The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the rapid development of wireless communication and broadband applications for multimedia service, the 2 Mbps downlink data rate of the present 3G communication system cannot satisfy demand for a fast and high quality packet data service. The use of the HSDPA (High Speed Downlink Packet Access) air interface can upgrade the downlink packet data rate by 10.7∼14.4 Mbps. This paper presents a...
We propose a class of rate-compatible (RC) low-density parity-check (LDPC) codes that has linear encoding complexity and low error floor. To ensure linear encoding, a deterministic form for the parity part of the mother parity-check matrix is used. To guarantee good performances in the waterfall region for a wide range of code rates, a layered density evolution algorithm is developed to obtain the...
This work demonstrates a system for visualizing the intra-user and inter-user social media from a big data. By integrating a projector as the output, a depth camera and mobile devices as the input, analyzing the social media information belonging to the login users, the proposed visualization system displays the intra/inter-user data in a social network, providing by a community-contributed media...
In this paper, a geotag-based travel route recommendation algorithm that considers the seasonal and temporal popularity is presented. Travel routes are extracted from geotags attached to Flickr images. Then, landmarks/routes that become particularly popular at a specific time range in a typical season are extracted. By using the Bayes' theory, the transition probability matrix is efficiently calculated...
A planar slow-wave structure (SWS) for application in traveling-wave tubes (TWTs), unconnected pair of planar helices with straight edge connections (PH-SEC), is presented here. Two versions of the unconnected pair, co-wound and contra-wound, are analyzed and compared for the first time. Analysis for both versions is carried out as special cases of a generic structure consisting of 4 parallel unidirectionally...
Localization using sensor network has attracted much attention for its comparable low-cost and potential use with monitoring and targeting purposes in real and hostile application scenarios. Currently, there are many available approaches to locate persons/things based of GPS and RFID technologies. However, in some application scenario, e.g., disaster rescue application, such localization devices may...
We propose to combine social trust derived from social networks with quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of mobile nodes in mobile ad hoc network (MANET) environments. We develop a novel model-based approach to identify the best protocol setting under which trust bias is minimized, that is, the peer-to-peer...
Aimed at presenting a new video viewing mode, we propose a scheme to extract useful scenario information from dramatic videos automatically. Viewers can easily retrieve video clips what they are interested in by using our method. The proposed method is composed of three procedures, namely face processing, interaction score computing, and scenario information extraction. A challenge to face detection...
Big data are transferred, routed and forward to their destinations as a combination of a series of packets one by one, without considering the data in their entity in today's packet network. In this paper, we firstly summarize those transportation methods of bid data on packet networks and optical networks, respectively, and then propose a new data transportation architecture to collect, store and...
Extending Delsarte's linear programming bound for error correcting codes, this paper obtains a linear programming bound for locally repairable storage codes. The number of variables involved in the bound scales linearity with the size of the code. The bound can also be viewed as a necessary condition for the existence of a storage code and be used to characterise the tradeoff among the costs for storage,...
Proper clinical assessment of a patient's progress in rehabilitation will determine the regimen and intensity of therapy. At present many objective assessments require therapists to subjectively grade various tasks patients perform. The administration of these assessments are onerous and error prone. By embedding sensors into objects used in the assessments, we are able to accurately measure and assess...
A new physical-layer network coding (PNC) scheme is proposed for asymmetric two-way relay channels (TWRC). In the scheme, the two source node employ orthogonal carriers and the relay node employ orthogonal combining, instead of XOR, which is used in most PNC schemes. Our proposed scheme is named as combined orthogonal physical-layer network coding (COPNC). COPNC can provide better BER performance...
Single-trial detection of evoked brain potentials is essential for many research topics in neural engineering and neuroscience. In present study, a novel approach, which combines common spatial pattern (CSP) and multiple linear regression (MLR), is proposed to for single-trial detection of pain-related laser-evoked potentials (LEPs). The CSP method is effective in separating laser-evoked EEG response...
Investigation of the intrinsic brain networks using the resting-state functional magnetic resonance imaging (rs-fMRI) is generally based on the assumption that the functional organization is stationary across the duration of the scan. Hence, the presence and potential of temporal and spatial dynamics of the functional connectivity (FC), which is usually measured by the correlation coefficients between...
Many applications of computer vision, such as people identification and tracking in surveillance system, demand to describe the appearance of people. However, factors such as illumination, people pose and background may greatly affect the performance of the people appearance description. In this paper, a semantic model to describe people in surveillance cameras is introduced. Observing that in a short...
Gaming control becomes popular based on the development of human-computer interface (HCI). Among many kinds of physiological signals, Electrooculography (EOG) signal is more stable which can be used to control HCI systems based on eye movement detection and signal processing methods. However, there are currently no effective multi-directional classification methods for monitoring eye movements. In...
Broadcasting is one of the most important operations for wireless ad hoc networks. A conventional broadcast method is to flood packets where each node rebroadcasts received packets. This approach is simple and reliable, but it suffers from the problems of network congestion, resource contention and signal collision. In this paper we propose new approaches to improve broadcast efficiency by stamping...
This paper investigates a single-carrier iterative frequency-domain equalization (SC-IFDE) scheme for high-rate underwater acoustic (UA) communication systems. This scheme is based on the minimum mean-squared error (MMSE) criterion, and soft decision feedback is applied to improve the reliability of the equalizer decision. The proposed algorithm is applied to the data received during the UA communication...
We investigate discriminative features that are able to improve classification accuracy on visually similar classes. To this end, we build a deep feature learning network, which learns features with discriminative constraint in each single layer module, and learns multiple levels of features for hierarchical image representation. Specifically, the network encodes the discriminative information by...
This paper develops an embedded controller to elaborately monitor and manage critical operational parameters for high-reliability portable fuel cells. Specifically, a novel control strategy consisting of several concurrent control loops is proposed to raise the overall power generation efficiency and safety of the portable fuel cells. Based on low-power and low-cost Microchip 16-bit microprocessor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.