The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing public transportation networks are usually regarded as being static with respect to their topology. However, in fast growing cities, new lines are added, sometimes focusing only on the demand, without regard to overall efficiency of the system. In this work we propose the application of techniques from evolutionary computation. The aim here is to improve the efficiency of public transportation...
In this paper we study the problem of designing a distributed data storage system using rateless codes for resource constrained systems such as Wireless Sensor Networks (WSNs). Rateless codes, e.g. LT-codes, can achieve reduced complexity of both encoding and decoding, which caters well to the nature of limited resources in such systems. However, data in WSNs is inherently decentralized and that poses...
A fast CU size decision algorithm is proposed for High Efficiency Video Coding (HEVC) intra prediction in this paper. Prediction unit (PU) is decided by analyzing the threshold of judgment, the complexity of the algorithm is increased if the threshold is too big, and the quality of the image is seriously damaged if the threshold is too small. The robustness of the algorithm would be destroyed if the...
In this paper, we address the problem of joint Resource Block (RB) allocation and Modulation-and-Coding Scheme (MCS) selection for LTE femtocell DownLink (DL). We first formulate the problem as an Integer Linear Program (ILP) whose objective is to minimize the number of allocated RBs of a closed femtocell, while guaranteeing minimum throughput for each user. In view of the NP-hardness of the ILP,...
Fiducial markers are widely used in many Augmented Reality (AR) applications such as to manipulate AR objects, robot navigation, education and AR based games. ARToolKit is an open source, easy to configure and well-documented tracking system which is widely used for designing marker based AR applications. The quality of ARToolKit markers plays a vital role in the performance of these AR applications,...
In the watermarking schemes, Just Noticeable Distortion (JND) model provides an efficient method to keep the balance between watermark's imperceptibility and robustness. Traditional JND models are not as perfect as they should be. Edge detection, which extracts content features well, improves the performance of JND models. In this paper we explore the reasons and simulate JND models based on edge...
The least mean square (LMS) algorithm is most popular adaptive filter because of its low-cost and robust. However, its convergence rate is slow when the measurement noise is added in unknown system. The combination of two least mean square (CLMS) filters is developed to address the tradeoff in many signal processing applications. Based on the analysis of basic-CLMS algorithm, a novel sign adaptation...
Underwater image mosaicking is an important tool for visual surveys, object detection, and as a means to control the underwater robot if done online. Such application areas can benefit significantly from a recent focus on robust methods for graph-based Simultaneous Localization and Mapping (SLAM). This paper focuses on two contributions: An approach to combine registration results from multiple methods...
Today's wireless networks use fixed spectrum over long term and fixed geographical regions. However, spectrum utilization varies by time and location, which leads to temporal and special spectrum underutilization. Cognitive radio is an emerging technology that enables dynamic sharing of the spectrum in order to overcome the spectrum underutilization problem. In this paper, we consider the problem...
Local features have been widely used in many computer vision related researches, such as near-duplicate image and video retrieval. However, the storage and query cost of local features become prohibitive on large-scale database. In this paper, we propose a representative local features mining method to generate a compact but more effective feature subset. First, we do an unsupervised annotation for...
A simplified version of a recently developed structure is derived for all-pass filters. The proposed structure possesses 4N non-trivial multipliers and 2N adders used for computing one output sample of an Nth order all-pass filter. It is shown that such a structure yields a roundoff noise gain of 4N, compared with that of (N +1)2 for the classical minimum roundoff noise realizations that have in general...
In this paper we describe a new methodology for designing robust and efficient state-feedback control laws for a switched-mode boost DC-DC power converter. The proposed design is adopting the so-called Lyapunov-based control law and attempts to solve the robust constrained stabilization problem under large parameter variations. With the methodology proposed static or switching state-feedback control...
Randomized optimization is a recently established tool for control design with modulated robustness. While for uncertain convex programs there exist randomized approaches with efficient sampling, this is not the case for non-convex problems. Approaches based on statistical learning theory are applicable for a certain class of non-convex problems, but they usually are conservative in terms of performance...
Recent papers proposed an interpolating control methodology for linear discrete-time systems subject to input and state (output) constraints. The main idea of the approach is to blend a local high-gain optimal controller with a global low-gain vertex controller via interpolation. At each time instant, two linear programming problems of relatively small dimensions are solved online. The approach can...
In large-scale Multiple-Input-Multiple-Output, the Base Station (BS) is equipped with a large-size antenna array containing tens even hundreds Radio Frequency channels. If so many RF front-ends adopt the classical receivers, their cost and power consumption during the receiving mode would increase quickly. Therefore, we exploit low-resolution Analog-to-Digital-Convertor to design low-power and low-cost...
Successive interference cancellation (SIC) has been extensively applied to estimate transmit signals in communication systems. When the channel state information (CSI) and noise statistics are imperfectly estimated, the standard SIC estimators that ignore the model mismatch may perform poorly. This paper introduces regularized SIC estimation to provide robustness against the model mismatch. Suboptimal,...
To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected...
The maximum coverage problem is a staple of facility location theory, and has more recently been extended to the covering facility interdiction problem, in which covering facilities are chosen for interdiction so as to minimize the resultant coverage. This paper considers the opposite to the interdiction problem, selecting facilities to maximize coverage after the worst-case interdiction. Solutions...
Since their invention Luby Transform (LT) codes have been regarded as an efficient capacity achieving channel code over binary erasure channels. Majority of the previous research is focused on designing the degree distribution of LT codes which are asymptotically optimal. Nevertheless, deigning the optimal degree distribution of LT codes for finite and small message lengths remains as an open problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.