The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel algorithm to control peak-power of the predistorted signal is proposed. The digital predistortion expands peak-power uncontrollably when power amplifers are operated at saturation. In order to control peak expansion, we introduce penalty of a barrier function into the cost function of linearization optimization. Our simulation demonstrates the effectiveness of peak-power controlling for the...
Signal processing requires high performance digital signal processors(DSP) and hardware accelerators. Real and complex multiply-accumulate(MAC) units are the most critical computation units in the DSPs and accelerators, which greatly impact the performance, power and chip area of the signal processing system. A fixed-point Single-Instruction-Multiple-Data(SIMD)/vector MAC architecture is presented...
Visually perceiving human motion at semantic level is an important however challenging problem in multimedia area. In this work, we propose a novel approach to map the low-level responses from visual detection to semantically sensitive description to human actions. The feature map is triggered by the output of deformable part model detection, in which the critical information about body parts configuration...
This paper presents a segmentation method for human locomotion. The research on the rules of human locomotion plays an important role for the analysis of human movement strategy. We collected locomotion data from eighteen volunteers by motion capture system(MCS), and found that the measured stride length and frequency with speed had a mutation in the critical point between walking and running. To...
In this paper, we consider the application scenario where multiple Base Stations (BSs) cooperate to transmit signals to a mobile terminal in the same frequency and any of the cooperative BSs is allowed to enter into sleeping mode to save energy. The mobile terminal employs the Joint Maximum Likelihood Sequence Estimation (JMLSE) based Joint Signal Detection (JSD) to simultaneously detect multiple...
This paper presents a new relevance feedback scheme, which incorporates Extreme Learning Machine (ELM) to content-based image retrieval (CBIR) with relevance feedback. Relevance feedback schemes based on Support Vector Machine (SVM) have been proposed in previous paper. However, the performance of the schemes are often poor which is caused by the low speed of SVM algorithm in high dimension data....
In Multiple-Input Multiple-Out (MIMO) systems, the user selection algorithm plays an important role in the realization of multiplexing gain. In this paper, an improved Semi-orthogonal User Selection algorithm based on condition number is proposed. Besides, a new MIMO precoding scheme is designed. The proposed SUS-CN (SUS with condition number) algorithm outperforms the SUS algorithm for the selection...
Block matching algorithm is generally used in motion estimation. How to search with different shape or size in block matching algorithms has enormous impact on their search speed and distortion performance. Based on analysis the difference of search patterns in block matching algorithms, an alternative cross fusiform search algorithm for fast block motion estimation is proposed in this paper. This...
This paper presents a novel framework for Content Based Image Retrieval(CBIR), which combines color, texture and spatial structure of image. The proposed method uses color, texture and spatial structure descriptors to form a feature vector. Images are segmented into regions to extract local color, texture and CENTRIST(CENsus Transform hISTogram) features respectively. Multiple-instance learning (MIL)...
This paper proposed an approach for estimating 3D orientation of a vertebra given its 3D model and 2D biplanar radiographs. The estimation was based on the Hough transform technique to match the projections of the standard 3D primitive with the vertebral contours in biplanar radiographs, where the projected contours were generated from the 3D model by sampling the viewing sphere with a hierarchical...
This paper proposes a new constant control method of the output voltage of a voltage-fed three phase Z-source inverter (ZSI), in case of the capacitor voltage variations in Z-source network or the heavy changes of load. The modulation index for the reference output voltage of the ZSI can be calculated by the basic definition of the ZSI, the input DC voltage and capacitor voltage in Z-source network...
In this paper, two new methods: ECA and 2DECA are proposed for face recognition, which are inspired by KECA. In ECA (2DECA), features are selected in PCA (2DPCA) subspace based on the Renyi entropy contribution instead of cumulative variance contribution. Then the proposed methods are tested on the OLR, YALE and XM2VTS databases respectively. We also compare the performance of the related methods...
The principal goal of DNS usage mining is the discovery and analysis of patterns in the query behavior of DNS users. In this paper, we develop a unified framework for DNS usage mining based on Clustering analysis of co-occurrence data derived from DNS server query data. Through transforming the raw query data into co-occurrence matrix, user transaction clustering can be applied to discover the user...
In this paper, iterative learning control (ILC) is applied to network-based control problems in which communication channels are subject to random transport delay and data dropout. An averaging ILC algorithm is used to overcome the random factors. Through analysis, it is shown that ILC can perform well and achieve asymptotical convergence in ensemble average along the iteration axis, as far as the...
An improved cost proxy model is established in the following, where the extreme imbalance between urban and rural area as well as complicated geographic environment of China was taken into consideration. On the one hand, new parameters were introduced into scene variant vector so as to prescribe urban and rural differences and also topographical differences. On the other hand, in order to analyze...
In this paper, a temporal error concealment method for the H.264 is presented, which uses the high correlation between the motion vectors of neighboring blocks. By using the motion vectors of neighboring macroblock of the lost MB, the motion vectors of the lost MB are recovered. Simulation result shows that the proposed method yields better subjective and objective quality than conventional methods.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.