This paper extends the timing test model in [5] to be more realistic by including the effects of the test fixtures between a device under test and a tester. The paper enables analyzing the trade-offs that arise betwee...
详细信息
This paper addresses the fundamental problem of automatically discovering an unknown moving deformable object in a monocular video sequence. No prior model of the object is used; it is only assumed that the object is ...
详细信息
This paper addresses the fundamental problem of automatically discovering an unknown moving deformable object in a monocular video sequence. No prior model of the object is used; it is only assumed that the object is composed of a set of apparently rigid parts that are not necessarily visible simultaneously, making it possible to circumvent the typical constraint of model initialization. A set of rigid parts describing the object is incrementally extracted in a modeling-tracking loop with reinforced memory. In this framework, low-level segmentation is considered as a necessary but non reliable process that helps initiating hypotheses. Motion-based layer segmentation from feature points and edges is applied only when and where no modeled parts can be tracked. Using the quantity of motion measure, it is further shown how to deal with temporal scale. The interest for this approach in applications such as human tracking is demonstrated for a set of various sequences including a rapidly evolving shape
The security of multimedia data transmitted over wireless networks is of increased interest. Encryption mechanisms securely transmit multimedia data over insecure networks. A major issue that has received very little ...
详细信息
The security of multimedia data transmitted over wireless networks is of increased interest. Encryption mechanisms securely transmit multimedia data over insecure networks. A major issue that has received very little attention so far is that the very same properties that gives ciphers (encryption mechanisms) their cryptographic strength make them sensitive to channel errors as well. In addition, this would enhance the error propagation inherent in compressed data. Therefore provision of security for multimedia transmission over wireless channel results in throughput loss. Nevertheless this lost throughput is traded for increased security. To our knowledge there has been no substantial effort to optimize this tradeoff. Opportunistic encryption proposed in this work is a way to optimize the tradeoff between security offered and the throughput lost due to a cipher. We show that opportunistic encryption methods that adapt to channel variations will lead to an overall increase in the system performance. Two broad scenarios based on channel knowledge are considered, (a) exact channel state information up to a finite time horizon is known and (b) only the average signal-to-noise ratio (SNR) is known. Proposed opportunistic encryption framework is found to achieve significant gains in throughput compared to fixed block length encryption methods for a wide range of average SNR values. We have shown that applying opportunistic encryption on JPEG compressed image results in a better quality of received image and improved security compared to fixed block length encryption.
We propose a wireless control technique for spatially distributed power electronic systems and demonstrate its applicability for master-slave control of two parallel converters, namely a two-module parallel buck conve...
详细信息
We propose a wireless control technique for spatially distributed power electronic systems and demonstrate its applicability for master-slave control of two parallel converters, namely a two-module parallel buck converter and a two-module parallel single-phase voltage source inverter. This scheme uses radiofrequency based communication to eliminate the need for multiple physical connections among the various modules of the parallel converters and is expected to lead to simpler and redundant design of distributed power systems that is achievable using the droop method, while maintaining load sharing among the various modules. The proposed method can also be used as a backup for wire-based control of parallel converters, in applications where fault tolerance is of critical importance
IEEE 802.11 specifies two modes of operation, an infrastructure mode where nodes communicate to/through an access point, and an ad-hoc mode, where nodes communicate with each other directly. Neither mode supports mult...
详细信息
IEEE 802.11 specifies two modes of operation, an infrastructure mode where nodes communicate to/through an access point, and an ad-hoc mode, where nodes communicate with each other directly. Neither mode supports multiple hop transmissions between these nodes. In this paper we present two advantages in extending 802.11 MAC to support multiple hops in the infrastructure mode. One advantage is higher available bandwidth in a multi-rate 802.11 network. IEEE 802.11 allows hosts to select different transmission rates based on the quality of the signal received by the host. Based on performance results both from analytical modeling and simulations, we demonstrate that the total available bandwidth can be improved by using multiple hops instead of reducing the transmission rates of nodes. We present the results in terms of both the increase in total throughput of the network and the available throughput for the forwarding node. The second advantage presented is that by using multi-hop transmissions, the power of transmission at the edges of 802.11 cells can be reduced resulting in lower interference with nodes at the edges of other 802.11 cells. This leads to a more uniform coverage, with increased throughput experienced by nodes at the cell edges.
Many models proposed in the literature to describe Low Voltage power distribution networks in consumer premises as communication media require knowledge of the electrical parameters of the cables comprising these netw...
详细信息
Many models proposed in the literature to describe Low Voltage power distribution networks in consumer premises as communication media require knowledge of the electrical parameters of the cables comprising these networks. These parameters are nevertheless affected by a large number of factors which may vary greatly from case to case, making it thus very difficult to achieve an exact estimation about them. In this work a finite element approach is used for the simulation of a power distribution cable as communication medium, and the operational series impedance per unit length of a widely used cable type is derived. Moreover, the variation of the cable's operational series impedance versus current frequency, cable distance from earth and earth resistivity is presented.
The equivalence conditions between homogeneous and two-layer earth structures are investigated in this paper. The analysis is based on the comparison between the two-layer and the homogeneous earth return impedance re...
详细信息
The equivalence conditions between homogeneous and two-layer earth structures are investigated in this paper. The analysis is based on the comparison between the two-layer and the homogeneous earth return impedance relations. The aim is the derivation of a new simple formula to connect the homogeneous earth equivalent resistivity with the two-layer earth electromagnetic and geometric properties. Thus, the relatively simple expressions for the impedance calculation of the homogeneous earth case can be used for two-layer earth models. The new formula is implemented for six actual cases of two-layer earth models. The two-layer earth impedances are calculated for various configurations, including overhead transmission lines, underground cable systems and a combination of overhead line and underground conductor. The calculated impedances are compared to the corresponding for the homogeneous earth, using the equivalent resistivity given by the new formula.
Given a directed graphical model with binary-valued hidden nodes and real-valued noisy observations, consider deciding upon the maximum a-posteriori (MAP) or the maximum posterior-marginal (MPM) assignment under the r...
Given a directed graphical model with binary-valued hidden nodes and real-valued noisy observations, consider deciding upon the maximum a-posteriori (MAP) or the maximum posterior-marginal (MPM) assignment under the restriction that each node broadcasts only to its children exactly one single-bit message. We present a variational formulation, viewing the processing rules local to all nodes as degrees-of-freedom, that minimizes the loss in expected (MAP or MPM) performance subject to such online communication constraints. The approach leads to a novel message-passing algorithm to be executed offline, or before observations are realized, which mitigates the performance loss by iteratively coupling all rules in a manner implicitly driven by global statistics. We also provide (i) illustrative examples, (ii) assumptions that guarantee convergence and efficiency and (iii) connections to active research areas.
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-ba...
详细信息
The scale, heterogeneity, and dynamism of emerging distributed and decentralized environments make coordination a significant and challenging problem. In this paper we present Comet, a scalable peer-to-peer content-based coordination space. Comet provides a global virtual shared-space that can be associatively accessed by all peer nodes in the system, and access is independent of the physical location of the tuples or identifiers of the host. Dynamically constructed, transient coordination spaces are also supported to enable context locality to be explicitly exploited for improving system performance. The design, implementation, and experimental evaluation of Comet using the PlanetLab platform are presented.
暂无评论