The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a modified WiMAX Low-Density Parity-Check (LDPC) codes for realistic LDPC coding system architectures is presented. The LDPC code, which is a special class of quasi-cyclic LDPC (QC-LDPC), has an efficient encoding algorithm owing to the simple structure of their parity-check matrices. A proposed distribution of irregular parity-check matrix for the modified WiMAX LDPC is developed so...
In this paper, we propose an adaptive single-carrier (SC) transmission suitable for near maximum likelihood (ML) block signal detection using QR decomposition and M-algorithm (QRM-MLBD). QRM-MLBD can significantly improve the bit error rate (BER) performance of SC block transmission. However, in order to achieve a close-to-ML performance, the use of a fairly large number M of surviving paths in the...
In this paper, the Compressed Sensing (CS) based channel estimation scheme for the sparse multipath channel in OFDM system is considered. The CS based multipath delay channel model is investigated by using only a small amount of pilots to get the measurement matrix and the orthogonal matching pursuit (OMP) is adopted to reconstruct the channel impulse response. In order to overcome the drawback of...
Increased health awareness in people and evolution of wearable computing, has unarguably attracted heightened interest and potential in development of comprehensive and practically feasible Wireless Body Area Networks (WBAN). The paper reports on the full realization of ‘M’ shaped dual band on-body antenna for wireless body area networks operating in the ultra wide band range. The resonant bands are...
Interleaving is a technique that is commonly used in wireless digital communication systems to overcome burst errors occurred in wireless channels. The interleaver rearranges a consecutive data pattern into a certain pattern without repeating or omitting any information bit. At the receiver, the deinterleaver, which has information of the interleaver, rearranges the interleaved data back into the...
The major advantage of a PLC system is the unification of the communication architecture into a singular medium. In our efforts towards this unification, we propose a non-invasive, reflection coefficient based channel estimation technique over low voltage powerlines. The novel model accounts for all the parameters of the signal viz., quality, strength, attenuation etc., by simplistic inference from...
In this paper, we first demonstrate that a cyclostationary process is an oscillatory process which has a periodic evolutionary spectral, and we determine the relation between spectral correlation function and the periodic evolutionary spectral. Next, based on harmonic series representation (HSR) (a Fourier series with time varying lowpass coefficients representation that reveals the pertinent properties...
Binned orthogonal/bi-orthogonal codes have been proposed as dirty-paper codes for digital watermarking due to its simplicity in both encoding and decoding, robustness against volumetric scaling, and performance gain over conventional non-dirty paper coded systems. In this paper, we extend the binned orthogonal/bi-orthogonal code to generalized binned linear binary code, and propose an efficient binning...
RFID technology is an object identification technology which will become promising and ubiquitous attracting a lot of research attentions. But due to the open-medium nature of the radio communication and the simple structure of RFID tags, most RFID systems have to be tethered to a backend database and prone to tag tracing attacks which will lead to user privacy leakage. In this paper, we propose a...
The Haar transform is an important signal transform that converts real input to real output, and it has been applied in various tasks in signal and image processing. The M-dimensional Real Transform (MRT) is a recently developed transform, and it shares the real-to-real conversion property of the Haar transform. This paper attempts to study the relationships between these two transforms.
We propose a system in which the watermark message is embedded into audio signal by means of Quantization Index Modulation (QIM) scheme. However, the method is sensitive to gain scaling attack. We use a value-metric scaling invariant method called Rational Dither Modulation (RDM) to cope with this problem. At the same time, we exploit the psychoacoustic model to improve the audio signal's perceptual...
In this paper, we propose a biometrics authentication method using lip motion in utterance. The proposed authentication method authenticates persons using lip shape (physical trait) and lip motion accompanying utterance (behavioral trait). Hence, the proposed method can be realized with only a camera extracting lip area without the special equipment used in other personal authentication methods and...
Semi-supervised clustering uses a small amount of labeled data to aid and bias the clustering of unlabeled data. In this paper the use of labeled data at the initial state, as well as the use of the constraints generated from the labels during the clustering process is explored. We formulate the clustering process as a constrained optimization problem, and propose a novel semi-supervised fuzzy co-clustering...
Currently, data on the Internet is in the form XML documents since XML is the main standard for data exchange format. Therefore, the development of the indexing technique of XML to accurately access the data stored in the XML documents has become a hot topic. In the paper, we propose an efficient encoding indexing technique to save processing time. We apply Dual Bitmap index to encode each node of...
Semantic image segmentation is often served as an instrumental front-end preprocessing of many image processing and computer vision applications. Different from the existing semantic segmentation methods which mostly rely on database training, a simple and effective approach is proposed in this paper by employing the oriented pattern as a class-discriminative feature, besides the use of color and...
The “bag of words” model has enjoyed much attention in the studies of object categorization. As implied by the name, the images under consideration are modeled as a bag containing multiple features. Despite its simplicity, this model has been able to achieve great performances in many state of the art object categorization datasets. Using this model, we extract patches from an image and categorize...
An application which operates on an imbalanced dataset loses its classification performance on a minority class, which is rare and important. There are a number of over-sampling techniques, which insert minority instances into a dataset, to adjust the class distribution. Unfortunately, these instances highly affect the computation of generating a classifier. In this paper, a new simple and effective...
This paper presents a novel mechanism based on the histograms of packet filtering, which are able to effectively monitor firewall performance in real-time and to predict the patterns of packet filtering in terms of rules order and rule-fields order. Furthermore, the mechanism becomes even more significant when firewall is heavily loaded with burst traffic. A comparison of the proposed approach and...
In this paper, a filter bank which can generate 27 different subband distribution schemes is proposed. It enables different patients to take advantage of their specific case to improve the auditive performances. The use of frequency response masking technique enables us to realize the whole system with 3 different prototype filters, which reduces the complexity greatly. We show, by means of example,...
In this paper, a novel Adaptive Voice Activity Detection (VAD) algorithm is proposed, which is successfully implemented in a MFCC based speech recognition system. The proposed adaptive VAD describes a novel scheme of detecting speech presence/absence by tracking the higher portion of speech power spectrum. Both clean and noisy speech is used to show the effectiveness of the proposed VAD algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.