IEEE 802.16e standard for mobile Worldwide Interoperability for Microwave Access (WiMAX), defines the implementation of hard handover. The standard covers the physical and MAC layer. To apply the layer 3 (L3) handover...
详细信息
ISBN:
(纸本)9781424455324
IEEE 802.16e standard for mobile Worldwide Interoperability for Microwave Access (WiMAX), defines the implementation of hard handover. The standard covers the physical and MAC layer. To apply the layer 3 (L3) handover protocol over the existing IEEE 802.16e layer 2 (L2) handover scheme, the fast mobile IPv6 was used by many researches, but long latency is main challenge for real-time applications. In this paper, to solve latency problem, an integrated scheme is proposed that it combines cross layer design and cross function optimization. The integrated scheme, bases on a pre-establish tunnels concept is dealt both, L2 handover in 802.16e and L3 handover in fast mobile IPv6 to effectively blend the relative messages of L2 and L3. The proposed scheme is compare with the scheme what standardized in IETF network working group (RFC5270). Analytic results prove that the proposed scheme can reduce not only handover latency but also packet losses.
Automatic speech recognition systems have the potential to make hard to understand speech more easily recognizable. Designing a system that recognizes impaired speech is more difficult than a system that recognizes no...
详细信息
ISBN:
(纸本)9789604741359
Automatic speech recognition systems have the potential to make hard to understand speech more easily recognizable. Designing a system that recognizes impaired speech is more difficult than a system that recognizes normal speech. The Automatic Malay Speech Recognition for Speech Disorder system is able to recognized impaired Malay words spoken by people who suffer from dysarthria, a motor speech disorder resulting from neuron damage, characterized by poor communication. It is developed using techniques used for normal speech recognition but modified to cater for the speech impairment. A feature extraction technique based on the Mel Frequency Cepstrum Coefficient (MFCC) is used along with artificial intelligent algorithms to recognize the speech. In addition, novel pre-processing steps are required to segment the speech prior to recognition taking into account the speech irregularities. The system requires that the user is registered with the system and the system is then trained to accommodate the user speech pattern. The outputs of the system are the visual display of the corrected words uttered or synthesized audio version of the corrected words.
Recently, electronic auctions have been receiving more and more attention in the world of electronic commerce. The security and efficiency of electronic auctions are becoming important. We shall propose a securely sea...
详细信息
Lattice-Reduction-Based detectors have been suggested for multiple input multiple output (MIMO) systems that offer full diversity, yet at the complexity of linear detectors. In this paper, the uplink of a combined OFD...
详细信息
A new transmission and detection technique namely Double Carrier Modulation/Differential Detection (DCM/Diff.D) for outdoor optical wireless (OW) is proposed. The technique employs two beams, one modulated with the da...
详细信息
This paper presents an architecture for context-aware Ubiquitous Robotics applications, where mobile robots cooperate with intelligent environments to fulfill their tasks. Specifically, the work is focused on distribu...
详细信息
This paper presents an architecture for context-aware Ubiquitous Robotics applications, where mobile robots cooperate with intelligent environments to fulfill their tasks. Specifically, the work is focused on distributed knowledge representation issues and context assessment strategies, and introduces a technique for on-line context recognition in highly dynamic environments. Experimental validation, performed in a civillian hospital building, is described and discussed.
In this paper, an improved hybrid fuzzy technique (Fuzzy Logic and Template matching) for Malaysian Automatic License Plate Recognition (M-ALPR) system is proposed. The system is proposed to reduce the program complex...
详细信息
In this paper, an improved hybrid fuzzy technique (Fuzzy Logic and Template matching) for Malaysian Automatic License Plate Recognition (M-ALPR) system is proposed. The system is proposed to reduce the program complexity of the existing M-ALPR system and to decrease the processing time of recognizing Malaysian license plates. First, the algorithm to recognize the license plates is presented, by taking advantage of Matlab and C++ programming language benefits in order to increase system efficiency. Feature extraction using vertical line counter is introduced in this system. Later, with the help of OpenCV, the hybrid fuzzy technique is developed using the C++ language. Then, the comparison between these two implementations on M-ALPR system was reported. The improved system was tested on 740 samples images from real scene and the results show that the proposed improvement supports the accurateness and high speed processing of M-ALPR system.
A method for detecting spikes and slow burst in photic evoked electroencephalogram (EEG) was proposed. The spikes were detected by combining methods of the morphological filter and the similarity coefficient in the ti...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, si...
详细信息
Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now playing an important role especially in application related to security issue. In this work, we present an approach to generate a unique and more secure cryptographic key from iris template. The iris images are processed to produce iris template or code to be utilized for the encryption and decryption tasks. AES cryptography algorithm are employed to encrypt and decrypt the identity data. Distance metric such as hamming distance and Euclidean distance are used for the template matching identification process. Experimental results show that this system can obtain a higher security with a low false rejection or false acceptance rate.
The Chirp-Scaling Algorithm (CSA) is one of the most widely used synthetic aperture radar (SAR) image reconstruction method. However, its applicability is limited to straight flight trajectories and monostatic SAR. We...
详细信息
暂无评论