The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to enhance United States border security, a system is proposed to allow tracking of shipments from origin to destination. This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. The system will accomplish the security testing in real-time using the internet and the U.S. Customs' database...
Fuzzy vault is one of the most popular algorithms, which is used to protect the biometric templates and secret key simultaneously. In the fuzzy vault scheme, the biometric features are used to lock and unlock the secret key, which is encoded in the coefficients of a polynomial equation. Its security depends on the infeasibility of the polynomial reconstruction problem. Additionally, the vault performance...
In this paper, we propose an improved model for image denoising, which combines the second-order ROF model and the fourth-order partial differential equations (PDE), and it is solved by the combination algorithm of the split Bregman method, an algebraic multigrid method and Krylov subspace acceleration. At the same time, we prove that the model is strictly convex and exists a unique global minimizer...
Human daily activity recognition has gained much attention since it has a wide range of applications. In this paper, we propose a novel scheme for recognizing human daily activity by fusing multiple wearable sensors, i.e., accelerometer and multi-lead ECG. Firstly, both time and frequency domain features are extracted from raw sensor data. In order to alleviate the computation complexity of subsequent...
In order to improve the weak signal detection performance of Unmanned Underwater Vehicle (UUV), depressing its self-generated noise and fully using the differences of incidence in space domain and differences in frequency domain (spectral patterns and spectral level) between signal and noise are two key issues. In practice, there are many measures besides ANC (adaptive noise cancellation) to enhance...
The passive coherent location (PCL) radar detects potential targets by computing the cross ambiguity function (CAF) between the target echo signal and the direct path wave, which is regarded as the reference signal received from the reference channel. However, a number of the multipath interferences present in the reference signal in most cases. The existence of the multipath interferences can increase...
This paper presents a consensus based traffic network management system. A consensus algorithm is used to control the traffic lights. The traffic lights can cooperatively manage the traffic flow among the whole traffic network. The system aims to average the traffic flow and force the road resources to reach maximum usage around the whole network. As a decentralized system, consensus based traffic...
Many mission critical wireless sensor networks require an efficient and lightweight anomaly detection scheme to identify outliers. In this paper, we propose an incremental histogram based anomaly detection scheme in order to detect the anomaly data values within the network. It first partitions the whole network into several clusters in which the cluster members are physically adjacent and data correlated...
Space-time joint processing using double-arrays for radiated noise measurement is investigated in this paper. Based on the theory of stochastic array measurement, double-arrays space-time associated model is established using statistical characteristic discrepancy between target signal and ocean environment noise. Taking one of the elements as reference, signal power was enhanced by packet processing...
To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node...
Breast cancer is one of the most pervasive women diseases. Mammography can greatly facilitate the early detection of breast cancer. The low quality of the mammogram undermines the accuracy of diagnosis. Image enhancement techniques are often used to enhance the mammogram contrast and assist the radiologists to detect the cancer. Histogram Equalization (HE) is one of the most widely used methods for...
As Time difference of arrival (TDOA) needs high precision data for time delay estimation, a hardware system which can sample high precision data is presented in this paper. FPGA and DSP are taken as the general architecture in the hardware design. The precision of the system is improved by using GPS to synchronize time. The structure of the hardware system and the realization of data collection design...
This paper introduces the semi-continuous Hidden Markov Model (HMM) and proposes a novel Dynamic Bayesian Network (DBN) model for dynamic visual emotion recognition. The former reduces the training complexity caused by mixture Gaussians by sharing the Condition Probability Densities (CPDs) of Gaussians among the states, and the latter adds a sub-state layer between state and observation layer based...
By exploiting the beam-spectra envelop information of the spatial spectrum which is generated by the conventional beamforming (CBF) method, a high resolution direction-of-arrival (DOA) estimation method named DOA-BE is proposed. This method is decomposed into two different parts. A threshold of 3-dB width of CBF spectrum is obtained by using Neyman-Pearson criterion to determine the number of narrow-band...
According to the problems that the infrared images always have low contrast, low dynamic range, weak detail information and low visual effect, we apply the Retinex Theory and Adaptive Gain Control to the infrared image processing: which firstly press the dynamic rang of the image using Multi-Scale Retinex Algorithm so that it can show a high dynamic range at the same time; then we depart the image...
For the traditional CPU facial detection program is difficult to meet the requirements of real-time detection over high definition images, we propose a fast face detection acceleration algorithm based on the Viola-Jones cascade classifier in the Compute Unified Device Architecture (CUDA) platform. We implemented and improved novel parallel methodologies of image integral calculation, scan window processing...
In this paper, we adress the problem of time delay estimation between signals received at two spatially separated sensors at low signal-to-noise ration levels. By replacing the instantaneous square error in ETDE with time mean of square error as the cost function, we develop a new adaptive time delay estimation algorithm based on MMSE criterion (MMSE-TDE). The proposed algorithm significantly improve...
This Higher-order statistics is widely used in radar, communication, and biomedicine and fault diagnosis. The bispectrum is not sensitive about Gaussian white noise. At the same time, the bispectrum is also not sensitive about high dynamic and low SNR. In this paper, the method of higher-order statistics is used to detect the weak signal in high dynamic and low SNR to prove the great performance under...
Doppler processing techniques can be used to estimate the parameters of line-spectrum acoustic sources of an underwater target with constant velocity. Previous estimation methods are based on observed frequency or phase which describes the time varying Doppler shift. Because of the low-frequency and low-speed characteristics of underwater linespectrum noise source, the Doppler shift is very tiny and...
Ad hoc structure has a special characteristic because of which the nodes in the wireless ad hoc networks depend on batteries for power resources that restrain in giving power resources. Apart from QoS metrics like mobility and bandwidth, node survivability and power usage form the main feature in routing as hoc networks. Here we will dwell upon the issues of knowing the course with sources that sustainable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.