The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Novel instantaneous frequency estimation based symbol detection is proposed for implementing Continuous Phase Modulation receivers. The method is simple as only two symbol periods are used. An efficient instantaneous frequency estimation algorithm that could be used in the implementation is also proposed. The performance of the method has been analyzed and simulation results are provided for comparison...
MIMO radar is the next generation radar which transmits arbitrary waveforms at each one of its apertures. It has been shown that design of waveforms for MIMO radars in order to synthesize a desired spatial beampattern is mapped into a waveform correlation matrix (R) design in the narrowband case. Searching for desired R has been modeled as a convex optimization problem which demands considerable processing...
The traditional signal-subspace projection (SSP) method combats the problem of array manifold uncertainty to gain the robustness by means of projecting the nominal manifold vector onto the signal subspace so as to eliminate the errors lying in the noise subspace. The main contribution of this paper is to extent the SSP approach from one dimension to multi-dimension. We assume that the actual manifold...
To design and evaluate the media access control scheme is important for the vehicular ad-hoc network (VANET) systems. As MAC scheme, the modified binary countdown scheme is considered. However, this scheme is not analyzed in theory. In this paper, the average packet acquisition time of the basic modified binary countdown scheme is evaluated by the theoretical analysis. Compared with the results of...
In next generation networks, routers use the technique of packet classification to classify incoming packets into multiple forwarding classes. The classification is based on predefined filters which indicate the requirements of quality of service or security handling. To achieve scalable packet classification, numerous algorithms based on hash tables have been proposed. These algorithms focus on reducing...
This paper presents a novel optimization method for blind multi-channel identification. The formulation of the optimal blind channel identification problem consists of three components: a least squares fitting term, and two regularization terms representing objective functions of the cross relation and the deterministic subspace methods, respectively. The proposed method is robust to noise since it...
Face recognition in JPEG compressed domain is one of the recent challenges in biometric systems, leading to a considerable reduction in computational overhead caused by decompression process, without any notable degradation in the recognition rates. In this paper, the potential of using a limited number of lowest frequency coefficients in JPEG compressed domain face recognition is investigated, to...
Increasing research and development during these years has explored Human-Robot interactions especially for the challenge of the service robot. While service robots are becoming popular, these robots are just focusing into a specific tasks, and most of them are not ready prepare for the unpredictability of human environments. The efforts to develop more reliable robots that could interact with the...
We introduce a coordinate-dependent characteristic of symmetry, which is denoted by C/A. C/A is defined by the division of the covariance (C) by the area (A) of the object of the image. The characteristic has the good properties for the applications to the image processing. We compute the characteristic of ellipse, for which we derive the formula of the perimeter of ellipse. We apply C/A to the segmentation...
We consider the fast acquisition problem in magnetic resonance imaging (MRI). Often, fast acquisition is achieved using parallel imaging (pMRI) techniques. It has been shown recently that compressed sensing (CS), which enables exact reconstruction of sparse or compressible signals from a small number of random measurements, can accelerate the speed of MRI acquisition because the number of measurements...
Tracking the direction of arrival (DOA) of an acoustic source in an impulsive noise environment is a challenging problem due to the non-Gaussian characteristic of the noise process. In this paper, a particle filtering (PF) with fractional lower order moment (FLOM) likelihood model is developed to solve this problem. A constant velocity model is employed to model source dynamics and alpha-stable processes...
Content-based image retrieval (CBIR) has got an intense interest and seen considerable progress over the last decade. But most of the time it is only applied in laboratory. One important reason for this is the diversity of images. Different practical situations call for different taxonomy definitions of images, and lead to very different solutions. At present, and even in the foreseeable future, a...
This paper presents a saliency inspired visual attention technique for maritime scenes. The main focus is on finding regions in images which there is a high likelihood of a maritime object being present. Experimentation has shown that many regional and global features are required because no single feature can reliably detect these objects. Examples of the features used are right angle corner detectors,...
Recently, music retrieval is getting more and more attentions, especially for the query by humming (QBH), which is straightforward and convenient for usage. However, the difference between humming phrase matching and the precision of singer humming increase the difficulty of retrieval. Apart from retrieval precision, retrieval time is another issue should be taken into consideration. In this paper,...
Design of energy efficient medium access control (MAC) protocol for wireless sensor network (WSN) containing mobile nodes is a challenging task. Majority of the MAC protocols for wireless sensor networks assume static sensor nodes, which results in poor performance of such protocols in a network containing mobile nodes. In this paper we propose a MAC protocol which is energy efficient as well as suitable...
Network multiple input multiple output (MIMO), in which each user is served by all the transmitters within its range of influence, is a promising technology for higher spectral efficiency. However, such performance gain comes at the expense of significant signaling overhead due to the sharing of channel state information (CSI) and transmission data. This paper proposes a truly distributed power allocation...
This paper presents a cooperative localization technique for indoor wireless network under non-line-of-sight scenario. In the absent of line-of-sight path, the technique will make use of Non-Line-of-Sight NLOS paths' Time of Arrival (TOA) and Angle of Arrival (AOA) measured at both mobile and reference devices to located the mobile device. Briefly, a line that contains the possible mobile device position...
In this paper, we consider downlink communication in multicell systems with each cell containing one base station (BS) and multiple mobile stations (MS). Full frequency reuse is assumed allowing the BSs to transmit simultaneously over the same frequency band. We propose a power control algorithm to minimize the impact of intercell interference and maximize the system overall throughput. The proposed...
In LTE-Advanced, carrier aggregation (CA) employing multiple component carriers (CCs) is supported, and multiple acknowledgement (ACK)/ negative ACK (NACK) bits associated with multiple CCs are required. In order to convey multiple ACK/NACK bits for downlink CA, a physical uplink control channel (PUCCH) based on block spread code division multiple access (BS-CDMA) is used in the LTE-Advanced uplink...
Energy management strategy has been considered as an important component in the future Ethernet Passive Optical Networks (EPONs). In this paper, a sleeping mode operation is studied, and a downlink packet scheduling scheme is analyzed to preserve energy consumption and maintain the required QoS. This paper proposes a novel sleep-mode downlink packet scheduling scheme in order to enhance the sleep...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.