution and protection applications.However, most of the related papers are from the theoretical point of view, and there is something useful for implementation being overlooked. In this paper, we introduce the pay-TV system as a concrete implementation of broadcast encryption schemes, and simulate the transmission performance of four...
Two points need to be considered on power loading policy of cognitive radio (CR) systems. The first is to maximize the channel capacity over the given frequency band, which is detected usable for CR systems. The second is the out-of-band interference suppression of the CR systems. In the paper based on the mathematical expression of the interference power caused by MB-OFDM based CR systems, the relationship...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.