The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Correlation power analysis is the well-known attack against cryptographic modules. An attacker exploits the correlation between the power consumed by a device and the data being processed. In the present paper, we present the experimental procedure of correlation power analysis using three different devices: FPGA, ASIC and a microcontroller. Results show that the power model used to calculate hypothetical...
An alternative approach, based on an iterative least square optimization technique, for the design of antenna array exhibiting equal side lobes in their radiation pattern. New and generalized expression for the array factor of all physically realizable linear antenna arrays with progressive phase shifts are introduced. The algorithm is based on the statistically computed signal analysis. By considering...
Control loop performance assessment (CLPA) has attracted considerable interest in recent years. Several methods for CLPA are proposed by researchers in last decade. Statistical methods are one of most important methods in CLPA. This paper addresses CLPA issue through a comprehensive evaluation of statistical methods to efficiently explore their capabilities to assess for different control loop scenarios...
Based on prediction model of fuzzy classification and fuzzy recognition combined with statistical correlation, the theory of wavelet analysis was introduced and proposed the prediction model of wavelet and fuzzy combined with statistical correlation, there is a basic mentality: first, wavelet decomposes the prediction factors one by one, and then take the wavelet series that have decomposed into the...
In this paper we present a method for estimating wind gusts and a corresponding display for increasing the situational awareness of a minimally trained operator controlling a Micro Aerial Vehicle (MAV). Our method utilizes statistical correlations between MAV controller output and prior wind conditions to predict the presence of a gust in the current flight environment. The findings show that the...
The paper mixes extension theory and gray clustering method, and constructs the evaluation system of the bus rapid transit system based on gray extension matter-element model, using the evaluation grade of bus rapid transit system, the indicator evaluation standard and the basic characteristics value as the matter elements, applying gray clustering method to calculate the weight and the correlation...
The aim of this research is to investigate any effects of mobile phone usage on human brainwaves using electroencephalograph (EEG) particularly on alpha wave. EEG signals were recorded from thirty samples that make calls from a mobile phone to another party without conversation. The mobile phone is strapped to the right ear. The EEG recording took place before, during and after the mobile phone calls...
Based on 1961-2008 day-by-day meteorological data observed by Linyi stations, using correlation analysis and wavelet analysis method, the correlation and tendency of the pan evaporation and the main influence factors (sunshine, temperature, daily temperature range, relative humidity and wind speed, etc.) of the recent 48 years are researched. The results show that, in recent 48 years, the average...
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule - based mechanisms which are tedious and error prone. Other methods are based on statistical modeling, these are unable to identify causal relationships...
Statistical brain connectivity is a relatively new approach for inferring large scale anatomical organization for both cortical and subcortical structures. This paper presents a a comparison of network connectivity measures and anatomical features used for extraction of such networks. In this paper, we use structural information from three cortical features, i) area, ii) gray-matter volume, and iii)...
In Multiple Sclerosis (MS) research, it is of interest to evaluate accurately the whole brain atrophy. To address this purpose, a lot of methods are available in the literature. However, no gold standards are available to study the effects of a treatment. We selected a set of 4 methods based on different approaches. A preliminary study allows us to evaluate the accuracy and the reproducibility of...
With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality,...
Incomplete channel state information, resulted from imperfect channel estimation, is known to degrade the performance of space time codes based communication systems. The bootstrap decoder was suggested as an adaptive decoding scheme to mitigate the effect of decoding with erroneous channel coefficients. Never the less, the suggested algorithm requires relatively long block size which may not comply...
Soil moisture is very important on many hydrological, biological and biogeochemical processes. To select the optimal method in this paper, five interpolation methods were compared, and then the optimal interpolation method was used to give the spatial distribution of soil moisture. The results show that (1) Ordinary kriging is the optimal method for interpolating soil moisture in Henan province. (2)...
This paper proposes a novel confusion and diffusion algorithm for image encryption based on logistic map and cheat image. We choose the initial condition and control parameter of logistic map as the secret key. The cheat image selected from the most common images in public network, together with the chaotic matrices generated by logistic maps, is employed both in encryption and decryption processes...
A novel data-driven sparse generalized linear model (GLM) and statistical analysis method for fMRI is developed. Although independent component analysis (ICA) has been broadly applied to fMRI to separate spatially or temporally independent components, recent studies show that ICA does not guarantee independence of simultaneously occurred distinct activity patterns in the brain and sparsity of the...
In respect to the main goal of our ongoing work for predicting preterm birth, we analyze in this paper uterine EMG recordings of 11 pregnant and laboring women by means of Detrended Fluctuation Analysis (DFA), a scaling analysis method that quantifies a simple parameter to represent the correlation properties of a time series. Our study provides convincing evidence that pregnancy progress is typically...
We analyse the spatial diversity of dense antenna arrays in the plane and show how it can be characterised by the eigenvalue spectrum of the spatial autocorrelation kernel. We show how this diversity spectrum can be calculated for any spatial fading statistics represented by the power azimuth spectrum (PAS). Numerically calculated diversity spectra provide estimates of the possible diversity gains...
DNA barcoding has recently emerged for fast taxonomic classification of species using molecular biomarkers. Different from traditional classification scheme, DNA barcode often involves a small number of samples in each class, likely leading to a phenomenon known as overfit. To evaluate the efficacy of a biomarker based on a given meaningful multiple sequence alignment, we use a metric-based information...
Many methods have been put forth to perform image encryption using Chaotic Neural Networks. In this paper, another method of chaotic image encryption called the “Triple-Key” method is introduced. In this method, it is required to enter an 80-bit session key in addition to the initial parameter key and the control parameter key. Each of the keys forms just one part of the lock that needs to be opened...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.