The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because of the effect of the space local scattering, when two non-coherent desired signals are incident in the mainlobe of the beampattern at the same time, the beampattern of the conventional adaptive beamformer can form a null in one of the desired signal directions, which will further destroy the integrity of the mainlobe and lead the output signal-to-interference-plus-noise ratio (SINR) to drop...
Water supply system has characteristics of non-linear, time-varying parameter, large time delay, so its mathematical model changes time by time. Water supply system widely use PID controller to keep constant pressure and PID controller need accurate mathematical model. The system that use PID controller is along with large overshoot, more adjusting time. Fuzzy controller don't need the accurate mathematical...
Traditional power allocation algorithms in heterogeneous networks (HeNets) are given under the assumption of perfect channel state information (CSI). However, the perfect CSI is difficult to obtain due to the efficiency of channel fading and feedback delays. In this paper, a robust power allocation algorithm is proposed to minimize the total transmit power of femtocell users under the constraints...
This paper addresses the robust beamforming design for a downlink cloud radio access network (cloud RAN) subject to per-base-station (BS) power constraint and individual signal-to-interference-plus-noise ratio (SINR) requirements. Our objective is to minimize the overall network power and backhaul cost while guaranteeing the users' SINR constraints for every channel realization by designing the joint...
In this paper, we investigate multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) broadcast channels with confidential messages (BCC) scenario, in which a multiple-antenna transmitter simultaneously transmits confidential messages and power to multiple single-antenna receivers. Considering the imperfect channel state information (CSI), we study the joint...
In this paper, the problem of adaptive beamforming in the presence of direction-of-arrival (DOA) mismatch is investigated. To develop a robust beamformer against such an imperfection, a new approach is devised by formulating an output signal-to-interference-plus-noise ratio (SINR) maximization problem. In particular, the proposed robust beamforming approach consists of two steps. At first, the standard...
This work presents a path following controller for single Unmanned Surface Vessels (USV) in formation control. Firstly, the USV mathematical model under unknown dynamic sea conditions will be analyzed. And then an adaptive robust controller is designed based on RBF neural network. Finally, the controller stability and robustness with unmodeled dynamics and unknown model parameters perturbation in...
We investigate the problem of person search in the wild in this work. Instead of comparing the query against all candidate regions generated in a query-blind manner, we propose to recursively shrink the search area from the whole image till achieving precise localization of the target person, by fully exploiting information from the query and contextual cues in every recursive search step. We develop...
Novel human gesture recognition and classification technique is suggested and experimentally studied. Suggested strategy is based on exploiting the interactions of human gestures with high-frequency electromagnetic field. Extracting of classification features contained in the wireless radio signal modulated by human gestures is proposed by utilizing bispectrum-based processing of the signal envelope...
Bluetooth Low Energy (BLE) beacons are attractive for indoor location due to their ease of deployment, wide support on consumer devices and low cost. Co-ordinate location can be estimated using radio fingerprinting techniques applied to Received Signal Strength (RSS) values from BLE beacons. Earlier work on BLE fingerprinting has noted that the separate BLE advertising channels can exhibit different...
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes...
In this work, we present a novel robust distributed beam-forming (RDB) approach to mitigate the effects of channel errors on wireless networks equipped with relays based on the exploitation of the cross-correlation between the received data from the relays at the destination and the system output. The proposed RDB method, denoted cross-correlation and subspace projection (CCSP) RDB, considers a total...
To solve the ascent guidance of reusable launch vehicle (RLV) under the uncertain condition, a robust guidance method based on combing feedback linearization and H-infinity optimization theory is proposed. The article establishes the RLV ascending dynamic models. According to the characteristics of the ascending flight, the height deviation is converted into a linear relationship with pitch angle...
A secrecy transmission method with robust power control is investigated in this paper for a downlink two-tier femtocell network, where an eavesdropper attempts to wiretap the legitimate macrocell users. Considering the imperfect channel gains, a probability constraint robust optimization problem is formulated to satisfy the quality-of-service (QoS) of users. We aim to maximize the secrecy rate with...
This paper presents a variable coefficient nonsingular fast terminal sliding mode (VCNFTSM) control method with the extended state observer (ESO) for a class of second-order uncertain SISO nonlinear systems subject to external disturbance. First, a new variable coefficient double exponential reaching law is combined with NFTSM surface function to get finite time fast convergence in both reaching phase...
In order to reduce the effects caused by complex environments and ambient light conditions, a fast, robust and effective obstacles detection method of vehicles based on image analysis of multi-feature is proposed. Firstly, regions of interest (ROI) which contain lanes, vehicles and few parts of interference background are extracted in the input image by detecting gradient feature in rows. Secondly,...
In recent years, quadrotor unmanned aerial vehicles have played an important role in many aspects. Therefore, people put higher demands on the robustness of the quadrotor UAV's control. In this paper, a control algorithm based on signal compensation is proposed. Compared with the PID algorithm, this algorithm has better robustness to external disturbance and modeling uncertainty. Moreover, the controller...
This paper proposes a technique to improve the robustness of spread spectrum (SS) audio watermarking for acoustic propagation. The appropriate embedding areas should be selected to achieve good perceptibility and high robustness. In order to improve the redundancy and robustness, the cross spread spectrum (CSS) scheme based on highly correlated cross frames is proposed which could decrease the variance...
In this paper, we propose two practical and economic beamforming design methods under consideration of an effective acquisition mechanism of partial channel state information at transmitter (CSIT) for frequency-division duplex (FDD) massive MIMO systems. In contrast to previous beamforming designs with total power constraint, per-antenna power constraints are considered in this paper because of the...
We present sum-set inequalities specialized to the generalized degrees of freedom (GDoF) framework. These are information theoretic lower bounds on the entropy of bounded density linear combinations of discrete, power-limited dependent random variables in terms of the joint entropies of arbitrary linear combinations of new random variables that are obtained by power level partitioning of the original...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.