The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information-centric networking (ICN), a strong candidate for future internet architecture, consists of two kinds of packets, interest and data packets, both of which carry the name of data content to be requested (or delivered). The data packet is associated with a public key signature so that the data receiver can verify the data packet's correctness, integrity and provenance. Certificate-based signature...
Sparse code multiple access (SCMA) is a nonorthogonal multiple access scheme based on a multi-dimensional codebook with sparse codewords. The sparsity property of SCMA allows the receiver to take advantage of low-complexity message passing algorithm (MPA) detector with maximum likelihood (ML)-like performance. The use of multiple antennas at the SCMA receiver will improve the detection performance...
The energy consumption in residential section accounts for over 30% of the world and cost-effective indoor energy management is important. Visible light communication based on variable pulse position modulation (VPPM) is a scheme for efficient and convenient indoor energy management. This paper proposes methods for detecting dimmable packet. First, we describe a method based on correlation bank expanding...
Study on the design of a robust network against malicious attacks has gained increased interest in various areas such as wireless communications networks. One of the main obstacles towards finding the optimum robust network is the large number of possible network configurations. In this paper, we propose a novel method to design robust networks against malicious attacks based on the network degree...
Programming novices usually find acquiring the ability to write programs challenging at first, however, they overcome this obstacle as they encounter more opportunities in the learning process. Providing learners with distributed practices and the ability to self-assess their programming knowledge is key to measure their development and guide them towards programming proficiency. In this work, we...
To increase the success in computer programming courses, it is important to understand the learning process and common difficulties faced by students. Although several studies have investigated possible relationships between students performance and self-regulated learning characteristics in computer programming courses, little attention has been given to the source code produced by students in this...
In recent years, numbers of non-orthogonal multiple access (NOMA) schemes have been proposed to support the great amounts of wireless connections. However, complex multi-user detection is needed in case that the user power differentiation is not available and simple successive interference cancellation cannot directly apply, which usually incurs unaffordable computational complexity. In this paper,...
In order to reduce the effect of pilot contamination and maximize the system sum rate while guaranteeing the fairness among users, an efficient and fair pilot allocation scheme is proposed for multi-cell massive MIMO systems in this work. The pilot allocation optimization problem is formulated to maximize the sum rate of the system while guaranteeing the fairness among users. A heuristic algorithm,...
Sparse-code multiple-access (SCMA) is a novel multiplexing method to increase the capacity of wireless communication systems. By giving users non-orthogonal codebook with few non-zero entries, the SCMA approach can highly improve the spectral efficiency, compared with traditional orthogonal ones such as CDMA, with tolerable detection complexity. Therefore, it has been considered as an option for 5G...
Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking...
This paper explores several algorithms that sequentially select input values to probe a discrete memoryless binary output channel (DMBOC) and establish a communication rate close to the capacity C. Adapting techniques from pure-exploration multi-arm bandit problems, each algorithm strives to sample an unknown channel as few times as possible to maximize a lower-bound rate RL that: (1) holds with at...
Recognition of epileptic seizures is an important issue and in certain circumstances it is desirable to have portable equipment implementing the algorithm in order to better monitor the patients. This work considers a widely used EEG database from University of Bonn as reference for comparing our recognition method with other previously reported. In order to perform epileptic seizures we combine a...
In this paper, belief propagation (BP) detection based on max-sum (MS) algorithm for massive multiple-input multiple-output (MIMO) systems is therefore proposed to reduce computational complexity of general belief propagation. Owing to employing the approximation strategy, complexity reduction of MS is at the expense of detection performance loss. Based on MS algorithm, two effective approaches are...
Indian costal region has low ocean wave flux density but it has a vast seashore area due to which the overall potential of ocean wave energy is extremely high. In addition, harnessing of ocean wave energy has minimum environmental impact. Till date only one project based on oscillating water column has been established in India. The project covers huge constructional area with high complexity. Therefore...
Multi-channel linear prediction (MCLP) has been shown to be a suitable framework for tackling the problem of blind speech dereverberation. In recent years, a number of adaptive MCLP algorithms have been proposed, whereby the majority operates in the short-time Fourier transform (STFT) domain. In this paper, we focus on the STFT-based Kalman filter solution to the adaptive MCLP task. Similarly to all...
The command filtered back-stepping technology is investigated for a class of nonlinear strict-feedback form in the paper. A nonlinear anti-tangent filter is adopted to estimate the virtual control, avoiding the analytical deduction inherent in traditional back-stepping method and overcoming the “explosion of complexity” in nonlinear strict-feedback systems. Differing from the existing back-stepping...
The postural instability was observed in patients following-stroke during standing, showing an altered center of mass acceleration (COMacc). This study aimed to investigate the effects of stroke on fluctuation and complexity of COMacc during quiet standing. Eleven stroke survivals and eleven gender- and age-matched healthy subjects participated in this experiment. The COMacc series in anteroposterior...
Nowadays, detection of limb movements from electroencephalogram (EEG) signals is crucial issue to focus on. Many studies on the movement detection of the limbs such as arm, leg, wrist limbs exist, while there are few studies regarding finger movements. Our study aims to determine the best classified finger pairs using binary classification with highest accuracy among individual finger movements. In...
Riding on the waves of deep neural networks, deep metric learning has achieved promising results in various tasks by using triplet network or Siamese network. Though the basic goal of making images from the same category closer than the ones from different categories is intuitive, it is hard to optimize the objective directly due to the quadratic or cubic sample size. Hard example mining is widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.