The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Massive MIMO technology can increase capacity, data rate, and link reliability significantly without additional bandwidth or transmission power. Most of the previous study on Massive MIMO systems are using low frequency (2.6 GHz). This frequency is not suitable for future broadband technology, because IoT devices will use high frequency and possible cell coverage would be smaller. This work proposes...
In the uplink system, different carrier frequency offsets (CFO) of different users at the receiver resulting multiuser interference (MUI) and thus degrade the performance of Multicarrier Code Division Multiple Access (MC-CDMA) system. In the previous study, Modified Minimum Mean Square Error Frequency Domain Equalization (Modified MMSE-FDE) has been proposed by Agnihotri which results in a better...
Vehicular Ad-hoc Networks (VANETs) is a wireless networking technology that can be used to support the emergence of Intelligent Transportation Systems (ITS). The deployment of these systems will allow connected vehicle to communicate each other and also with the road side infrastructures in order to avoid possible accidents and provide more comfort applications to the driver and passenger. The designers...
In this paper, we propose header detection technique for massive internet of things (IoT) networks over Rayleigh fading channels. We consider coded random access (CRA) as a multiple access scheme for IoT to keep low computational complexity of detection, where header detection is of significant important. We perform header detection by computing cross correlation using Hadamard codes. Hadamard codes...
In this paper, we consider channel coding scheme for single carrier Internet of Things (SC-IoT). We propose new Raptor codes for SC-IoT devices with new degree distributions suitable for single carrier transmission to provide long term battery life services. In the proposed Raptor codes, Low Density Generator Matrix (LDGM) codes are used as the precode, called LDGM-Raptor codes. The codes are optimally...
In this paper we present a method to diagnose and mitigate against primary user emulation attacks (PUEA) in cognitive radio networks. We develop a hybrid algorithm that uses a combination of compressed sensing and belief propagation to identify and combat PUEAs. We propose to use compressive sensing at the fusion centre to localise a primary user, then distribute the primary user location to secondary...
Production of 3D sound for virtual auditory space needs interpolated head related impulse responses (HRIRs), due to limitation of real-time system for storing HRIR measurements. Fortunately, interpolation of HRIRs can reduce much cost and effort in measuring many HRIRs. This research analyses three interpolation techniques, namely bilinear rectangular, bilinear triangular, and tetrahedral by using...
Forearm vein recognition is one of the methods used for identification. In this paper forearms vein features are used for recognition in biometric systems. Forearm vein can be considered more secured compared to other biometric traits because the veins are inside the human body. The forearm recognition has been developed using characteristic points based technique where forearm image is normalized,...
Several methods for capturing motion data from single video have been reported in computer vision literature, and most of them deal with stationary background. The problem becomes more complex and challenging in a moving scene where traditional background subtraction algorithms often fail. We require robust algorithms for marker-less tracking of human body's movements and for extracting motion information...
Compressive Sensing (CS) framework is mathematical framework to recover the signal by having less measurement data compared to Shannon-Nyquist theorem. It indicates the underdetermined linear system where the dimension of measurement data is much lower compared to dimension of the projected data. The basic idea of CS is to shift the sensing load into image reconstruction load. Thus, even though the...
In the event of a disaster, the volcano has a secondary threat. It is cold lava floods on the river which disgorge at the volcano. In this case, cold lava floods on the rivers are called the debris floods. In Indonesia, the Ministry of Public Works and Housing through Sabo Engineering Center (Balai Sabo) is one of the government agencies that monitor the river flow in the Sabo Dams. “Sabo” comes from...
This paper explores the possibility of using the relationship between the frequency of the transmit waveform and the location of grating lobes to achieve beam steering. The performance of the proposed beam steering technique is compared with conventional phase steering in terms of hardware requirements, beamwidths and angular coverage.
This paper presents method and result of analysis on the multivariate mutual information of an interferometric radar altimeter (IRA) for an application to the terrain-referenced navigation (TRN). As an effort to improve the performance of the IRA-based TRN, we have proposed a novel measurement model which utilizes three measurements. This paper addresses the preliminary study to quantify the effect...
Phased Multiple-Input Multiple-Output (PMIMO) radar which uses overlapped noncoherent transmit subarrays and noncoherent receive arrays provide better performance in transmit-receive gain and SINR than Phased Array and MIMO radar. This paper shows PMIMO approach which uses a coherent receive array provides the same performance as other radars but is more efficient in its use of matched filters and...
A time domain signal tracking algorithm is proposed to estimate the frequency of a chirp-type global navigation satellite system (GNSS) interference. The unknown interference frequency of GNSS in the received signal can be estimated by using the properties of the trigonometrical functions, but the thus-obtained value can have a lot of error caused by measurement noise and by the frequency change of...
Landmines are a humanitarian challenge because they do not discriminate between soldiers and civilians. One potential method for detecting unexploded landmines in post-conflict zones is the use of ground penetrating radar (GPR). However, detecting shallowly-buried landmines under a variety of soil and surface conditions is a challenging task in terms of signal processing. The present paper proposes...
In this paper, two new kernel adaptive algorithms are proposed. An approximation is used in order to derive the pseudo kernel affine projection algorithm and the pseudo kernel proportionate affine projection algorithm, respectively. The computational efficiency and performance of the proposed algorithms is verified for a nonlinear system identification application.
Frequent itemset mining is a fundamental step in analysis of big data where correlation among the raw data in deemed necessary. In modern era the amount of data available for processing has grown exponentially, making it a stepper task for mining algorithms to provide solution in a timely manner. The software implementations are normally not efficient in handling such datasets thus focus on parallel...
Technology used to hide secret message in a communication called Steganography. Secret message can be text, image or any file that can be converted into binary. This secret message inserted into cover file which can be in form of image, sound or video, basiccaly cover file must be bigger than the secret message in size. Many methods have been proposed on how to hide secret messages in a cover file...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.