The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High Efficiency Video Coding (HEVC) employs the complex rate-distortion optimization (RDO) to choose the optimal mode decison which leads to the drastical increase of computation complexity. In order to solve the problem, this paper proposed a new RD estimation method for HEVC intra mode decision that uses transformed coefficients to do the rate-distortion optimization. For the rate part, the method...
In this paper, an improved cooperative jamming (CJ) strategy is developed for physical layer (PHY) security in a multi-hop wireless communication system which employs beamforming in the last hop. Users are assigned to independent groups based on the merger-and-split rule in a coalition game. The secrecy capacity for a valid coalition is a non-convex optimization problem which cannot easily be solved...
This paper presents results of measurements of penetration losses for common construction material in frequencies between 26.5 GHz and 40 GHz. The results are important to the design and deployment of 5G cellular communication systems that will possibly operate in millimeter wave bands, in addition to the currently used frequencies. The penetration losses were in laboratory using a signal generator,...
With the increasing complexity of networks, Software Defined Networks (SDNs) have been developed to help administrators configure and operate network services with controllers such as Beacon, OpenDaylight and Floodlight. These controllers provide a suitable platform for high bandwidth applications. In this paper, several SDN controllers are evaluated using different network topologies. Some controllers...
This paper presents a sign language recognition method that uses gloves with colored regions and an optical camera. Hand and finger motions can be identified by the movement of the colored regions. The authors propose using six weak cues from each sign language motion, as determined by an HMM (Hidden Markov Model). Decoding and recognition is achieved by detecting characteristic combinations of cues...
In wireless sensor networks, nodes are power-limited, hence, we need to save the energy of nodes to guarantee the operations of the network. In this paper, the energy consumption of nodes in the process of node location estimation is reduced by allocating the transmission power of the anchors. Based on the mathematical model of Direction of Arrival (DoA) estimation error variance as a function of...
A new quad-band radome for deep-sea applications is presented which can withstand pressures of more than 45 MPa. The manufacturing process for the antenna housing consists of three steps: selection of candidate wave transparent materials, determination of the radome wall thickness, and measurement of the transmission loss with different types of materials. Results of a pressure test of the antenna...
Tracheoesophageal (TE) speech is generated by patients who have undergone a total laryngectomy where the larynx (voice box) is removed and replaced by a tracheoesophageal puncture. This work presents a novel low complexity algorithm to estimate the degree of severity of disordered TE speech. The proposed algorithm uses features which are computed from 32-ms voiced frames of the speech signal. A 21-st...
Embedded multi core systems are implemented as systems-on-chip (SoC) that rely on packet store-and-forward networks-on-chip (NoC) for communications. These systems do not use busses nor global clock. Instead routers are used to move data between the cores and each core uses its own local clock. This implies concurrent asynchronous computing. Implementing algorithms in such system is very much facilitated...
Tomorrow's immersive applications will leverage Mixed Reality interfaces accessing a multitude of services from distributed clouds. They will face extreme latency constraints, massive datasets, spontaneous collaboration, and constant service churn. This paper outlines our experience evolving an application designed to support collaborative work in Urban Design (UD) practices. The application, UD Co-Spaces,...
In this paper, a new electromagnetic jamming system (EJS) is presented to interfere with the signals of unmanned aerial vehicles (UAVs). In particular, the remote control and global positioning system (GPS) signals required for UAV flight are jammed by the EJS which leads to a loss of UAV control. A saw tooth wave is employed and the bandwidth and center frequency can be adjusted to satisfy different...
Machine learning can be the key to saving the world from losing football field-sized forest areas each second. As deforestation in the Amazon basin causes devastating effects both on the ecosystem and the environment, there is urgent need to better understand and manage its changing landscape. A competition was recently conducted to develop algorithms to analyze satellite images of the Amazon. Successful...
Recent developments in wireless communications have led to numerous applications that require accurate positioning. Further, people are becoming more dependent on location based services. Many of these services are located indoors. Because of the complexity of indoor channels, traditional algorithms cannot accurately estimate the signal attenuation, which degrades positioning accuracy. To overcome...
In this study, we present a method for extracting and representing knowledge of presentation slide creators based on the slide contents that are published on a slide sharing service. The proposed method regards the number of views, downloads, and likes from other users as the users rating for a presentation slide, and extract knowledge of the slide creator in terms of the usefulness and knowledge...
In this paper, we introduce a Downsample Upsample Shift Add (DUSA) method that faithfully implements the Time Compression Overlap-Add (TC-OLA) technique while overcoming some of the existing TC-OLA implementation shortcomings. The mathematical framework of DUSA relies on three operators: downsample, upsample, shift and add operators, and is shown to yield the same results as TC-OLA. Moreover, at some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.