The performance of a cellular phone commercial helical antenna at 900~MHz band, both in free space and in the presence of a human head phantom was studied. Numerical simulation of the phone model for the latter case h...
The performance of a cellular phone commercial helical antenna at 900~MHz band, both in free space and in the presence of a human head phantom was studied. Numerical simulation of the phone model for the latter case has been performed giving 3D radiation diagrams. The effect of the phantom head on radiation diagrams is presented. The relative amount of the EM power absorbed in the head was obtained for several distances of the phone. Measurements were carried out in a RF anechoic chamber using standard horn antennas and a calibrated measuring system. Absolute radiation patterns of the antenna gain were obtained in the three principal planes. Significant reduction of the absorbed power could be achieved just by moving the phone 1 cm away from the head.
This paper presents a laboratory method that can be used to determine the intrinsic value of the equivalent series resistance (ESR) of electrolytic capacitors. One of the most critical problems of switch mode DC-DC co...
详细信息
This paper presents an experimental technique that allows the determination of the equivalent circuit of an aluminium electrolytic capacitor. The impedance of these electrolytic capacitors changes with frequency, beco...
详细信息
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We propose Backward-Chaining Rule Induction (BCRI) as a semi-supervised mechanism for b...
详细信息
Projective homography sits at the heart of many problems in image registration. In addition to many methods for estimating the homography parameters (R.I. Hartley and A. Zisserman, 2000), analytical expressions to ass...
详细信息
Projective homography sits at the heart of many problems in image registration. In addition to many methods for estimating the homography parameters (R.I. Hartley and A. Zisserman, 2000), analytical expressions to assess the accuracy of the transformation parameters have been proposed (A. Criminisi et al., 1999). We show that these expressions provide less accurate bounds than those based on the earlier results of Weng et al. (1989). The discrepancy becomes more critical in applications involving the integration of frame-to-frame homographies and their uncertainties, as in the reconstruction of terrain mosaics and the camera trajectory from flyover imagery. We demonstrate these issues through selected examples.
In order for e-government to be successful there is a strong requirement for approaches that are based on widely accepted technical standards and formal design methods. In this paper, we describe the architecture of t...
详细信息
In order for e-government to be successful there is a strong requirement for approaches that are based on widely accepted technical standards and formal design methods. In this paper, we describe the architecture of the eMayor platform, a Web services based platform that is built as a holistic service framework for the deployment and delivery of e-government enterprise services for European municipalities. The design of the platform is based on the ISO/RM-ODP standard. The goal of the paper is to present both a general architectural overview of the platform and its services, along with the engineering and technology aspects of the architecture as instances of the engineering and technology viewpoints of the RM-ODP standard.
This paper presents a recurrent filter that performs real-time separation of discontinuous adventitious sounds from vesicular sounds. The filter uses two dynamic fuzzy neural networks, operating in parallel, to perfor...
详细信息
This paper presents a recurrent filter that performs real-time separation of discontinuous adventitious sounds from vesicular sounds. The filter uses two dynamic fuzzy neural networks, operating in parallel, to perform the task of separation of the lung sounds, obtained from patients with pulmonary pathology. Extensive experimental results, including fine/coarse crackles and squawks, are given, and a performance comparison with a series of other models is conducted, underlining the separation capabilities of the proposed filter and its improved performance with respect to its competing rivals.
This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a "noi...
详细信息
This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a "noise-like region" or an "informative region" by means of the binary-image feature called complexity and replaces noisy blocks with the binary patterns mapped from the bit sequences of secret data. The binary patterns must be complex because it is replacing complex regions. If the binary patterns to be inserted are simple, then the logical operation called conjugate operation is applied that transforms a simple pattern to a complex pattern. We need to keep, for each block, the flag called a conjugation flag representing whether or not conjugation had been applied to correctly extract the embedded information. In the case where the conjugation flags must be embedded within cover images, we are unable to use the complexity thresholding for the embedding of the flags. Thus the flags must be embedded into a fixed area. To this effect it is easy to recognize unnatural patterns on the LSB plane of stego-images. It can be used as a signature or a distinguishing mark between natural images and images with information embedded by BPCS. We propose secure BPCS which is robust against the visual attack. It is realized by assigning the meaning of the conjugation flag to a pixel of each block and making the specific rule to embed and extract it
In this paper, we discuss edge detection by first using a clustering algorithm followed by a known edge detection filter such as Canny or generalized edge detector (GED). We developed a new clustering method called Se...
详细信息
In this paper, we discuss edge detection by first using a clustering algorithm followed by a known edge detection filter such as Canny or generalized edge detector (GED). We developed a new clustering method called Self-Organizing Global Ranking (SOGR). Comparative results with multispectral satellite images including SOGR, SOM and K Means clustering methods are discussed. The results show that the two-stage algorithms are better than single stage edge detector algorithms.
In this paper we present a new computational technique to investigate wave phenomena and EMC/EMI interactions in high speed transmission lines and interconnects on the chip level. The proposed time-domain method is ba...
详细信息
In this paper we present a new computational technique to investigate wave phenomena and EMC/EMI interactions in high speed transmission lines and interconnects on the chip level. The proposed time-domain method is based on the very different nature of the electromagnetic problem in the conductors and semiconductors, compared to the insulating media that separate conducting regions and fill the intermediate volume. Therefore, the purely static problem in the regions filled with silicon oxide is totally separated from the diffusion problem in the conducting regions. The latter one is solved by means of a simple and efficient DuFort-Frankel technique using finite differences, while the static problem is dealt with by means of a finite element method with coarse meshing, since outside the conductors the field variations are much less intense. In each time step, the problems in the two regions are appropriately coupled by means of proper interface conditions.
暂无评论