The multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the cooperative communication techniques are widely applied in and significantly improved the essential performance...
详细信息
ISBN:
(纸本)9781450340366
The multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the cooperative communication techniques are widely applied in and significantly improved the essential performances of underwater acoustic (UWA) wireless networks in recent years. However, the challenge of reducing the computational complexity while guaranteeing performances of MIMO-OFDM based UWA wireless networks still remains to be resolved. In this paper, we propose a scheme for transmit antenna selection and relay selection to address this problem as follows. Using the channel station information feedback in the MIMO-OFDM based UWA cooperative communication channel, a single transmit antenna for each underwater sensor and one relay node which can maximize the total channel coefficient are selected to transmit data to the corresponding surface destination station, providing a balanced tradeoff between complexity and performance of the network.
In this paper, sliding mode approach is used to deal with the robust control of flat systems. Model of flat systems with disturbance and parametric uncertainty is established. A scheme to design sliding mode control l...
详细信息
ISBN:
(纸本)9781467386838
In this paper, sliding mode approach is used to deal with the robust control of flat systems. Model of flat systems with disturbance and parametric uncertainty is established. A scheme to design sliding mode control laws is proposed to guarantee the robustness of the systems. For the case that the bounds of disturbance and parametric uncertainty are unknown, adaptive controllers are designed to estimate the bounds or unknown parameters. The stability is proved with Lyapunov method. Simulations of a magnetic levitation system are given to illustrate the effectiveness of the approach.
Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Nowadays, palmprint identification is a novel and one of the most reliable ...
详细信息
Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Nowadays, palmprint identification is a novel and one of the most reliable biometrically based technology in applications of personal identification due to its highly stability and uniqueness. In this paper, biometric security system for access control based on multi-spectral palmprint is presented. To represent texture information, rotation invariant variance measures is used. Finally, a hamming distance score is employed to measure the similarity between templates of palmprints during the atching phase. The results show that a rotation invariant variance measure is robust to some extent in rotation of the images. The accuracy and speed of the proposed method can meet the requirements of an online biometric identification.
We analyze the stability of the network’s giant connected component under impact of adverse events, which we model through the link percolation. Specifically, we quantify the extent to which the largest connected com...
详细信息
The rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes ...
详细信息
The rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage in the brain due to AD leads to changes in the information processing activity of the brain and the EEG which can be quantified as a biomarker. The objective of the study reported in this paper is to develop robust EEG-based biomarkers for detecting AD in its early stages. We present a new approach to quantify the slowing of the EEG, one of the most consistent features at different stages of dementia, based on changes in the EEG amplitudes (ΔEEG A ). The new approach has sensitivity and specificity values of 100% and 88.88%, respectively, and outperformed the Lempel-Ziv Complexity (LZC) approach in discriminating between AD and normal subjects.
Real-time realistic simulation of liquids like ocean water is an important task nowadays in the field of computer graphics. In this paper, we present a novel method to achieve plausible visual results of ocean water a...
详细信息
Opportunistic network mobile user-nodes location prediction can help to collect the data, improve the dynamic network and help to decrease the problems which include the delay, low success rate, high storage space ene...
详细信息
The paper describes the concept and implementation of the software for health status evaluation of the geodynamic observation network of the Far Eastern Branch of the Russian Academy of Sciences(FEB RAS). The operatio...
详细信息
The paper describes the concept and implementation of the software for health status evaluation of the geodynamic observation network of the Far Eastern Branch of the Russian Academy of Sciences(FEB RAS). The operation check of the observation network includes checking the health and availability of all its components, as well as data archive completeness verification.
In this paper, we consider the transmission of confidential message through single-input-multiple-output (SIMO) identically and independent generalized-K fading channels in the presence of an eavesdropper. We derive t...
详细信息
Role Based Access Control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p...
详细信息
暂无评论