Underwater acoustic communications are required for controlling and networking a variety of underwater or sea surface objects. Due to the unique characteristics of the underwater acoustic channel, e. g., complicated m...
详细信息
ISBN:
(纸本)9781457720918
Underwater acoustic communications are required for controlling and networking a variety of underwater or sea surface objects. Due to the unique characteristics of the underwater acoustic channel, e. g., complicated multipath propagation, selective frequency fading, extreme Doppler effect and heavy ambient noise, FH-MFSK techniques play a vital role in robust underwater acoustic communication, especially in shallow water. However, based on detecting the frequency of the receiving signals, the demodulation scheme for FH-MFSK may be sensitive to the frequency shifting caused by underwater Doppler shifts. This paper focuses on how to design the frequency demodulation scheme and to improve the performance of underwater FH-MFSK acoustic communication system. By using an original Double-Line interpolation algorithm with Hanning window, we propose a demodulation scheme to enhance the tolerance of the Doppler shift and improve the detection rate. Simulations and demodulation performance were tested. Experimental results show a promising future for FH-MFSK demodulation in underwater acoustic communication system.
the main objective of 3D mesh watermarking is to maximize the watermark strength while minimizing the visual distortion. In this paper, we propose a novel 3D mesh watermarking based on the human visual system and mesh...
详细信息
ISBN:
(纸本)9780769535432
the main objective of 3D mesh watermarking is to maximize the watermark strength while minimizing the visual distortion. In this paper, we propose a novel 3D mesh watermarking based on the human visual system and mesh curvature. We analyze the region's mean curvature and fluctuation of curvature, and then choose the appropriate regions with high visual masking degree, in order to embed the watermark by using the interpolation algorithm. The experimental results show that the watermark is capacious, invisible and robust against various attacks.
In view of the high order, nonlinear characteristics of target trajectory, control strategy is proposed for a kind of RBF neural network and polynomial interpolation combining. According to the specific requirements o...
详细信息
ISBN:
(纸本)9783038352679
In view of the high order, nonlinear characteristics of target trajectory, control strategy is proposed for a kind of RBF neural network and polynomial interpolation combining. According to the specific requirements of trajectory planning, the manipulator in joint space variables are expressed as one or two order derivative function by polynomial interpolation algorithm, then the RBF neural network is used for tracking the target trajectory. Finally, through MATLAB simulation, the accuracy of this method is verified.
Relay protection calibration apparatus is used to detect whether the Relay protection instrument satisfy their performance index. This article introduces the high-speed data acquisition system based on ADS930, propose...
详细信息
Relay protection calibration apparatus is used to detect whether the Relay protection instrument satisfy their performance index. This article introduces the high-speed data acquisition system based on ADS930, proposes the interpolation algorithm aims to improve test accuracy in signal processing. It describes the method of filter smoothing to remove interference. Results illustrate the technique is correct and practical. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
This paper establishes a three-axis arithmetic model for indexable insert grinding using tangential point tracing method. The interpolation algorithm for grinding is derived. algorithm is simulated to verify the feasi...
详细信息
ISBN:
(纸本)9781538635247
This paper establishes a three-axis arithmetic model for indexable insert grinding using tangential point tracing method. The interpolation algorithm for grinding is derived. algorithm is simulated to verify the feasibility by simulating with MATLAB and OpenGL software.
A serious trouble of virtual bicycle ride has to be faced currently, that is the visual information of scene motion perceived by riders doesn't synchronize with the proprioceptive information of actual ride. This ...
详细信息
ISBN:
(纸本)9781728147659
A serious trouble of virtual bicycle ride has to be faced currently, that is the visual information of scene motion perceived by riders doesn't synchronize with the proprioceptive information of actual ride. This phenomenon makes riders deeply depressing in immersion and interaction. This paper proposes three different interpolation algorithms of Catmull-Rom curve to evaluate the consistency of visual and proprioceptive perceptions for virtual bicycle ride. Experimental results show that the real-time interpolation algorithm of Catmull-Rom curve shall help to match visual and proprioceptive perceptions, and improve the immersion and interaction of virtual bicycle ride.
It is well known that the security of a given steganographic algorithm strongly depends on the statistical properties of the cover source. In this paper, we study how downsampling affects steganographic security. The ...
详细信息
ISBN:
(纸本)9781479903566
It is well known that the security of a given steganographic algorithm strongly depends on the statistical properties of the cover source. In this paper, we study how downsampling affects steganographic security. The secure payload no longer scales according to the square-root law because resizing changes the statistical properties of the cover source. We demonstrate this experimentally for various types of resizing algorithms and their settings and thoroughly interpret the results. Modeling digital images as Markov chains allows us to compute the Fisher information rate for the simplest resizing algorithm with the box kernel and derive the proper scaling of the secure payload with resizing. The theory fits experimental data, which indicates the existence of a new scaling law expressing the length of secure payload when the cover length is not modified by adding or removing pixels but, instead, by subsampling. Since both steganography and steganalysis is today commonly evaluated through controlled experiments on resized images (e. g., the BOSSbase), the effect of resizing on security is of utmost importance to practitioners.
This paper presents a novel time-optimal trajectory planning method based on particle swarm optimization. The method can generate smooth trajectories in joint space, satisfying position and velocity boundary condition...
详细信息
ISBN:
(纸本)9781479983896
This paper presents a novel time-optimal trajectory planning method based on particle swarm optimization. The method can generate smooth trajectories in joint space, satisfying position and velocity boundary conditions at start-point and endpoint with high precision. After D-H parameters of the industrial robot were acknowledged, the algorithm was applied on the robot.
In this paper, we put forward a computationally efficient algorithm to estimate the frequency and complex amplitude of a real sinusoidal signal in additive Gaussian noise. The novel method extends an iterative frequen...
详细信息
ISBN:
(纸本)9780992862633
In this paper, we put forward a computationally efficient algorithm to estimate the frequency and complex amplitude of a real sinusoidal signal in additive Gaussian noise. The novel method extends an iterative frequency estimator for single complex exponentials that is based on interpolation on Fourier coefficients to the real case by incorporating an iterative leakage subtraction strategy. Simulation results are presented to verify that the proposed algorithm can obtain more accurate estimation than both time and frequency domain parameter estimators in the literature, and the estimation variance of the method sits on the Cramer-Rao lower bound with only a few iterations required.
The present main problems are that volume list of oil tank are not exact commonly and volume of oil tank can't be probed visually. Aiming at domestic gas stations' status, the gas station automation management...
详细信息
ISBN:
(纸本)9780769536798
The present main problems are that volume list of oil tank are not exact commonly and volume of oil tank can't be probed visually. Aiming at domestic gas stations' status, the gas station automation management system is established based on neural networks. This paper puts forward the method of using linear interpolation algorithm to calculate the volume of oil tank at real time. It has improved the calculating accuracy greatly and can monitor administrant at real-time to make correct judgments electronic.
暂无评论