The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High Resolution Range Profiles (HRRPs) are widely used in the field of Radar Non-Cooperative Target Recognition (NCTR). An exhaustive set of classification algorithms can be found in the scientific literature but it is not common to find the description of the architectures capable of generating range profiles. This work proposes a specific scheme of a 1-D high resolution imaging radar for maritime...
The proliferation and daily congregation of modern mobile devices have created abundant opportunities for peer edge devices to share valuable data with each other. The short contact durations, relatively small sharing sizes, and uncertain data availability, demand agile, light weight peer based data sharing. In this paper, we propose Peer Data Sharing (PDS) that enables edge devices to discover which...
This paper presents novel techniques to achieve high-rate ultrasonic communications through thick metallic barriers utilizing ultrasound and provides a characterization and analysis of a 7 × 7 MIMO-OFDM acoustic-electric channel array and determines that, due to unique channel properties yielding well-conditioned channel gain matrices, a slowly adaptive crosstalk mitigation structure achieves near-optimal...
To resolve the problem of ambiguity caused by the folding used widely in direct acquisition (DA) of the precision code (P code) in the global positioning system (GPS), a two-step DA scheme is proposed based on the zero-padding and local P code modification. The coarse acquisition is achieved in the first step based on the folding, which allows us to maintain the advantage of the folding, and the zero...
People nowadays would rather spend less time with their friends than on the services like Facebook or Twitter on their smartphones. Many business and enterprises start to use software robot to promote their products and interact with customers with less cost and more efficiency. Due to various APIs from different social platforms, developers have to follow specific rules while developing robots. Therefore,...
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
In Virtual Antenna Array (VAA) based wireless system, knowledge of users' locations can help the transmitter to achieve interference avoidance by steering the main beam towards the intended recipient. In this work, the idea has been applied to licensed shared access (LSA) based cognitive radio (CR) environment where location aware beam-forming has been implemented on spatially modulated Generalized...
We study a three-user multiple-input single-output (MISO) broadcast channel with confidential messages (BCCM). We have three messages where each of them is intended to the corresponding receiver. We impose confidentiality constraints for two of the messages at the receiving terminals. Half of the time, the channel state information (CSI) of all receivers are known perfectly at the transmitter. At...
The purpose of this paper is to develop Profile Change application that runs on Android platform. This is the first version of its kind and is developed based on Android platform. The goal of this paper is to find mobile when it is in silent mode and forgot where it is placed. In present days the entire world mobiles are using very rashly so the people are expecting some new technologies in mobiles...
Time mode signal processing (TMSP) is the implementation of analog signal processing functions using the most basic element available, namely, propagation delay. Moreover, a time to digital converter (TDC), an important block of time mode circuits, could be used to convert the time difference between two edges of two signals into a sequence of digital numbers. In this paper, a new time mode SerDes...
Optimal algorithms of band-limited noise signal detection are synthesized. The decision on the presence or absence of a signal is taken from the result of likelihood functions comparison. The block diagrams of optimal and quasi-optimal detectors are developed. The analytical expressions of probabilistic and power characteristics for different ratios of useful and noise signals are obtained. Curves...
In the wireless world, the devices face a unique challenge of energy scarcity. Unlike the wired systems, there is no continuous wired energy resource available to power the ongoing wireless communication. Instead, the entire system runs on wireless batteries. Taking a step further in this field, the concept of energy harvesting is introduced a while ago. This paper combines the concept of harvesting...
Steganography is a branch of computer science where original information bits are to be transmitted on some carrier file[1][7]. This carrier file may be audio file, video file or image file etc. Here in this proposed work, instead of embedding a source image in a carrier image, only stego key is generated on sender side and transmitted on the channel, with some logic this source image is reconstructed...
This paper demonstrates a new cooperative bus location system with BLE (Bluetooth Low Energy) devices and smartphones. Our idea has extended common participatory sensing systems to realize more practical sensing systems because common participatory sensing mechanisms require a participants' operation to measure some values. Our proposed system consists of a BLE devices on a bus, smartphone applications...
Cryptography is the essential component in any protocols for securing the communication. Diffie and Hellman introduced the concept of Public key cryptosystem, which uses two different keys for secure communication. Ralph Merkle and Martin Hellman invented a public-key cryptosystem named as Merkle-Hellman Knapsack Cryptosystem (MHKC) which is an NP-complete combinatorial problem believed that computationally...
In this paper a new approach to localization of mobile nodes in wireless sensor networks is presented which utilizes the measurement of the received signal strength indicator by multiple receivers concentrated in a small area and applies the technique of linear discriminant analysis to the received data. The concept of gathering all receivers at a single spot provides great flexibility, while good...
The need for wireless connected devices in IoT is increasing, and with the increasing number of connected devices the power consumption also rises. For WPAN nodes, which have to enable a low latency, like lighting where we are used to an instant reaction, the most power is consumed by listening to the channel and waiting for a command. To enable low power but also low latency systems it is necessary...
Carrier phase measurement is one of the most important measurements of GNSS receiver, which can be used for precise positioning. In order to achieve a reliable and high precise position, a high quality carrier-phase measurement is needed. Although carrier phase is very precise, there are also many factors in the receiver that will influence the carrier phase measurement performance. The relationship...
In order to improve anti-jamming performance of GNSS receivers, the Automatic Gain Control (AGC) system is commonly utilized. AGC is able to scale the analog input voltage to an optimal level of the ADC. Few studies have investigated how AGC impacts the signal processing of GNSS receivers in pulsed interference conditions. This paper studies the performance of GNSS receivers with AGC in the presence...
Secure data transfer is often achieved by encryption. However, if transmitting across a Binary Symmetric Channel while an eavesdropper listens via a Wiretap Channel, the difference in signal quality can be exploited to improve the inherent transmission secrecy. If this exploitation involves the managed use of erasures, then the secrecy of a code transmitted across the channel can be improved whilst...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.