The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video....
详细信息
ISBN:
(纸本)9780819495037
The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.
The error recovery problem in wireless sensor networks is studied from a generic resource-constrained energy-optimization perspective. To characterize the features of error recovery schemes that suit the majority of a...
详细信息
The error recovery problem in wireless sensor networks is studied from a generic resource-constrained energy-optimization perspective. To characterize the features of error recovery schemes that suit the majority of applications, an energy model is developed and inferences are drawn based on a suitable performance metric. For applications that require error control coding, an efficient scheme is proposed based on an interesting observation related to shortened Reed-Solomon (RS) codes for packet reliability. It is shown that multiple instances (gamma) of RS codes defined on a smaller alphabet combined with interleaving results in smaller resource usage, while the performance exceeds the benefits of a shortened RS code defined over a larger alphabet. In particular, the proposed scheme can have an error correction capability of up to gamma times larger than that of the conventional RS scheme without changing the rate of the code with much lower power, timing and memory requirements. Implementation results show that such a scheme is 43% more power efficient compared with the RS scheme with the same code rate. Besides, such an approach results in 46% faster computations and 53% reduction in memory requirements. Copyright (C) 2008 John Wiley & Sons, Ltd.
In this paper, we illustrate how to use simple LDPC codes to build a GPRAM prototype. We overview the GPRAM system and design principles. We then map the design into a problem. We demonstrate an experimental solution....
详细信息
ISBN:
(纸本)9781479900534;9781479900527
In this paper, we illustrate how to use simple LDPC codes to build a GPRAM prototype. We overview the GPRAM system and design principles. We then map the design into a problem. We demonstrate an experimental solution. We further introduce a switch function in the system, which will allow us to perform revision in code structures in GPRAM prototype in future. In this study many interesting features begin to merge and some of them may have bio-implication which needs to be further explored.
This paper describes site measurements and resulting images of buried objects made with the Earth Penetration Radar Imaging System (EPRIS) developed by Coleman Research Corporation (CRC). EPRIS makes use of frequency ...
详细信息
ISBN:
(纸本)0819415219
This paper describes site measurements and resulting images of buried objects made with the Earth Penetration Radar Imaging System (EPRIS) developed by Coleman Research Corporation (CRC). EPRIS makes use of frequency stepped radar technology and synthetic aperture imaging algorithms for nonintrusive characterization and imaging of buried objects, contamination, and geological or hydrological features. This paper is an extension or follow-up to CRC's EPRIS paper presented at last year's OE/AEROSPACE convention in Orlando, FL. It gives a brief description of the EPRIS system and contains the results from several DOE site surveys. These results include 2D and 3D images of buried test targets as well as images of actual buried waste and hydrological or geological features. The paper concludes with the recommendations or suggestions that should be followed up on future efforts.
In this paper, we describe a novel technique for vision based UAV (unmanned aerial vehicle) navigation. In this technique, the navigation (position estimation) problem is formulated as a tracking problem and solved by...
详细信息
ISBN:
(纸本)9780819477330
In this paper, we describe a novel technique for vision based UAV (unmanned aerial vehicle) navigation. In this technique, the navigation (position estimation) problem is formulated as a tracking problem and solved by a particle filter. The state and observation models of the particle filter are established based on a stereo analysis of the image sequence generated by the UAV's video camera in connection with a DEM (digital elevation map) of the area of the flight, which helps to control estimation error accumulation. The efficacy of this technique is demonstrated by simulation experimental results.
Stabilized cat qubits that possess biased noise channel with bit-flip errors exponentially smaller than phase-flip errors. Together with a set of bias-preserving (BP) gates, cat qubits are a promising candidate for re...
详细信息
ISBN:
(数字)9781510649026
ISBN:
(纸本)9781510649026;9781510649019
Stabilized cat qubits that possess biased noise channel with bit-flip errors exponentially smaller than phase-flip errors. Together with a set of bias-preserving (BP) gates, cat qubits are a promising candidate for realizing hardware efficient quantum error correction and fault-tolerant quantum computing. Compared to dissipatively stabilized cat qubits, the Kerr cat qubits can in principle support faster gate operations with higher gate fidelity, benefiting from the large energy gap that protects the code space. However, the leakage of the Kerr cats can increase the minor type of errors and compromise the noise bias. Both the fast implementation of gates and the interaction with environment can lead to such detrimental leakage if no sophisticated controls are applied. In this work, we introduce new fine-control techniques to overcome the above obstacles for Kerr cat qubits. To suppress the gate leakage, we use the derivative-based transition suppression technique to design derivative-based controls for the Kerr BP gates. We show that the fine-controlled gates can simultaneously have high gate fidelity and high noise bias and when applied to concatenated quantum error correction, can not only improve the logical error rate but also reduce resource overhead. To suppress the environment-induced leakage, we introduce colored single-photon dissipation, which can continuously cool the Kerr cats and suppress the minor errors while not enhancing the major errors.
In this paper, we examine the bit error rate (BER) performance of direct sequence spread spectrum (DS-SS) systems using the parity bit selected spreading technique. Suboptimum detection is done by determining which sp...
详细信息
ISBN:
(纸本)9781424419968
In this paper, we examine the bit error rate (BER) performance of direct sequence spread spectrum (DS-SS) systems using the parity bit selected spreading technique. Suboptimum detection is done by determining which spreading waveform is most likely used by the transmitter before attempting to detect the data. The bit error rate performance of such a system is dominated by the probability that the receiver incorrectly identifies the correct spreading sequence employed by the transmitter. We investigate the probability that, when the receiver does not correctly identify the correct spreading waveform as that used by the transmitter, it identifies the correct spreading waveform as the second most likely, third most likely etc. Based on these statistics, we propose a new detection algorithm that improves the BER performance by determining the two most likely employed spreading sequences to identify the transmitted information bits. The performance of this new technique is compared to maximum likelihood detection (MLD).
In this paper develop a novel, quantitative, rigorous and efficient method for risk minimization for control and decision under uncertainty. The crucial components of our approach include a rigorous, efficient risk ev...
详细信息
ISBN:
(数字)9781510636286
ISBN:
(纸本)9781510636286
In this paper develop a novel, quantitative, rigorous and efficient method for risk minimization for control and decision under uncertainty. The crucial components of our approach include a rigorous, efficient risk evaluation method and a stochastic optimization technique. The risk evaluation method is an adaptive Monte Carlo estimation method which is derived from the concept of relative entropy and truncated inverse binomial sampling. The stochastic optimization technique is built upon evolutionary computing methods such as genetic algorithms, where the fitness function is constructed from the adaptive Monte Carlo estimation method. The proposed method is applied to the design of controllers for uncertain systems, where the probability of performance violation is minimized.
A significant problem in the design and construction of an artificial neural network for function approximation is limiting the magnitude and variance of errors when the network is used in the field. Network errors ca...
详细信息
ISBN:
(纸本)0819412023
A significant problem in the design and construction of an artificial neural network for function approximation is limiting the magnitude and variance of errors when the network is used in the field. Network errors can occur when the training data does not faithfully represent the required function due to noise or low sampling rates, when the network's flexibility does not match the variability of the data, or when the input data to the resultant network is noisy. This paper reports on several experiments whose purpose was to rank the relative significance of these error sources and thereby find neural network design principles for limiting the magnitude and variance of network errors.
This paper presents a method of error control coding based on complementary convolutional codes. Complementary convolutional code is a block of convolutional codes and their complements. These code blocks are used to ...
详细信息
ISBN:
(纸本)9781728109275
This paper presents a method of error control coding based on complementary convolutional codes. Complementary convolutional code is a block of convolutional codes and their complements. These code blocks are used to map a block of data and design coded modulation schemes. It is shown that multiple codes can be used simultaneously to improve the coding gain, which leads to Shannon's capacity limit. BER performance analysis is presented to verify the concept.
暂无评论