The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the last decade, machine learning algorithms have proven to be useful tools for exploring neural representations of percepts and concepts in the brain. An important but often neglected next step is it to relate neural representations to human behavior. Here, we introduce a novel approach to definitively linking neural representations to structural properties of stimuli as well as human behavior...
Electroencephalography (EEG) processing methods mostly focus on extracting its spectral or spatial features, which are proven to discriminate bilateral hand movement, hand movement directions and speed. The focus of current study is to explore EEG time-domain features that represent neural correlates of hand movement execution speed. In this paper, we propose autocorrelation analysis of EEG and features...
Current Brain Computer Interface (BCI) systems are limited by relying on neuronal spikes and decoding limited to kinematics only. For a BCI system to be practically useful, it should be able to decode brain information on a continuous basis with low latency. This study investigates if force can be decoded from local field potentials (LFP) recorded with deep brain electrodes located at the Subthalamic...
Wireless technologies gain importance in various fields of industrial communication as they facilitate control and data acquisition tasks. In this context, Parallel Sequence Spread Spectrum (PSSS) is a promising new approach. The parametrization of a PSSS system is very flexible and thus can be precisely adapted to the application's requirements. Independent of the PSSS parametrization, the transmission...
This paper introduces a time-hopping (TH) system for rapid on-off-division duplex (RODD), with this method, virtual full-duplex communication at the frame transmission level can be realized. However because of the randomness of the transmission timing, the slots may have a collision with a high probability. So it's very important to establish a model to calculate the collision ratio, and analyze the...
Biometrie based authentication system authenticates an individual on the basis of biometrie template stored during enrolment. As the biometric features are immutable, therefore a security concern about the stored biometric template arises. Fingerprint fuzzy vault is a cryptographic construct securing the biometric template and allowing error tolerant fingerprint based authentication. In this paper,...
Holoscopic imaging is a prospective acquisition and display solution for providing natural and fatigue-free 3D visualization. However, large amount of data is required to represent the 3D holoscopic content. Therefore, efficient coding schemes for this particular type of image are needed. In this paper, an effective coding scheme is proposed by exploring the spatial correlation among the view images...
Opportunity detection at secondary transmitters (TXs) is a key technique enabling cognitive radio (CR) networks. Such detection however cannot guarantee reliable communication at secondary receivers (RXs), especially when their association distance is long. To cope with the issue, this paper proposes a novel MAC called sense-and-predict (SaP), where each secondary TX decides whether to access or not...
We present a novel method for constructing Variational Autoencoder (VAE). Instead of using pixel-by-pixel loss, we enforce deep feature consistency between the input and the output of a VAE, which ensures the VAE's output to preserve the spatial correlation characteristics of the input, thus leading the output to have a more natural visual appearance and better perceptual quality. Based on recent...
The construction of a channel code by using a source code with decoder side information is introduced. For the construction, any pair of encoder and decoder is available for a source code with decoder side information. A constrained-random-number generator, which generates random numbers satisfying a condition specified by a function and its value, is used to construct a stochastic channel encoder...
In this paper, we propose a (k, L, n)-threshold ramp secret sharing scheme (SSS) against substitution attacks. This scheme can be applied to a secret SL uniformly distributed over GF(pm)L, where p is a prime satisfying p ≥ L + 2. We extend Koga and Koyano's analysis based on mutual information of shares for (k, n)-threshold SSSs to (k,L,n) ramp SSSs. The proposed scheme can achieve the minimum sizes...
In this paper, we investigate the cryptographic properties of stream cipher and generalities of Walsh-Hadamard transform. Boolean functions play a great significance role in the design of stream cipher. It composes several LFSR (Linear feedback shift register) and a non-filtering Function which produces the output. Predominant cryptographic properties for constructing non filtering function are balancedness,...
This paper presents a new embedding strategy to extend the performance bound of spread spectrum (SS) based watermarking by introducing more imperceptible distortions measured in the mean square errors (MSE). The potential of the host is sufficiently exploited and utilized to maximize the watermark robustness. This strategy is then realized in audio watermarking by adaptively inverting the host according...
The large number of analog received signals to be processed in massive MIMO systems renders conventional high-precision analog-to-digital conversion (ADC) not feasible in terms of cost- and power-efficiency. In this paper we present a novel ADC architecture inspired by the principles of integer-forcing source coding, which jointly reconstructs the received signals in the digital domain. This scheme...
Despite the phenomenal advances in the computational power of electronic systems, human-machine interaction has been largely limited to simple control panels, such as keyboards and mice, which only use physical senses. Consequently, these systems either rely critically on close human guidance or operate almost independently. A richer experience can be achieved if cognitive inputs are used in addition...
Network diversity multiple access or NDMA is the family of algorithms with the highest potential throughput in the literature of signal-processing-assisted random access. NDMA uses the concept of protocol-induced retransmissions to create an adaptive source of physical (PHY) layer diversity. This adaptive diversity is used to resolve packet collisions (via signal separation) without the explicit need...
Distributed video coding is the promising solution for emerging applications such as wireless video surveillance, wireless video sensor networks that have not been supported by traditional video coding standards. Success of distributed video coding is based on exploiting the source statistics at the decoder with availability of some side information. The better the quality of side information, the...
The growing popularity of powerful mobile devices such as smart phones and tablet devices has resulted in the exponential growth of demand for video applications. However, due to the intensive computation of the video decoding process, mobile video applications require frequent embedded memory access, which consumes a large amount of power and limits battery life. Various low-voltage memory techniques...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. The fuzzy vault scheme provides supreme security to the templates which are stored in a database or smart card. Compared to an ordinary system which...
In recent years, several studies have shown that there is a correlation between electroencephalographic (EEG) signals and hand-reaching kinematic parameters after applying linear decoders. These studies have been generally conducted using actual upper limb movements, but so far there has been little discussion about the possibility of applying these decoders to motor imagery tasks. Moreover, the use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.