The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an effective method to construct a new descriptor for solving face recognition with pose variance. In this method, we use feature of nose and HAT-MARS descriptor to build a combined descriptor for matching between gallery and probe images. For experiments, our method uses only one gallery image on CMU-PIE database. The empirical results show that our method is strong and efficient.
We propose a modified particle filter (PF) which adjusts variance and gradient data for Kullback-Leibler Distance (KLD)-resampling algorithm to solve the tracking target position in wireless sensor networks (WSNs). Our approach can diminish the bad effect of the received signal strength (RSS) variation by generating sample set near the high likelihood region. Finding optimal adjusted variance of this...
Human activity recognition is one of the most important core building blocks behind many applications on smartphone such as medical applications, fitness tracking, context-aware mobile, human survey system, etc. This paper describes a robust system for human activity recognition by smartphone. Different from other work, we investigated the use and combination feature selection and instance selection...
This paper describes the design, implementation, and deployment of wireless sensor network for precision agriculture. A wireless sensor network was built to use for precision agriculture in which the farmers can monitor and control the agricultural and environmental parameters such as air temperature, air humidity, light, soil moisture, pH, etc. The collected data is stored and transmitted wirelessly...
The majority of people in the world lack access to the Internet. Google proposed the project Loon being developed for providing internet access to remote and rural areas. The project considers solar power for high-altitude balloons. However, the usage of solar power is limited due to time and place. Previously, we have developed the prototype of 5.8 GHz wireless power transmission system with high...
In this paper, we investigate joint impact of hardware transceiver impairment and interference constraint on performances of cooperative relaying protocols in underlay cognitive radio. In the proposed protocol, a secondary source uses incremental cooperative technique to transmit its data to multiple secondary destinations via a secondary relay. We derive exact and asymptotic expressions of the outage...
Although pNE is a new and unique provably secure variant of famous NTRU cryptosystem so far, the message-expansion factor of pNE, similar to other variants of NTRU, is rather larger than that of other traditional public-key cryptosystems. In this paper, beside introducing RISKE, a new probabilistic secret-key cryptosystem based-on characteristics of invertible elements in binary truncated quotient...
Wireless networks have evolved from the 1st generation (1G) using analog technology to the 2nd generation (2G) using digital technology, the 3rd generation (3G) and then to the 4th generation (4G) called LTE-A via 3.9G LTE. Every 10 years, new generation networks appeared. LTE-A networks provide a very high speed transmission of several 100Mbps. The mobile data traffic has been increasing rapidly...
Checking integrity constraints in real-time databases is an important field of investigation. This paper investigates the approaches to check topological integrity constraints depending on objects select a different integrity constraint on different times for many existing constraints. The topological integrity constraints are order Hamiltonian paths in directed graphs. Moreover, in a fixed period...
We present Mixture of Support Vector Data Descriptions (mSVDD) for one-class classification or novelty detection. A mixture of optimal hyperspheres is automatically discovered to describe data. The model consists of two parts: log likelihood to control the fit of data to model (empirical risk) and regularization quantizer to control the generalization ability of model (general risk). Expectation Maximization...
In this paper, Amplify-and-Forward (AF) relaying multiple-input multiple-output (MIMO) technology is proposed to extend the coverage of free-space optical communication (FSO) systems using subcarrier amplitude modulation (SC-QAM) over weak atmospheric turbulence channels modelled by log-normal distribution. Unlike previous studies on FSO systems without relaying stations which are suitable for short-range...
In this work, we present a new approach for gender classification problem by combining two different types of local features extracted from face images. Given one input image, a Elliptical Local Binary Patterns (ELBP) operator and a Local Phase Quantization (LPQ) operator are applied to generate two pattern images. Then, each pattern image is divided into disjoint rectangular sub-regions to compute...
We studied dynamic multi-domain elastic optical networks that are capable of regenerating optical paths at domain boundaries. Dynamic Routing, Modulation and Spectrum assignment (RMSA) algorithms have been proposed to exploit the advantages of elastic optical networking and 4R (Re-amplification, Re-shaping, Re-timing and Re-modulation) elastic regeneration to support bandwidth-flexible lightpath services...
In this paper, we theoretically investigate the effects of noise and nonlinear distortion on the performance of orthogonal frequency-division multiplexing (OFDM) signal carried by millimeter-wave radio over fiber (RoF) systems. Various noise components are considered in this paper including shot noise, thermal noise and relative intensity noise. In addition, we take into account the effect of nonlinear...
Linear Support Vector Machine (LSVM) has recently become one of the most prominent learning methods for solving classification and regression problems because of its applications in text classification, word-sense disambiguation, and drug design. However LSVM and its variations cannot adapt accordingly to a dynamic dataset nor learn in online mode. In this paper, we introduce an Adaptable Linear Support...
Many studies have shown roles of miRNAs (microRNAs) on human disease and a number of computational methods have been proposed to predict such associations by ranking candidate microRNAs according to their relevance to a disease. Among them, network-based methods are becoming dominant since they well exploit the “disease module” principle in miRNA functional similarity networks. Of which, Random Walk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.