Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A method for detecting human motion in complex scenarios based on Channel State Information (CSI) is presented. First, the sensitivity of CSI phase information to human motion is explored, especially to the strenuous motion. Through a large number of experiments, the influence of human motion on CSI phase is found out, and the characteristics of signal changes are extracted. The One-class Support...
WiFi-based Human activity recognition has attracted attention in the human-computer interaction, smart homes, and security monitoring fields. We first construct a WiFi-based activity dataset, namely WiAR, to provide a benchmark for existing works. Then, we leverage the moving variance of CSI to detect the start and end of activity. Moreover, we present K-means-based subcarrier selection mechanism...
This paper presents the design of a 6-path offset based feedforward amplifier with high linearity. It leads to both high order nonlinearity compensation and 1dB compression point (P1dB) expansion at the same time. The structure avoids the use of extra gain stages and the superposition mechanism improves the gain which saves the power. The linearized amplifier was implemented by the 130nm SiGe technology...
Graph mining is widely used in fields like social network analysis. The synchronous vertex-centric frameworks strike better balance between the performance and ease-of-use, so they are widely used in realistic. However, traditional architectures of this type, like the vertex-based push architecture and GAS, are encumbered by high communication costs. In this paper we proposed a new replica-based push...
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Device-to-device (D2D) communication is a promising technology for wireless communication in the near future. Since D2D communication usually reuses the resource of cellular users, interference management is a key element. However, when secrecy capacity is taken into consideration, the interference caused by D2D communication could be taken advantage of as a kind of help against eavesdroppers. In...
Ubiquitous computing technology has brought great attentions in recent years since it promises a simple operation to an ever increasing comprehensive digital world. For a networked home supporting advanced applications, ubiquitous media access becomes a must to offer enjoyable experience for home users. The first step of ubiquitous computing is the seamless detection of user activities in order to...
In this work, two novel local feature patterns-Modified Local Binary patterns (MLBP) and local Ternary patterns (LIP), are proposed for extrac features in the facial image, which use some distinct rule to code the values in a label, respectively. These patterns are more invariant to illuminance and face expression compared to traditional one. After getting the local feature patterns, in order to take...
As RFID tags become popular, their volume in both the number of applications and the sheer number per application is bound to increase. This increase in density of RFID tags at any given location invariably results in collision problems that occur when a reader tries to simultaneously read multiple tags that are present in its field. The Slotted ALOHA protocol and its variants have been used over...
Object recognition based on probabilistic Latent Semantic Analysis (pLSA) has shown excellent performance, but it is sensitive to background clutter. In this paper, we propose a novel framework called AM-pLSA, which combines pLSA with visual attention model, to learn object classes from unlabeled images with cluttered background. We firstly detect salient regions and non-salient regions in an image...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.