In 2004, a new transmission band was added to the HAARP high-frequency ionospheric modification facility that encompasses the second electron cyclotron harmonic at altitudes between ∼220 and 330 km. Initial observati...
详细信息
In 2004, a new transmission band was added to the HAARP high-frequency ionospheric modification facility that encompasses the second electron cyclotron harmonic at altitudes between ∼220 and 330 km. Initial observations indicate that greatly enhanced airglow occurs whenever the transmission frequency approximately matches the second electron cyclotron harmonic at the height of the upper hybrid resonance. This is the reverse of what happens at higher electron cyclotron harmonics. The measured optical emissions confirm the presence of accelerated electrons in the plasma.
The paper describes experimental results of low power sensor nodes designed to perform bearing estimation. The nodes are intended to form a wireless sensor network able to locate an audio source. Two different nodes a...
详细信息
The paper describes experimental results of low power sensor nodes designed to perform bearing estimation. The nodes are intended to form a wireless sensor network able to locate an audio source. Two different nodes are tested: one is based on a cross-correlation derivative integrated circuit (IC), and the other on a gradient flow IC. Implementation details and experimental results of both systems working in a natural environment are presented.
The use of machine learning and cognitive modeling techniques to derive user states and intent from the devices sensors for context-aware computing is described. Context-aware computing describes the situation where a...
详细信息
ISBN:
(纸本)0780388232
The use of machine learning and cognitive modeling techniques to derive user states and intent from the devices sensors for context-aware computing is described. Context-aware computing describes the situation where a mobile computer is aware of its user's state and surroundings and modifies its behavior based on this information. The unsupervised machine learning techniques are used to independently cluster sensor quantities and associate user interactions with these clusters. The use of this also discretization enables learning from observations about the user.
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authenticat...
详细信息
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authentication scheme for service providers like pay per view television, video distribution and cellular phones. We present a new and effective attack on cryptosystems that implement the Fiat-Shamir identification scheme. The attack is successful against all system configurations in contrast to the original Bellcore attack, which has been proven incomplete (easy to defend against).
A novel approach for skin color modeling using ratio rule learning algorithm is proposed in this paper. The learning algorithm is applied to a real time skin color detection application. The neural network learn, base...
详细信息
This paper presents a novel neural network based technique for face detection that eliminates limitations pertaining to the skin color variations among people. We propose to model the skin color in the three dimension...
详细信息
This paper describes a fusion of visual and thermal infrared (IR) images for robust face recognition. Two types of fusion methods are discussed: data fusion and decision fusion. Data fusion produces an illumination-in...
详细信息
The behavior and performance of MPI non-blocking message passing operations are sensitive to implementation specifics as they are heavily dependant on available system level buffers. In this paper we investigate the b...
详细信息
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authenticat...
详细信息
Fault-injection attacks and cryptanalysis is a realistic threat for systems implementing cryptographic algorithms. We revisit the fault-injection attacks on the Fiat-Shamir authentication scheme, a popular authentication scheme for service providers like pay per view television, video distribution and cellular phones. We present a new and effective attack on cryptosystems that implement the Fiat-Shamir identification scheme. The attack is successful against all system configurations in contrast to the original Bellcore attack, which has been proven incomplete (easy to defend against).
Attentive robots, inspired by human-like vision – are required to have visual systems with fovea-periphery distinction and saccadic motion capability. Thus, each frame in the incoming image sequence has nonuniform sa...
详细信息
暂无评论