A nonminimum-phase channel can always be decomposed into a minimum-phase part and an all-pass part. In our approach, called all-pass CMA, the dimensionality of the CMA algorithm has been reduced to improve blind equal...
详细信息
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar...
详细信息
Mobile phones allow us to reach people anywhere, at anytime. In addition to the benefits for end users, researchers and developers can also benefit from the powerful devices that participants carry on a daily basis. C...
详细信息
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to m...
详细信息
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to minimize the computational complexity required in wireless sEMG electrodes while providing higher filtering performance than when with standard means. Using semi-artificially prepared signals, we show that the discrete wavelet transform (DWT) enables a partial separation between the sEMG and ECG signals in time domain. Then, only the highly overlapped parts are fed into an adaptive noise cancellation (ANC) structure for lower computational complexity filtering. The simulation results confirm the improved noise rejection and the gain in computational complexity obtained with the proposed method.
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti...
详细信息
This paper presents a novel image denoising framework using overcomplete topographic model. To adapt to the statistics of natural images, we impose sparseness constraints on the denoising model. Based on the overcompl...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of came...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of camera equipment, image motion blur caused by camera motion often happens. Camera motion during exposure will produce a blurred image, this kind of blur is often non-liner mode. Motion blur always causes the decline of image quality, as long as the users using the hand-held photography equipment often have a similar experience. Based on this reason, reconstructing a clear image from blurred image is the main objective in this paper. Reconstruction is an ill-pose problem. In current motion blur estimation algorithms, these algorithms usually use the recursive method to estimate motion blur kernel. However, recursive process is quite time-consuming. In order to enhance time-consuming, in this paper, based on iterative phase retrieval algorithm and normalized sparsity measure, we propose a fast and effective blur kernel retrieval algorithm, which can find the best kernel in a short time. Experiments verify that our method can effectively reduce the execution time and obtain the best motion blur kernel to deblur a deblurred image and keep the quality of image deblurring.
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ...
详细信息
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time fo...
详细信息
ISBN:
(纸本)9781467352185
Large open and closed source organizations like Google, Facebook and Mozilla are migrating their products towards rapid releases. While this allows faster time-to-market and user feedback, it also implies less time for testing and bug fixing. Since initial research results indeed show that rapid releases fix proportionally less reported bugs than traditional releases, this paper investigates the changes in software testing effort after moving to rapid releases. We analyze the results of 312,502 execution runs of the 1,547 mostly manual system level test cases of Mozilla Fire fox from 2006 to 2012 (5 major traditional and 9 major rapid releases), and triangulated our findings with a Mozilla QA engineer. In rapid releases, testing has a narrower scope that enables deeper investigation of the features and regressions with the highest risk, while traditional releases run the whole test suite. Furthermore, rapid releases make it more difficult to build a large testing community, forcing Mozilla to increase contractor resources in order to sustain testing for rapid releases.
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of...
详细信息
ISBN:
(纸本)9789898565693
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of service (Dos) and man-in-the-middle attack. Host Identity Protocol (HIP) is also a security protocol that defines host identifiers for naming the endpoints and performs authentication and creation of IPsec security associations between them bound to identifiers. The purpose of HIP is to support trust systems, enhance mobility and greatly reduce the Denial of Service (Dos) attacks. We focus on an extension to IKEv2 in order to enhance authentication, eliminate man-in-the-middle attack and guarantee denial of service to provide better security between the two peers. In this paper, we describe our proposal that consists of combining the IKEv2 with the HIP to set up a security association based on two parameters which are location and Identity. This combination can provide better security properties than each protocol used alone. This scheme, named (HIP-IKEv2) couples location and identity to define a security association between two peers. We have used the Automated Validation of Internet Security Protocols and Applications (AVISPA) and its Security Protocol Animator (SPAN), and two powerful automated tools in order to formally specify and validate the HIP-IKEv2 protocol.
暂无评论