X-band for Earth Observation (EO) is becoming very congested and this aspect induced the International Telecommunication Union (ITU) to reorganize the frequency allocations in use. The allocation of the 26-GHz band (i...
详细信息
X-band for Earth Observation (EO) is becoming very congested and this aspect induced the International Telecommunication Union (ITU) to reorganize the frequency allocations in use. The allocation of the 26-GHz band (i.e. 25.5 to 27 GHz) for the downlink, available for the first time for EO applications, allows for collecting a large amount of data. However, considering that several EO missions fly along polar orbits, a ground station (GS) installed at polar latitudes, where high-speed winds, low temperatures and precipitations particularly austere are normal, is fundamental to exploit all the satellite passages. For this reason, the use of radome structures to protect the GS against the environmental conditions is mandatory. This paper addresses the exploitation of the 26-GHz band for future EO satellites, namely the NASA/NOAA JPSS-1 satellite and the EUMETSAT Metop-SG satellite, with specific regard to the RF analysis, of European Space Agency (ESA) GS to be installed in Svalbard. In particular, since the use of the 26-GHz band for GSs located at polar latitudes is a complete novelty, special attention is paid to the G/T analysis and the radome performance.
To assist home care for the elderly, we've finished a smart walker in previous study, with the features including destination track navigation, obstacle detection, self-positioning, follow-up, and wireless inducti...
详细信息
To assist home care for the elderly, we've finished a smart walker in previous study, with the features including destination track navigation, obstacle detection, self-positioning, follow-up, and wireless inductive charging. In this study, we further finish the user's intention detection function on the smart walker to control the smart walker. We install 3 pressure sensors on both sides of smart walker handles respectively to extract the user's force application, which are taken as input signal. Through AdaBoost classifier, it finishes input signal recognition and controls of the smart walker moving forward/backward directly. The user doesn't need to press the switch or click on the panel, but apply force on the handle directly, which makes the operation easier. The experiment validates that the accuracy can achieve higher than 98%, which can simplify the operation effectively and achieve the practical purpose.
In this paper, we propose a secure mutual trust scheme based on the concept of chameleon hash function, for wireless sensor networks (WSNs). In the proposed scheme, the base station (BS), holding two common secrets, i...
详细信息
ISBN:
(纸本)9781509014132
In this paper, we propose a secure mutual trust scheme based on the concept of chameleon hash function, for wireless sensor networks (WSNs). In the proposed scheme, the base station (BS), holding two common secrets, issues an identity to every dep.oyed sensor node. An identity contains a public data and a private key. The public data is used to present a node, and the private key is used to make mutual trust keys with other node's public data. A public data can be used in verifying the legitimacy of the node. The mutual trust key is the evidence that a node owns the related public data. At any time, or after finding malicious nodes or dep.oying new nodes, BS will broadcast new group key to all sensor nodes by multiple hopping. Following the group key broadcasting and rebroadcasting, the still-legal nodes can set new information in their public data, private key, hop counters, public parameters, and neighbor nodes set, which contains the public data and hop counter of its neighboring nodes. Based on the new information, a sensor node can make the mutual trust keys with its neighboring nodes to do message authentication and secure communicating, or to set up a secure path to forward the sensed information to BS by multiple relaying. The security analysis shows that the proposed scheme can revoke the right of malicious sensor nodes, dep.oy new sensor nodes, and work well under malicious attacking. As the result of performance comparison, the proposed secure scheme is superior to the related works.
The great amount of data managed by Big Data technologies have to be correctly assured in order to protect critical enterprise and personal information. Nevertheless, current security solutions for Big Data technologi...
详细信息
Field tests of digital terrestrial multimedia broadcasting system RAVIS have been held in 2017-2018 in two test zones in Russian Federation - Kazan city (Tatarstan Republic) and Izhevsk city (Udmurtia Republic). Fixed...
详细信息
ISBN:
(纸本)9781728104331
Field tests of digital terrestrial multimedia broadcasting system RAVIS have been held in 2017-2018 in two test zones in Russian Federation - Kazan city (Tatarstan Republic) and Izhevsk city (Udmurtia Republic). Fixed and mobile reception were tested. New services of digital broadcasting were demonstrated.
This paper is dedicated to the research and development of quantization methods for wavelet-based video codec. Uniform, nonlinear quantization method and their potential applications for wavelet-based video codec Dira...
详细信息
ISBN:
(纸本)9781728104331
This paper is dedicated to the research and development of quantization methods for wavelet-based video codec. Uniform, nonlinear quantization method and their potential applications for wavelet-based video codec Dirac have been investigated. The optimized quantization method for wavelet-based video codec have been proposed based on analysis of the processing results for various video types using quantization methods mentioned above. The processing results for various types of video show that the proposed method provides up to 4.2% bitrate saving for low distortion level in the intra-frame coding mode, up to 9.8% bitrate reduction for low distortion level and up to 11.2% bitrate saving for medium (acceptable) distortion level in the inter-frame coding mode compared to the uniform quantization method implemented in video codec Dirac.
In our previous work, we presented new reconfigurable underwater sensor network architectures that minimize both the end-to-end delay and the power consumption of the network [1]. The idea was to have dynamic architec...
详细信息
In our previous work, we presented new reconfigurable underwater sensor network architectures that minimize both the end-to-end delay and the power consumption of the network [1]. The idea was to have dynamic architectures configured on the basis of the network parameters (such as data rate, central processing node capabilities, gathering node capabilities, and water dep.h). These architectures ignore real-time constraints, but they achieve the best performance in terms of the end-to-end delay and the power consumption. In this paper, we extended our research results and designed new underwater embedded system architectures that satisfy real-time constraints.
Discrete wavelet transform (DWT) have found a practical use in multiple applications of digital signal processing including image compression. Despite a set of advantages, DWT is still weakly used in modern video comp...
详细信息
Genetic programming techniques allow flexibility in the optimization process, making it possible to use them in different areas of knowledge and providing new ways for specialists to advance in their areas more quickl...
详细信息
Genetic programming techniques allow flexibility in the optimization process, making it possible to use them in different areas of knowledge and providing new ways for specialists to advance in their areas more quickly and more accurately. This work presents a preliminary analysis of a new method using multi-gene genetic programming to multimodal numerical optimization. The new algorithm uses some niching techniques based on the clear procedure to maintain the population diversity, in order to perform a multivariate mapping among initial guesses to optimal parameters for a system. We used a multi-modal benchmark set with different characteristics and difficulty levels to evaluate this new algorithm. Statistical analysis suggested that this new multi-modal method using multi-gene genetic programming can be used for problems that requires more than a single solution.
This paper introduces a fully recursive perceptron network (FRPN) architecture as an alternative to multilayer perceptron (MLP) with multiple hidden layers networks, popularly known as deep neural networks. The FRPN c...
详细信息
This paper introduces a fully recursive perceptron network (FRPN) architecture as an alternative to multilayer perceptron (MLP) with multiple hidden layers networks, popularly known as deep neural networks. The FRPN consists of an input layer, an output layer, and only one hidden layer in which the hidden layer neurons are fully connected with algebraic (instantaneous) connections, and not delayed connections. The FRPN is particularly attractive as an alternative to deep MLP since the FRPN eliminates the need of obtaining the number of hidden layers and the number of neurons per hidden layer. Some insight into the operational mechanisms of the FRPN is obtained through an application to a practical learning problem, viz., the handwritten digit recognition problem.
暂无评论