The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new approach for optimum filtering which we call as the zone filtering. In zone filtering, one is only interested on the optimal filtering of a part of the finite length signal. Therefore error is only computed for that part of the signal. When the MSE optimum filtering formulation is done, the result turns out to be the Wiener filtering with covariance method. We show that as long as...
High time resolution of ultra wideband (UWB) signals facilitates very precise positioning capabilities based on time-of-arrival (TOA) measurements. Although the theoretical lower bound for TOA estimation can be achieved by the maximum likelihood principle, it is impractical due to the need for extremely high-rate sampling and the presence of large number of multipath components. On the other hand,...
One of the most advanced forms of industrial maintenance is predictive maintenance. Indeed, the present analysis of the behavior of a material helps to predict future behavior. The analysis is also used to predict the nature of the failure and to minimize the delay in the fault detection. So as the diagnosis of faults in rotating machines is an important subject in order to increase their productivity...
A task of blind estimation of multiplicative noise (speckle) variance in multi-look images acquired by radars with synthesized aperture array is considered. It is shown that there are several factors affecting accuracy of such estimation. The main of them are spatial correlation of the speckle, complexity of an analyzed image and peculiarities of a method used. Spatial and spectral domain approaches...
In wideband compressive spectrum sensing, when the number of occupied subbands in the monitored wideband increases, the existing compressive sensing approaches have to raise the sampling rate to maintain a desired sensing performance. What is worse, that will add computational complexity of the following signal reconstruction. To overcome this issue, this paper proposes a novel wideband spectrum sensing...
Complex electronic systems include multiple power domains and drastically varying dynamic power consumption patterns, requiring the use of multiple power conversion and regulation units. High frequency switching converters have been gaining prominence in the DC-DC converter market due to their high efficiency. Unfortunately, they are also subject to higher process variations jeopardizing stable operation...
The state of the art in digital watermarking of visual data is briefly reviewed. A communication perspective is adopted to identify the main issues in digital watermarking and to present the most common solutions adopted by the research community. We first consider the various approaches to watermark embedding and hiding. The communication channel is then taken into account, and the main research...
Long LMS filters of the tapped-delay line type are in widespread use, particularly in acoustic applications. For the limiting case of an infinite line length the behaviour of such filters is shown to be governed by remarkably simple laws. This is true for the steady state, where for small stepsizes the weight-error correlations become independent of the input signal, but also for the transient behaviour,...
In this paper, we present a method for estimating the signal sources steering vector using an arbitrary planar array with omnidirectional elements. The proposed method improves the initial estimation of the signal steering vector in two steps. In the first step of this algorithm we minimize of the distance between the steering vector and the signal subspace. The second step improves the estimation...
The estimation approach discussed in this paper is based on a signal-theoretic and statistical analysis of the notion of orientation. In contrast to other approaches, it does not require the computation of gray value gradients, or the power spectrum of the given signal patch, or quadrature filter outputs, but directly estimates a small central part of the autocovariance function (acf) of the signal...
The feasibility of guaranteeing the accuracy at filtering with substantial prior uncertainty in a class of input signals is analyzed. The class y2 containing nonstationary stochastic signals with the only known prior information — upper bounds of some derivatives is considered. The procedure of estimating the extreme attainable error dispersion at filtering the input signals of the class y2 at the...
Narrowband power line communications (NB-PLC) operating in the 3–500 kHz frequency band is proposed as a solution to support the emerging Smart Grid applications that aim to optimize the efficiency and reliability of the power grids. PLC is attractive for Smart Grid communications as it can be deployed over the existing power grids without any additional infrastructure. However, PLC suffers from impulsive...
This paper presents an approach based on Stochastic Data Envelopment Analysis (SDEA) for evaluating of shaping factors for performance assessment of electricity distribution units. This approach is applied to assessment of Iranian distribution units from 2001 to 2011. There are usually incomplete and stochastic data or lack of data with respect to electricity distribution companies. So, in this paper...
The photo response non-uniformity (PRNU) of a sensor can be useful to enhance a biometric systems security by ensuring the authenticity and integrity of images acquired with a biometric sensor, e.g. by performing a source device identification. Previous studies regarding the feasibility of this application have been conducted on the CASIA-Iris V4 database by studying the differentiability of the sensors...
In this paper, a new multitarget tracking approach is proposed. In the proposed approach, a non-iterative fuzzy clustering means algorithm is used to generate the association measures between the received measurements and the targets. Measurements-to-tracks associations are computed jointly across all targets and all validated measurements using the non- iterative fuzzy clustering means algorithm...
A framework that can be used for assessing the suitability of different feature vectors in the task of determining the age similarity between a pair of faces is introduced. This framework involves the use of a dataset containing images displaying compounded types of variation along with the use of an ideal dataset, containing pairs of age-separated face images captured under identical imaging conditions...
In this work, we investigate and explain the time-dependent behavior of shot noise in Silicon quantum dot-based double-tunnel junctions by means of a three-dimensional self-consistent simulation and a Monte-Carlo algorithm following the time evolution of the system. We demonstrate the strong link between autocorrelation functions and electron waiting time distributions, i.e, the time between two consecutive...
The Ieodo Ocean Research Station(IORS) is an integrated meteorological and oceanographic observation base which was first constructed in Korea. It was constructed at the Ieodo underwater rock located at a distance of about 150 km to the south-east of the Mara-do, the southernmost island in Korea. The structure is of a fixed jacket type installed at a water depth of 40 m. In order to understand the...
A major breakthrough in side channel attacks came up when analysis of power consumption by a cryptographic device led to discovery of the secret key. This analysis technique popularly known as Power Analysis Attack is now one of the most volatile and successful side channel attacks. This technique uses the power consumed by a cryptographic system as the main parameter to identify the cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.