The present wireless communication system under coal mines is characterized by single pattern, fixed communication frequency, incapability of adaptive to various tunnel environments. To solve the above problems, cogni...
详细信息
The present wireless communication system under coal mines is characterized by single pattern, fixed communication frequency, incapability of adaptive to various tunnel environments. To solve the above problems, cognitive radio (CR) is applied to the system. This paper focuses on the application of energy detection algorithms used in the spectrum sensing of various tunnels under mines. The detection probability of Rayleigh channel and Rician channel is analyzed, and the feedback joint detection algorithm based on the tunnel environment is put forward. The simulation shows that the probability of cooperative sensing system obviously rises with the method of self adaptive through feedback information to adjust the node weight.
With the development of communication technology, digital watermarking is widely used in copyright protection and the algorithms are more and more sophisticated. A new digital watermarking algorithm used for copyright...
详细信息
With the development of communication technology, digital watermarking is widely used in copyright protection and the algorithms are more and more sophisticated. A new digital watermarking algorithm used for copyright protection is proposed in this paper, and it is realized by DSP. First, the original image is blocked, and the integer lifting wavelet transform is carried out for each blocked image; then the direct sequence spread spectrum is done to the watermark sequence by using the spreading codes which are generated through the chaotic system, and the spread spectrum watermark is embedded in the high-frequency sub-bands; Finally, the watermarked image is obtained through the block inverse wavelet transform. Watermark detection process does not require the original image; it is a blind detection algorithm. The algorithm can resist to random noise, filtering, compression, shearing, sample and other attacks. The DSP realization can better process the watermark embedding and detection, and can meet the requirements of general application. It has the features such as high computing speed, high algorithm efficiency and strong practicality and so on.
In order to provide personalized services in an intelligent digital TV (DTV), a fast and robust viewer detection algorithm is essential. However, conventional face detection algorithms are too costly or not robust for...
详细信息
In order to provide personalized services in an intelligent digital TV (DTV), a fast and robust viewer detection algorithm is essential. However, conventional face detection algorithms are too costly or not robust for consumer use. Thus, in this paper, we propose a novel viewer detection algorithm for real-time viewer identification in the intelligent DTV. In the proposed algorithm, a viewer is detected by using our proposed modified codebook (MCB) method, and then the face region is extracted by using the normalized horizontal and vertical histogram from the detected person. Experimental results show that the proposed algorithm successfully performs at the speed of 20~25fps, which is suitable for real-time applications in the intelligent DTV.
In digital photography Red eye is caused mainly under low light conditions when a flash is used for capturing the image. Many of the commercial solutions that are available in the market require some user intervention...
详细信息
In digital photography Red eye is caused mainly under low light conditions when a flash is used for capturing the image. Many of the commercial solutions that are available in the market require some user intervention. In this paper we present a method, which detects the presence of red eyes in Images without any user intervention and corrects it. The automatic solution is based on GMM (Gaussian Mixture Model) classifiers for the detection stage. The proposed method corrected about 81% of the red eye artifacts in a test image database of 500 images, resulting in very few wrong corrections. The computational complexity of running this algorithm on a consumer electronics device such as a digital camera or a mobile phone is also very less.
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being ful...
详细信息
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being fully automated makes their behavior repetitious and predictable. This article presents a survey and comparison of Internet worm detection and containment schemes. We first identify worm characteristics through their behavior, and then classify worm detection algorithms based on the parameters used in the algorithms. Furthermore, we analyze and compare different detection algorithms with reference to the worm characteristics by identifying the type of worms that can and cannot be detected by these schemes. After detecting the existence of worms, the next step is to contain them. This article explores the current methods used to slow down or stop the spread of worms. The locations to implement detection and containment, as well as the scope of each of these systems/methods, are also explored in depth. Finally, this article points out the remaining challenges of worm detection and future research directions.
A novel parallel iterative cycle OR decomposition detection algorithm in VBLAST-OFDM system is proposed in this paper. In order to overcome the disadvantage of the poor performance of the first defected layer in IQRD ...
详细信息
ISBN:
(纸本)9781424425105
A novel parallel iterative cycle OR decomposition detection algorithm in VBLAST-OFDM system is proposed in this paper. In order to overcome the disadvantage of the poor performance of the first defected layer in IQRD algorithm, the parallel detection is applied to the IQRD algorithm and the performance is improved effectively. Simulation results show that the proposed P-IQRD algorithm is superior to the IQRD algorithm.
An algorithm named PTBBWD is presented to detect worms. It is process traffic behavior based and has considered three important behaviors: total amount of source ports in wormlike traffic, changing frequency of source...
详细信息
ISBN:
(纸本)9780769534800
An algorithm named PTBBWD is presented to detect worms. It is process traffic behavior based and has considered three important behaviors: total amount of source ports in wormlike traffic, changing frequency of source ports in wormlike process traffic and the wormlike traffic proportion of the total process traffic. Unlike similar work before, PTBBWD checks the frequency and the total amount of source ports only when a process is sending wormlike traffic. Experiments using applications in the wild show that PTBBWD can detect worms quickly and correctly with small false positives.
ISO/IEC 24753 defines new modem specifications for long-range RFID communications and application protocol for sensor tag system. According to the ISO/IEC 24753, the frequency offset of the tag is 4%. In this paper, w...
详细信息
ISO/IEC 24753 defines new modem specifications for long-range RFID communications and application protocol for sensor tag system. According to the ISO/IEC 24753, the frequency offset of the tag is 4%. In this paper, we designed a non-coherent receiver structure to solve the frequency offset problem. A frequency estimation block was designed to mitigate the effects of 4% frequency offset and a start frame delimiter (SFD) detection algorithm was proposed to determine the start position of the payload. We implemented a long-range RFID reader with the proposed methods and evaluated its performance in a wired network. The implemented long-range RFID reader showed more superior performance than the commercial RFID reader.
Characteristics of surface defects of hot rolled steel plates were analyzed, and an algorithm for detection of hot rolled steel plates was developed Based on undecimated wavelet transform and mathematical morphology, ...
详细信息
ISBN:
(纸本)9780769531199
Characteristics of surface defects of hot rolled steel plates were analyzed, and an algorithm for detection of hot rolled steel plates was developed Based on undecimated wavelet transform and mathematical morphology, the algorithm can solve the problem of false alarms by scales and water marks. Positions of defects were determined by modular maximum of interscale correlation of wavelet coefficient at first, and then the defects were classified with priori knowledge about characteristic of surface defects on hot rolled steel plates. Experimental results shows that the algorithm is not sensitive to disturbance of scales, water marks and uneven illumination, and the recognition rate of defects is zip to 90.23%.
To store and retrieve large-scale video data sets effectively, the process of wipe detection is an essential step. In this paper, we propose a wipe scene-change detection algorithm based on Visual Rhythm Spectrum (VRS...
详细信息
To store and retrieve large-scale video data sets effectively, the process of wipe detection is an essential step. In this paper, we propose a wipe scene-change detection algorithm based on Visual Rhythm Spectrum (VRS). The VRS contains distinctive patterns or visual features for wipe effects. During a wipe, intensity change between incoming and the outgoing shots gives rise to abrupt intensity discontinuities on the VRS. The proposed algorithm is designed to detect such discontinuities.
暂无评论