In Decode-and-Forward (DF) cooperative communication, cooperative nodes decode and retransmit each others' data to achieve spatial diversity. However, asymmetric inter nodes channel can cut down the performance of...
详细信息
ISBN:
(纸本)9780769535012
In Decode-and-Forward (DF) cooperative communication, cooperative nodes decode and retransmit each others' data to achieve spatial diversity. However, asymmetric inter nodes channel can cut down the performance of plain DF;and besides, simple signal retransmission for each other in plain DF is not an efficient diversity manner. In this paper, we propose a new DF cooperative scheme based on signal-space diversity, which can defeat the effect of asymmetric inter nodes channel and utilize diversity more efficiently. Compared with plain DF cooperative scheme, the new cooperative scheme only adds, a rotation and superposition operation on local and relay symbols before relaying, which only introduce a little more complexity at cooperation nodes. Simulation results show the new cooperative scheme achieves better bit-error rate performance than the plain DF cooperative scheme.
In the content-based image retrieval systems such images what are similar to a given image can be retrieved, that consist some features or of the whole image, either of the homogeneous connected regions of the image. ...
详细信息
ISBN:
(纸本)9781424438013
In the content-based image retrieval systems such images what are similar to a given image can be retrieved, that consist some features or of the whole image, either of the homogeneous connected regions of the image. If the creation of the applied feature vectors is made by the homogeneous connected regions, then there is a great significance of the determination process of the objects. In this paper a segmentation algorithm is presented which uses automated parameter detemination, and a color histogram based similiraty measure is defined between images comprised color regions generated on the above-mentioned way. The test results prove the applied procedures are suitable for a the solution of the formulated task.
Driver fatigue is a key factor of accident. Recently, there is a system using RFID combined with a wireless accelerometer sensor module used for doze detector has become an important issue. It is because that about te...
详细信息
ISBN:
(纸本)9781424438822
Driver fatigue is a key factor of accident. Recently, there is a system using RFID combined with a wireless accelerometer sensor module used for doze detector has become an important issue. It is because that about ten percent of the dead drivers were caused by tired driving. The goal of this study was to develop the feasibility of a doze detector. In this work, we develop a brand new system which was a blood pressure detector sensor combing RFID's Tag to get a series data for doze alarm. We present that the blood pressure and heartbeat were used to monitor the driver's spirit state is the best method for doze alarm. In this study, we use the palpitation, the pulse sensory element, by with the wireless radio frequency label's union, obtains a series of body principle signal the data, develops a set of feasible against sleepy warning system. Because palpitation in sleep period has the periodic change, this article the analysis human body puts in order by standard distance method of difference (SDNN) under the mental murky condition, the system would start the warmer system and try to awaken the driver.
The research proposes an approach of story segmentation for news video using multimodal analysis. The approach detects the topic-caption frames, and integrates them with silence clips detection, as well as shot segmen...
详细信息
ISBN:
(纸本)9780769536156
The research proposes an approach of story segmentation for news video using multimodal analysis. The approach detects the topic-caption frames, and integrates them with silence clips detection, as well as shot segmentation to locate news story boundaries. On test data with 135,400 frames, the accuracy rate 87.9% and the recall rate 98.7% are obtained. The experimental results show the approach is valid and robust.
On the basis of analyzing the safety formulas for various types of vulnerabilities, this paper presents a novel method for software vulnerability, testing, which uses source-code conversion and the state of software. ...
详细信息
ISBN:
(纸本)9780769535012
On the basis of analyzing the safety formulas for various types of vulnerabilities, this paper presents a novel method for software vulnerability, testing, which uses source-code conversion and the state of software. of function-call to test the vulnerability of software. This method could cover a variety of vulnerabilities. The implementation shows that it can check the attack of buffer overflow accurately, on the occasions of no large losses in performance.
Code cloning is not only assumed to inflate maintenance costs but also considered defet-prone as inconsistent changes to code duplicates can lead to unexpected behavior Consequently, the identification of duplicated c...
详细信息
ISBN:
(纸本)9781424434527
Code cloning is not only assumed to inflate maintenance costs but also considered defet-prone as inconsistent changes to code duplicates can lead to unexpected behavior Consequently, the identification of duplicated code, clone detection, has, been a very active area of research in recent years. Up to now, however, no substantial investigation of the consequences of code cloning on program correctness has been carried out. To remedy this shortcoming, this paper presents the results of a large-scale case study that was undertaken to find out if inconsistent changes to cloned code can indicate faults. For the analyzed commercial and open source systems we not only found that inconsistent changes to clones are very frequent but also identified a significant number of faults induced by such changes. The clone detection tool used in the case study implements a novel algorithm for the detection of inconsistent clones. It is available as open source to enable other researchers to use it as basis for further investigations.
This paper describes a fault diagnosis method applied to a real multitooth machine tool. Several statistical alternatives are used to diagnose the different faults that may appear such as insert breakage within multit...
详细信息
This paper describes a fault diagnosis method applied to a real multitooth machine tool. Several statistical alternatives are used to diagnose the different faults that may appear such as insert breakage within multitooth tools. These complex tools are used for mass production of pieces in car industry, and the described application has been applied into different kinds of machining operations and cutting conditions.
Recently, Tsai presented an efficient algorithm which uses the ratio value of the hue over the intensity to construct the ratio map for detecting shadows of color aerial images. Instead of only using the global thresh...
详细信息
Recently, Tsai presented an efficient algorithm which uses the ratio value of the hue over the intensity to construct the ratio map for detecting shadows of color aerial images. Instead of only using the global thresholding process in Tsai's algorithm, this paper presents a novel successive thresholding scheme (STS) to detect shadows more accurately. In our proposed STS, the modified ratio map, which is obtained by applying the exponential function to the ratio map proposed by Tsai, is presented to stretch the gap between the ratio values of shadow and nonshadow pixels. By performing the global thresholding process on the modified ratio map, a coarse-shadow map is constructed to classify the input color aerial image into the candidate shadow pixels and the nonshadow pixels. In order to detect the true shadow pixels from the candidate shadow pixels, the connected component process is first applied to the candidate shadow pixels for grouping the candidate shadow regions. For each candidate shadow region, the local thresholding process is performed iteratively to extract the true shadow pixels from the candidate shadow region. Finally, for the remaining candidate shadow regions, a fine-shadow determination process is applied to identify whether each remaining candidate shadow pixel is the true shadow pixel or not. Under six testing images, experimental results show that, for the first three testing images, both Tsai's and our proposed algorithms have better detection performance than that of the algorithm of Huang et al., and the shadow detection accuracy of our proposed STS-based algorithm is comparable to Tsai's algorithm. For the other three testing images, which contain some low brightness objects, our proposed algorithm has better shadow detection accuracy when compared with the previous two shadow detection algorithms proposed by Huang et al. and Tsai.
Abstract We present a vision based system for the advanced recognition of danger situation for safety control. The sequence of the images from two cameras located above the robot is presented to the system in order to...
详细信息
Abstract We present a vision based system for the advanced recognition of danger situation for safety control. The sequence of the images from two cameras located above the robot is presented to the system in order to detect a new object appearing in dangerous zone, near the robot arm. Presented safety system was developed for human-robot cooperative system, in which the machine region and the human region cannot be separated due to the overlap and the movement both from human and from machines. Experiments conducted using low quality images indicate that our system can work in a real time and detect successively dangerous situations in the presence of high level of noise and for wide range of illumination level.
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important r...
详细信息
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important role in information security (IS) area. In this paper, a linguistic steganography detecting algorithm using statistical language model (SLM) is presented. An experiment to detect text segments generated by linguistic steganography systems NICETEXT, TEXTO and Markov-chain-based is carried out. The result of our experiment shows when the text segment size is 2K and 5K, the detecting accuracies are found to be 93.9% and 96.3% respectively.
暂无评论