This paper presents a novel neural network based technique for face detection that eliminates limitations pertaining to the skin color variations among people. We propose to model the skin color in the three dimension...
详细信息
This paper describes a fusion of visual and thermal infrared (IR) images for robust face recognition. Two types of fusion methods are discussed: data fusion and decision fusion. Data fusion produces an illumination-in...
详细信息
In this paper we describe the design and implementation of ATEMU, a fine grained sensor network simulator. ATEMU is intended to bridge the gap between actual sensor network deployments and sensor network simulations. ...
详细信息
The behavior and performance of MPI non-blocking message passing operations are sensitive to implementation specifics as they are heavily dependant on available system level buffers. In this paper we investigate the b...
详细信息
作者:
R. ChandramouliMultimedia Systems
Networking and Communications (MSyNC) Laboratory Department of Electrical and Computer Engineering Stevens Institute of Technology USA
This work presents some important issues in searching the Internet for covert messages. Several related theoretical and practical problems are discussed. Web search is formulated as a mathematical optimization problem...
详细信息
This work presents some important issues in searching the Internet for covert messages. Several related theoretical and practical problems are discussed. Web search is formulated as a mathematical optimization problem and solutions are proposed. Two algorithms: coordinated search and random search are discussed within this optimization framework along with their pros and cons.
A novel distributed power control (DPC) scheme for cellular networks in the presence of radio channel uncertainties such as path loss, shadowing, and Rayleigh fading is presented. Since these uncertainties can attenua...
详细信息
A novel distributed power control (DPC) scheme for cellular networks in the presence of radio channel uncertainties such as path loss, shadowing, and Rayleigh fading is presented. Since these uncertainties can attenuate the received signal strength and can cause variations in the received signal-to-interference ratio (SIR), the proposed DPC scheme maintains a target SIR at the receiver provided the uncertainty is slowly varying with time. The DPC estimates the time varying nature of the channel quickly and uses the information to arrive at a suitable transmitter power value. Further, the standard assumption of a constant interference during a link's power update used in other works in the literature is relaxed. A CDMA-based cellular network environment is used to compare the proposed scheme with earlier approaches. The results show that our DPC scheme can converge faster than others by adapting to the channel variations. The proposed DPC scheme can render outage probability of 5 to 30% in the presence of uncertainties compared with other schemes of 50 to 90% while consuming low power per active mobile user. In other words, the proposed DPC scheme allows significant increase in network capacity while consuming low power values even when the channel is uncertain.
Attentive robots, inspired by human-like vision – are required to have visual systems with fovea-periphery distinction and saccadic motion capability. Thus, each frame in the incoming image sequence has nonuniform sa...
详细信息
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authenticat...
详细信息
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authentication scheme for service providers like pay per view television, video distribution and cellular phones. We present a new and effective attack on cryptosystems that implement the Fiat-Shamir identification scheme. The attack is successful against all system configurations in contrast to the original Bellcore attack, which has been proven incomplete (easy to defend against).
It is possible to enjoy the quality of service related informations of a single node or a link between two nodes, which is understandable for the technical people only. Yet, there is no zone-based quality of service i...
详细信息
Both space-time (ST) processing and orthogonal frequency division multiplexing (OFDM) are becoming increasingly important techniques used in physical layer to support the quality of service (QoS) for different applica...
详细信息
ISBN:
(纸本)0780383443
Both space-time (ST) processing and orthogonal frequency division multiplexing (OFDM) are becoming increasingly important techniques used in physical layer to support the quality of service (QoS) for different applications in wireless networks. However, the employment of such techniques affects the scheme designs at higher layers such as channel allocation algorithms at media access control (MAC) layer. Therefore, a crossing-layer development is required. In this paper, we propose the subchannel allocation algorithms based on space-time OFDM-CDMA systems, and develop the throughput-performance analysis frameworks to evaluate the proposed algorithms. Our analyses show that the proposed subchannel allocation scheme can significantly increase the system throughput over wireless networks, while achieving a much lower implementation and computation complexity as compared to the smart-antenna-based systems. Also presented are the simulation results that verify the analytical findings and observations.
暂无评论