79 results
Search Results
2. Comparison and Visualization of the DNA of Six Primates.
- Author
-
Machado, José A. Tenreiro
- Abstract
This study addresses the comparison of the deoxyribonucleic acid (DNA) of six primates in the perspective of fractals and signal processing. The species consist of Bonobo, Chimpanzee, Gorilla, Human, Orangutan, and Rhesus macaque. These primates are very close in the life evolution and, therefore, pose a problem for designing assertive algorithms to detect their phylogenetic tree. The paper associates logical and mathematical concepts inspired in signal processing and dynamical systems for the analysis of the DNA data of the chromosomes. The results are compared by means of computer visualization tools. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
3. Wavelet Analysis of the Shear Stress in Soil Layer Caused by Dynamic Excitation.
- Author
-
Borowiec, A.
- Abstract
The paper deals with shear stresses analysis of fully saturated Nevada sand layer by means of Wavelet Transform. The layer modelled as two-phase Biot΄s porous medium, is subjected to the impulse wave. Results, obtained from program called Swandyne, were analyzed using MathCad. The Wavelet Transform was carried out to calculate proper frequency spectrum along with duration time of separate frequency. Tangential stresses were considered because of they importance in creating slip plane and liquefaction. In order to study the dynamic response of saturated soil layer as an initial-boundary problem, a FEM code was implemented. The tangential stress distribution in the layer for chosen time steps shows that the phenomena well known under static load takes place during dynamic excitation as well. The shear stresses in the reference point, are analysed using two methods, classical Fourier Transform and the modern Wavelet Analysis. Thanks to Wavelet Transform we can retrieve such important information as: the time when the dominant frequency is reached and which frequencies appears and/or disappears in time. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
4. Blind Deconvolution using the Eigenvector Algorithm (EVA) Method for the Enhancement of Bearing Signal Through the Transmission Channel.
- Author
-
Tan, Andy C C, Karimi, M, and Mathew, J
- Abstract
Detection of an incipient internal defect from a measurement point on the surface of a machine is often made difficult due to the corruption of the source signal by background noise usually through the transmission path. In order to detect or recover the source signal, it is essential to suppress or remove this background noise. With the advancement of digital signal processing techniques, this removal can be achieved using fixed or adaptive filters. The main problem with the application of filtering techniques is that one has to know the characteristics of the noise in advance or may require more than two channels of data if using an adaptive filter. This paper reports on the application of Blind Deconvolution method to recover fault information from the measured (observed) signals of a damaged bearing through the transmission channel and which was also corrupted by noise.. The Blind Deconvolution method manages to recover the fault signal by estimating the inverse of the transmission (channel transfer function) path using the eigenvector algorithm (EVA). Modified crest factor (MCF) and Arithmetic Mean (AM) algorithms were used to optimise the equalizer parameters. Computer simulation and experimental studies were used to verify the applicability of the technique. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
5. The Impact of Digital Technologies on Public Health in Developed and Developing Countries. 18th International Conference, ICOST 2020, Hammamet, Tunisia, June 24-26, 2020, Proceedings.
- Author
-
Jmaiel, Mohamed, Abdulrazak, Bessam, Aloulou, Hamdi, Jmaiel, Mohamed, Kallel, Slim, and Mokhtari, Mounir
- Subjects
Artificial intelligence ,Expert systems / knowledge-based systems ,Information retrieval ,Network hardware ,Systems analysis & design ,User interface design & usability ,Artificial Intelligence ,Computer Communication Networks ,Computer System Implementation ,Computer and Information Systems Applications ,Information Systems Applications (incl. Internet) ,Internet of Things ,Internet searching ,IoT ,Special Purpose and Application-Based Systems ,User Interfaces and Human Computer Interaction ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,machine learning ,network protocols ,open access ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems - Abstract
Summary: This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
6. Participative Urban Health and Healthy Aging in the Age of AI. 19th International Conference, ICOST 2022, Paris, France, June 27-30, 2022, Proceedings.
- Author
-
Aloulou, Hamdi, Abdulrazak, Bessam, Aloulou, Hamdi, Mokhtari, Mounir, and de Marassé-Enouf, Antoine
- Subjects
Computer vision ,Information retrieval ,Information technology: general issues ,Network hardware ,Software Engineering ,User interface design & usability ,Human-Computer Interaction (HCI) ,Internet of Things (IoT) ,architecture types ,artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer science ,computer systems ,engineering ,internet ,network protocols ,sensors ,signal processing ,software architecture ,software design ,software engineering ,telecommunication systems ,ubiquitous computing ,user interfaces - Abstract
Summary: This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2022, held in Paris, France, in June 2022. The 15 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 33 submissions. They cover topics such as design, development, deployment, and evaluation of AI for health, smart urban environments, assistive technologies, chronic disease management, and coaching and health telematics systems.
7. Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking.
- Author
-
Sun, Shuifa, Lei, Bangjun, Zheng, Sheng, Kwong, Sam, and Zhou, Xuejun
- Abstract
In this paper, we propose an aperiodic stochastic resonance (ASR) signal processor for communication systems based on a bi-stable mechanism. This processor can detect base-band binary pulse amplitude modulation (PAM) signals. In this processor related parameters can be adjusted. The adjustment mechanism is explained from the perspective of the conventional noise-induced nonlinear signal processing. To demonstrate this processors usability, based on it we implemented a digital image watermarking algorithm in the discrete cosine transform (DCT) domain. In this algorithm, the watermark and the DCT alternating current (ac) coefficients of the image are viewed as the input signal and the channel noise, respectively. This phenomenon that the detection bit error ratio (BER) of the system suffering from certain attacks is lower than that of the system not suffering from any attack is systematically analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
8. Formalization of Cadence SPW Fixed-Point Arithmetic in HOL.
- Author
-
Akbarpour, Behzad, Dekdouk, Abdelkader, and Tahar, Sofiène
- Abstract
This paper addresses the formalization in higher-order logic of fixed-point arithmetic based on the SPW (Signal Processing WorkSystem) tool. We encoded the fixed-point number system and specified the different rounding modes in fixed-point arithmetic such as the directed and even rounding modes. We also considered the formalization of exceptions detection and their handling like overflow and invalid operation. An error analysis is then performed to check the correctness of the rounding and to verify the basic arithmetic operations, addition, subtraction, multiplication and division against their mathematical counterparts. Finally, we showed by an example how this formalization can be used to enable the verification of the transition from the floating-point to fixed-point algorithmic levels in the design flow of signal processors. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
9. Application of Interferometry in Ultrasonic System for Vibration.
- Author
-
Liu, Zhengping, Xu, Shenghang, and Liu, Juanjuan
- Abstract
Vibration signals are important state parameters for mechanical equipments΄ status monitoring and fault diagnosis. In this paper, in order to overcome the limitations of the traditional vibration measurement med1ods and instrument, a new non-contacting vibration method based on ultrasonic for vibration detection in special environment was presented. The mainly researched in this paper were the circuit for ultrasonic transmitting, receiving, algorithm and the module based on LabVIEW for signal analysis and processing. New algorithm was adopted in the system design. The measurement for vibration signals, which may have higher accuracy, was based on ultrasonic wave of different frequency. Experiments were carried on for proving the theory and the result was expected, verifying the reliability and feasibility of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
10. Spatial Speaker Spatial Positioning of Synthesized Speech in Java.
- Author
-
Sodnik, Jaka and Tomažič, Sašo
- Abstract
In this paper, we propose a ˵Spatial speaker″, an enhancement of a Java FreeTTS speech synthesizer with the additional function of spatial positioning of both the speaker and the listener. Our module enables the reading of an arbitrary text from a file or webpage to the user from a fixed or changing position in space through normal stereo headphones. Our solution combines the following modules: FreeTTS speech synthesizer, a custom made speech processing unit, MIT Media Lab HRTF library, JOAL positioning library and Creative X-Fi sound card. The paper gives an overview of the design of the ˵Spatial Speaker″ and proposes three different practical applications of such a system for visually impaired and blind computer users. Some preliminary results of user studies confirmed the system΄s usability and showed its great potential also in other types of applications and auditory interfaces. The entire system is developed as a single Java class which can be imported and used in any Java application. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
11. Initial Analysis of the EEG Signal Processing Methods for Studying Correlations between Muscle and Brain Activity.
- Author
-
Valentová, Helena and Havlík, Jan
- Abstract
The paper presents an analysis of EEG signal processing methods for studying correlations between human muscle and brain activity. The main task of this work is to design the methods of EEG signal processing and to verify them on artificial and real signals. The paper introduces methods of EEG processing in time and frequency domain. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
12. Dynamical Energy-Based Speech/Silence Detector for Speech Enhancement Applications.
- Author
-
Sakhnov, Kirill, Verteletskaya, Ekaterina, and Simak, Boris
- Subjects
- *
ALGORITHMS , *STATIONARY processes , *SIGNAL processing , *ESTIMATION theory , *AUTOMATIC speech recognition - Abstract
This paper presents an alternative energy-based algorithm to provide speech/silence classification. The algorithm is capable to track non-stationary signals and dynamically calculate instantaneous value for threshold using adaptive scaling parameter. It is based on the observation of a noise power estimation used for computation of the threshold can be obtained using minimum and maximum values of a short-term energy estimate. The paper presents this novel voice activity detection algorithm, its performance, its limitations, and some other techniques which deal with energy estimation as well. [ABSTRACT FROM AUTHOR]
- Published
- 2009
13. Design and Implementation of Active Filter for Data Acquisition System.
- Author
-
Kyu, Mya Thandar, Zaw Min Aung, and Zaw Min Naing
- Subjects
ELECTRIC filters ,ACQUISITION of data ,SIGNAL processing ,RADIO frequency ,SOUND analyzers - Abstract
A filter is a device that passes electric signals at certain frequency or frequency ranges while preventing the passage of others. This paper focuses on active low-pass Butterworth filters design. In communication, data acquisition system usually requires anti-aliasing low-pass filter as well as low-pass noise filter in their preceding signal condition stages. In this paper design of fourth-order low-pass filters is the main topic of consideration. This paper will examine how to implement Butterworth filter and design methods. And this paper describes mathematics calculations and implementation of Butterworth filter with MATLAB and Circuit Maker. [ABSTRACT FROM AUTHOR]
- Published
- 2009
14. Recent Progress of the Quasientropy Approach to Signal and Image Processing.
- Author
-
Chen, Yang and Zeng, Zhimin
- Abstract
The quasientropy (QE) is a class of infinitely many functions of probabilities that is similar to the Shannon entropy. In this paper, we review the application of the QE approach to independent component analysis (ICA) and chaotic time series analysis. We also report the new progress of the QE approach to textural features extraction in image processing. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
15. Direction of Arrival Estimation using a Root-MUSIC Algorithm.
- Author
-
Hwang, H. K., Aliyazicioglu, Zekeriya, Grice, Marshall, and Yakovlev, Anatoly
- Subjects
ANTENNA arrays ,SIGNAL processing ,ALGORITHMS ,EIGENVECTORS ,COMPUTER simulation - Abstract
An array antenna system with innovative signal processing can enhance the resolution of a signal direction of arrival (DOA) estimation. Super resolution algorithms take advantage of array antenna structures to better process the incoming signals. They also have the ability to identify multiple targets. This paper explores the eigen-analysis category of super resolution algorithm. A class of Multiple Signal Classification (MUSIC) algorithms known as a root-MUSIC algorithm is presented in this paper. The root-MUSIC method is based on the eigenvectors of the sensor array correlation matrix. It obtains the signal estimation by examining the roots of the spectrum polynomial. The peaks in the spectrum space correspond to the roots of the polynomial lying close to the unit circle. Statistical analysis of the performance of the processing algorithm and processing resource requirements are discussed in this paper. Extensive computer simulations are used to show the performance of the algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2008
16. A New Frequency-domain Regularization for the GMDF Algorithm.
- Author
-
Junghsi Lee and Hsu Chang Huang
- Subjects
ADAPTIVE filters ,ECHO suppression ,ALGORITHMS ,AUTOMATIC speech recognition ,SIGNAL processing - Abstract
Frequency domain adaptive filters are attractive in applications requiring a large number of coefficients such as acoustic echo cancellation (AEC). Our recent paper derived a not-so-restrictive fixed common step-size bound for the generalized multidelay adaptive filter (GMDF). Based on this bound, this paper introduces a new frequency-domain regularization for the GMDF algorithm. Extensive simulation results demonstrate the usefulness of our algorithm in the scenario of speech input signals. [ABSTRACT FROM AUTHOR]
- Published
- 2008
17. Direction of Arrival Estimation Using Polynomial Roots Intersection for Multi-Dimensional Estimation (PRIME).
- Author
-
Hwang, H. K., Aliyazicioglu, Zekeriya, Grice, Marshall, Yakovlev, Anatoly, and Lu, Peter
- Subjects
INTERSECTION theory ,ESTIMATION theory ,POLYNOMIALS ,ALGORITHMS ,SIGNAL processing - Abstract
An array antenna system with innovative signal processing can enhance the resolution of a signal direction of arrival (DOA) estimation. Super resolution algorithms take advantage of array antenna structures to better process the incoming signals. They also have the ability to identify multiple targets. This paper explores the Polynomial Roots Intersection for Multi-dimensional Estimation (PRIME) algorithms. The PRIME algorithm allows a polynomial rooting approach to estimate joint azimuth/elevation parameters of the signal detection for planer arrays. This method calculates a finite set of root intersections, which are the simultaneous solutions from multiple independent multivariate polynomials. The solutions for the source angle information are included in the simultaneous solutions. The PRIME algorithm does not require the use of a scan vector to scan all possible directions. The results demonstrate improvement in both resolution and computational efficiency with no loss of accuracy. Statistical analysis of the performance of the processing algorithm and processing resource requirements are discussed in this paper. Extensive computer simulations are used to show the performance of the algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2008
18. Case-Based Reasoning and the Statistical Challenges.
- Author
-
Perner, Petra
- Abstract
Case-based reasoning (CBR) solves problems using the already stored knowledge, and captures new knowledge, making it immediately available for solving the next problem. Therefore, CBR can be seen as a method for problem solving, and also as a method to capture new experience and make it immediately available for problem solving. The CBR paradigm has been originally introduced by the cognitive science community. The CBR community aims to develop computer models that follow this cognitive process. Up to now many successful computer systems have been established on the CBR paradigm for a wide range of real-world problems. We will review in this paper the CBR process and the main topics within the CBR work. Hereby we try bridging between the concepts developed within the CBR community and the statistics community. The CBR topics we describe are: similarity, memory organization, CBR learning, and case-base maintenance. Then we will review based on applications the open problems that need to be solved. The applications we are focusing on are meta-learning for parameter selection, image interpretation, incremental prototype-based classification and novelty detection and handling. Finally, we summarize our concept on CBR. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
19. Classification of Proteomic Signals by Block Kriging Error Matching.
- Author
-
Pham, Tuan D., Beck, Dominik, Brandl, Miriam, and Zhou, Xiaobo
- Abstract
One of recent advances in biotechnology offers high-throughput mass-spectrometry data for disease detection, prevention, and biomarker discovery. In fact proteomics has recently become an attractive topic of research in biomedicine. Signal processing and pattern classification techniques are inherently essential for analyzing proteomic data. In this paper the estimation method of block kriging is utilized to derive an error matching strategy for classifying proteomic signals with a particular application to the prediction of cardiovascular events using clinical mass spectrometry data. The proposed block kriging based classification technique has been found to be superior to other recently developed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
20. Analysis of feature extraction methods for emotions recognition using pattern recognition approach.
- Author
-
Prasad, J. R., Prasad, R. S., and Kulkarni, U. V.
- Subjects
SPEECH ,SIGNAL processing ,INFORMATION measurement ,COMPUTER engineering ,INFORMATION theory - Abstract
This paper aims at investigating methods for features extraction for emotions recognition of a speech signal. The paper discusses the possible methodologies for the features as acoustic, lexical, and discourse features, and classification algorithms for classifying spoken utterances based on the emotional state of the speaker [1]. Besides applications in enabling natural human machine interfaces, the paper motivates development of novel method of applying feature extraction and classification techniques that can operate with speech data. [ABSTRACT FROM AUTHOR]
- Published
- 2007
21. The 8th International Conference on Time Series and Forecasting.
- Author
-
Rojas, Ignacio, Herrera, Luis, Kaufman, Peter, Pomares, Hector, Rojas, Fernando, Rojas, Ignacio, and Valenzuela, Olga
- Subjects
Computer science ,Information technology industries ,: financial market volatility ,ARIMA ,CNN ,COVID-19 ,DCCA method ,K-Means ,K-mean clustering ,LSTM ,Markov chain ,NARNN ,VAR-DCC-GARCH ,accessibility ,all sky images ,anomaly detection ,cloud-base height ,clustering ,convolutional neural network ,cross-correlation ,diagnosis ,dynamic convergence ,dynamic mode decomposition with control ,ecosystem respiration ,energy ,error diagnosis ,faults ,forecasting ,health forecasting ,hydrological data ,intensive care unit (ICU) ,longshort-term memory (LSTM) ,machine learning ,machine learning (ML) ,machinelearning ,mobile data traffic ,model evaluation ,multivariate prediction ,non-stationary time series ,oil derivatives ,oil production ,ordinal patterns ,outlier detection ,outlier detection in time series ,prediction ,prediction intervals ,predictive maintenance ,privacy ,readmission prediction ,recurrent neural network (RNN) ,retainability ,seq2seq ,shareable data ,signal processing ,spatial ,spectrum ,stationarity ,structural breaks ,synthetic data ,temporal ,time delay embedding ,time series ,time series analysis ,time series cluster evaluation ,time series clustering ,time series data ,time series forecasting ,time-series ,time-series forecasting ,unit root ,utilization ,wavelet-based random forest ,PV systems ,automated machine learning - Abstract
Summary: The aim of ITISE 2022 is to create a friendly environment that could lead to the establishment or strengthening of scientific collaborations and exchanges among attendees. Therefore, ITISE 2022 is soliciting high-quality original research papers (including significant works-in-progress) on any aspect time series analysis and forecasting, in order to motivating the generation and use of new knowledge, computational techniques and methods on forecasting in a wide range of fields.
22. Cyber Security
- Author
-
Lu, Wei, Zhang, Yuqing, Wen, Weiping, Yan, Hanbing, and Li, Chao
- Subjects
artificial intelligence ,authentication ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data mining ,data security ,databases ,information retrieval ,network protocols ,network security ,privacy ,signal processing ,telecommunication networks ,telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering - Abstract
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.
- Published
- 2022
- Full Text
- View/download PDF
23. Participative Urban Health and Healthy Aging in the Age of AI
- Author
-
Aloulou, Hamdi, Abdulrazak, Bessam, de Marassé-Enouf, Antoine, and Mokhtari, Mounir
- Subjects
architecture types ,artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer science ,computer systems ,engineering ,Human-Computer Interaction (HCI) ,internet ,Internet of Things (IoT) ,network protocols ,sensors ,signal processing ,software architecture ,software design ,software engineering ,telecommunication systems ,ubiquitous computing ,user interfaces ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2022, held in Paris, France, in June 2022. The 15 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 33 submissions. They cover topics such as design, development, deployment, and evaluation of AI for health, smart urban environments, assistive technologies, chronic disease management, and coaching and health telematics systems.
- Published
- 2022
- Full Text
- View/download PDF
24. Tools and Algorithms for the Construction and Analysis of Systems
- Author
-
Fisman, Dana and Rosu, Grigore
- Subjects
formal languages and automata theory ,Formal methods and theory of security ,Machine learning ,Modeling and simulation ,Semantics and reasoning ,signal processing ,software and hardware verification ,specification and verification techniques ,Symbolic and algebraic manipulation ,system construction and transformation techniques ,bic Book Industry Communication::U Computing & information technology::UY Computer science ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMB Algorithms & data structures ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYM Computer modelling & simulation ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering - Abstract
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022. The 46 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 159 submissions. The proceedings also contain 16 tool papers of the affiliated competition SV-Comp and 1 paper consisting of the competition report. TACAS is a forum for researchers, developers, and users interested in rigorously based tools and algorithms for the construction and analysis of systems. The conference aims to bridge the gaps between different communities with this common interest and to support them in their quest to improve the utility, reliability, exibility, and efficiency of tools and algorithms for building computer-controlled systems.
- Published
- 2022
- Full Text
- View/download PDF
25. Psychology, Learning, Technology
- Author
-
Limone, Pierpaolo, Di Fuccio, Raffaele, and Toto, Giusi Antonia
- Subjects
artificial intelligence ,cognitive systems ,communication systems ,computer hardware ,computer networks ,data communication systems ,e-learning ,Human-Computer Interaction (HCI) ,information systems ,mobile computing ,network protocols ,online systems ,signal processing ,telecommunication networks ,wireless telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::J Society & social sciences::JN Education::JNV Educational equipment & technology, computer-aided learning (CAL) ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems - Abstract
This open access book constitutes the refereed proceedings of 1st International Workshop on Psychology, Learning, Technology, PLT 2022, Foggia, Italy, during January 2022. The 8 full papers presented here were carefully reviewed and selected from 23 submissions. In addition, one invited paper is also included. Psychology, Learning, ad Technology Conference (PLT2022) aims to explore learning paths that incorporate digital technologies in innovative and transformative ways and the improvement of the psychological and relational life. The conference includes topics about the methodology of application of the ICT tools in psychology and education: from blended learning to the application of artificial intelligence in education; from the teaching, learning, and assessment strategies and practices to the new frontiers on Human-Computer Interaction.
- Published
- 2022
- Full Text
- View/download PDF
26. Computational Science – ICCS 2022
- Author
-
Groen, Derek, de Mulatier, Clélia, Paszynski, Maciej, Krzhizhanovskaya, Valeria V., Dongarra, Jack J., and Sloot, Peter M. A.
- Subjects
artificial intelligence ,communication systems ,computer networks ,computer systems ,computer vision ,correlation analysis ,data mining ,image analysis ,image processing ,machine learning ,network protocols ,neural networks ,numerical methods ,signal processing ,telecommunication systems ,thema EDItEUR::U Computing and Information Technology::UY Computer science ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ,thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision - Abstract
The four-volume set LNCS 13350, 13351, 13352, and 13353 constitutes the proceedings of the 22ndt International Conference on Computational Science, ICCS 2022, held in London, UK, in June 2022.* The total of 175 full papers and 78 short papers presented in this book set were carefully reviewed and selected from 474 submissions. 169 full and 36 short papers were accepted to the main track; 120 full and 42 short papers were accepted to the workshops/ thematic tracks. *The conference was held in a hybrid format This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
27. Security in Computer and Information Sciences
- Author
-
Gelenbe, Erol, Jankovic, Marija, Kehagias, Dionysios, Marton, Anna, and Vilmos, Andras
- Subjects
architecture types ,artificial intelligence ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data security ,Internet of Things (IoT) ,network protocols ,network security ,signal processing ,software architecture ,software design ,software engineering ,telecommunication networks ,telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues::UBL Legal aspects of IT ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology - Abstract
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
28. Tools and Algorithms for the Construction and Analysis of Systems
- Author
-
Groote, Jan Friso and Larsen, Kim Guldstrand
- Subjects
Theory of Computation ,Computer Systems Organization and Communication Networks ,Control Structures and Microprogramming ,Logic in AI ,Information Systems and Communication Service ,Computer Engineering and Networks ,architecture verification and validation ,artificial intelligence ,automata theory ,computer networks ,embedded systems ,formal languages ,formal logic ,linguistics ,mathematics ,model checking ,model-checking ,SAT and SMT solving ,signal processing ,software and hardware verification ,software architecture ,software engineering ,specification and verification techniques ,static and dynamic program analysis ,system construction and transforamtion techniques ,theorem-proving ,Computer science ,Mathematical theory of computation ,Computer networking & communications ,Algorithms & data structures ,bic Book Industry Communication::U Computing & information technology::UY Computer science ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence - Abstract
This open access two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2021, which was held during March 27 – April 1, 2021, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg and changed to an online format due to the COVID-19 pandemic. The total of 41 full papers presented in the proceedings was carefully reviewed and selected from 141 submissions. The volume also contains 7 tool papers; 6 Tool Demo papers, 9 SV-Comp Competition Papers. The papers are organized in topical sections as follows: Part I: Game Theory; SMT Verification; Probabilities; Timed Systems; Neural Networks; Analysis of Network Communication. Part II: Verification Techniques (not SMT); Case Studies; Proof Generation/Validation; Tool Papers; Tool Demo Papers; SV-Comp Tool Competition Papers.
- Published
- 2021
- Full Text
- View/download PDF
29. Smart Technologies for Precision Assembly
- Author
-
Ratchev, Svetan
- Subjects
Computer Applications ,Special Purpose and Application-Based Systems ,User Interfaces and Human Computer Interaction ,Robotics ,Computer and Information Systems Applications ,open access ,artificial intelligence ,computer vision ,hci ,human engineering ,human-computer interaction ,image processing ,manipulators ,mobile robots ,motion planning ,network protocols ,robots ,sensors ,signal processing ,software engineering ,telecommunication networks ,user interfaces ,Information technology: general issues ,Expert systems / knowledge-based systems ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction - Abstract
This open access book constitutes the refereed post-conference proceedings of the 9th IFIP WG 5.5 International Precision Assembly Seminar, IPAS 2020, held virtually in December 2020. The 16 revised full papers and 10 revised short papers presented together with 1 keynote paper were carefully reviewed and selected from numerous submissions. The papers address topics such as assembly design and planning; assembly operations; assembly cells and systems; human centred assembly; and assistance methods in assembly.
- Published
- 2021
- Full Text
- View/download PDF
30. Computer Aided Verification
- Author
-
Silva, Alexandra and Leino, K. Rustan M.
- Subjects
architecture verification ,artificial intelligence ,computer programming ,distributed computer systems ,distributed systems ,embedded systems ,formal logic ,formal methods ,formal verifications ,model checker ,model checking ,signal processing ,software architecture ,software design ,software engineering ,software quality ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYA Mathematical theory of computation ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYM Computer modelling & simulation - Abstract
This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021. The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification.
- Published
- 2021
- Full Text
- View/download PDF
31. Brain-Inspired Computing
- Author
-
Amunts, Katrin, Grandinetti, Lucio, Lippert, Thomas, and Petkov, Nicolai
- Subjects
artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer programming ,computer systems ,computer vision ,deep learning ,distributed computer systems ,image analysis ,image processing ,machine learning ,network protocols ,neural networks ,signal processing ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications - Abstract
This open access book constitutes revised selected papers from the 4th International Workshop on Brain-Inspired Computing, BrainComp 2019, held in Cetraro, Italy, in July 2019. The 11 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They deal with research on brain atlasing, multi-scale models and simulation, HPC and data infra-structures for neuroscience as well as artificial and natural neural architectures.
- Published
- 2021
- Full Text
- View/download PDF
32. Cyber Security
- Author
-
Lu, Wei, Wen, Qiaoyan, Zhang, Yuqing, Lang, Bo, Wen, Weiping, Yan, Hanbing, Li, Chao, Ding, Li, Li, Ruiguang, and Zhou, Yu
- Subjects
Systems and Data Security ,Computer Communication Networks ,Information Systems Applications (incl. Internet) ,Computer System Implementation ,Cryptology ,Mobile and Network Security ,Data and Information Security ,Computer and Information Systems Applications ,communication channels (information theory) ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data security ,databases ,network protocols ,network security ,sensors ,signal processing ,telecommunication networks ,telecommunication systems ,telecommunication traffic ,wireless telecommunication systems ,Network hardware ,Information retrieval ,Internet searching ,Systems analysis & design ,Coding theory & cryptology ,Data encryption ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security - Abstract
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
- Published
- 2020
- Full Text
- View/download PDF
33. Computer Aided Verification
- Author
-
Lahiri, Shuvendu K. and Wang, Chao
- Subjects
Software Engineering ,Theory of Computation ,Computer Systems Organization and Communication Networks ,Artificial Intelligence ,Information Systems and Communication Service ,Computer Hardware ,Computer Engineering and Networks ,Database Management System ,architecture verification and validation ,artificial intelligence ,computer hardware ,computer networks ,computer programming ,computer systems ,data security ,distributed computer systems ,embedded systems ,formal logic ,linguistics ,model checking ,network protocols ,parallel processing systems ,signal processing ,software architecture ,software design ,software quality ,verification and validation ,Open Access ,Computer science ,Mathematical theory of computation ,Computer networking & communications ,Artificial intelligence ,Computer hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UY Computer science ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware - Abstract
The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
34. The Impact of Digital Technologies on Public Health in Developed and Developing Countries
- Author
-
Jmaiel, Mohamed, Mokhtari, Mounir, Abdulrazak, Bessam, Aloulou, Hamdi, and Kallel, Slim
- Subjects
Computer Communication Networks ,Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Special Purpose and Application-Based Systems ,Computer System Implementation ,User Interfaces and Human Computer Interaction ,Computer and Information Systems Applications ,open access ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,Internet of Things ,IoT ,machine learning ,network protocols ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems ,Network hardware ,Artificial intelligence ,Information retrieval ,Internet searching ,Expert systems / knowledge-based systems ,Systems analysis & design ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
35. A Research on MIMO Radar Based on Simulation.
- Author
-
Jiankui, Zeng and Zhiming, Dong
- Abstract
MIMO radar (Multiple input multiple output radar) is a new radar developed recently. It outperforms the conventional phased radar in target detection. In this paper, the non-ideal factor of transmitting signal is considered. Firstly, the signal model of MIMO radar is investigated. And then the steps of the signal processing in MIMO radar are researched. At last, a simulation platform is established with the MATLAB to testify the advantage of MIMO radar over its conventional counterpart. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
36. Pattern Recognition of the Household Water Consumption through Signal Analysis.
- Author
-
Almeida, Giovana, Vieira, José, Marques, José, and Cardoso, Alberto
- Abstract
This paper presents the initial results of a research project that aims to develop a method for losses/leakage detection and household water consumption characterization through the detailed patterns analysis of signals generated by water meters. The Department of Civil Engineering (University of Coimbra) supports the research as part of a PhD Project. An experimental facility is used for signals acquisition and data analysis will be performed by using a pattern recognition algorithm that will identify the hydraulic devices in use. It is intended to develop and test some algorithm structures at various plumbing configuration forms to find the best one. In a second phase, a consumption analysis will be carried out using that algorithm to test its efficiency in inhabited houses. The expectation is to develop an efficient water monitoring tool that helps the users to follow-up and to control the water consumption using a computer or even a mobile device. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
37. Identification of Liquid State of Scrap in Electric Arc Furnace by the Use of Computational Intelligence Methods.
- Author
-
Blachnik, Marcin, Wieczorek, Tadeusz, Mączka, Krystian, and Kopeć, Grzegorz
- Abstract
A constant aspiration to optimize electric arc steelmaking process causes an increase of the use of advanced analytical methods for the process support. Optimization of the production processes lead to real benefits, which are, for example, lower costs of production. More often computational intelligence methods are used for this purpose. In this paper authors present three methods used for identification of liquid state of scrap in electric arc furnace using analysis of signals of the current of furnace electrodes. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
38. Towards Application of Soft Computing in Structural Health Monitoring.
- Author
-
Nazarko, Piotr and Ziemiański, Leonard
- Abstract
The paper presents preliminary results of data analysis and discusses the application of soft computing methods in the field of non-destructive tests. The main objective of developed diagnostic system are the automatic detection and evaluation of damage. Thus the system is composed of two signal processing techniques known as novelty detection and pattern recognition. For this purpose autoassociative as well as feed-forward neural networks are used. All the signals used for training the system are obtained from laboratory tests of strip specimens, where phenomenon of elastic wave propagation in solids was utilized. Computed parameters of time signals defines various types of input vectors used for training neural networks. The results finally obtained prove that the proposed diagnostic system made automation of structure testing possible and can be applied to Structural Health Monitoring. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
39. Further Research on Extended Alternating Projection Neural Network.
- Author
-
Wang, Jingen, Wang, Yanfei, and Cui, Xunxue
- Abstract
In order to apply the Extended Alternating Projection Neural Network (EAPNN) better in pattern recognition, signal processing and sensor network, the paper makes futher research on the EAPNN and deduces several important conclusions from the mathematical expression to the steady state value of EAPNN, and strict mathematical proofs to these corollaries are also given. In addition, the convergent speed of EAPNN has been discussed and analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
40. Artificial Neural Network-Based Algorithm for ARMA Model Order Estimation.
- Author
-
Al-Qawasmi, Khaled E., Al-Smadi, Adnan M., and Al-Hamami, Alaa
- Abstract
This paper presents a new algorithm for the determination of the Autoregressive Moving Average (ARMA) model order based on Artificial Neural Network (ANN). The basic idea is to apply ANN to a special matrix constructed from the Minimum Eginevalue (MEV) criterion. The MEV criterion is based on a covariance matrix derived from the observed output data only. The input signal is unobservable. The proposed algorithm is based on training the MEV covariance matrix dataset using the back-propagation technique. Our goal is to develop a system based on ANN; hence, the model order can be selected automatically without the need of prior knowledge about the model or any human intervention. Examples are given to illustrate the significant improvement results. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
41. Advantages of Matched Filter Detection at Quadrature Baseband Than at Radio Frequency.
- Author
-
Ndovi, Lusungu
- Subjects
- *
SIGNAL processing , *ALGORITHMS , *BANDWIDTHS , *RADIO frequency , *SIMULATION methods & models - Abstract
The continued advancement of software-defined radio (SDR) technology has been a key factor in furthering research about the implementation of most signal processing algorithms at baseband. Traditionally, most algorithms have been carried out at radio frequency (RF). With the coming of SDR, the processing can be done at baseband frequencies which are more compatible with the fast developing software radio technology. This paper looks at matched filter detection and investigates the possibility and benefits of carrying out the detection process at quadrature baseband (QBB). A simple chirp signal is considered for the analysis. The analysis is carried out using MatLab simulations at RF and QBB and the results do show the possibility of carrying out the detection process at QBB with the expected benefits as compared to carrying out the process at RF. [ABSTRACT FROM AUTHOR]
- Published
- 2009
42. Joint Transform Correlator Based on Color Human Vision Model for Polychromatic Pattern Recognition.
- Author
-
Chiehpo Chang, Chulung Chen, Tengwen Chen, and Tiengsheng Lin
- Subjects
OPTICAL pattern recognition ,PATTERN recognition systems ,VISUAL perception ,COLORS ,ELECTROOPTICAL devices ,SIGNAL processing - Abstract
Electro-optical system that combines the advantages of optical and electronic system has been widely applied in signal processing. Because of advantages of real-time, parallel operation capability, and programmable flexibility, it is especially utilized in the pattern recognition, e.g., military radar system, secure entry system, biomedical detection, and many other applications. Moreover, color is one of the most significant and powerful visual information. Improving the JTC for polychromatic pattern recognition is a novel topic. Deutsch proposed a multi-channel single-output JTC. It is based on RGB color model and separates the color pattern into red, green, and blue components respectively and then displays on the spatial light modulator (SLM). Thereafter, RGB become a popular model to perform pattern recognition. However, it is known that red, green, and blue components are correlated with one another. Furthermore, there are some cases in which the use of the RGB chromatic system is not appropriate for obtaining effective polychromatic object recognition, e.g., RGB decomposition is not appropriated for discriminating between similar color objects. Therefore, we propose a novel nonzero order JTC based on ATD color model to achieve polychromatic pattern recognition. ATD color model is constituted by achromatic, tritanopic, and deuteranopic systems. People consider that ATD color model is the most to be close to human eyes. In this paper, we apply ATD color model to multi-channel nonzero order joint transform correlator and perform pattern recognition. To estimate whether ATD color model is suitable for pattern recognition, we compare with RGB, which is common used to perform pattern recognition. The terms of estimation contain recognition ability of rotational distortion, brightness performance, multi-level quantized reference functions, noise tolerance ability, and relationship between channels and channels. We utilize peak to correlation energy, peak to sidelobe ratio, correlation peak intensity, and mutual correlation coefficient as our performance evaluation parameters. Finally, the results show that ATD color model is suitable for pattern recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2009
43. Benefits of Quadrature Baseband Versus Radio Frequency Demodulation Algorithm.
- Author
-
Ndovi, Lusungu
- Subjects
BASEBAND ,RADIO frequency ,DEMODULATION ,ALGORITHMS ,SOFTWARE radio ,SIGNAL processing - Abstract
The continued advancement of software-defined radio (SDR) technology has been a key factor furthering research into the implementation of most signal processing algorithms at baseband. Traditionally, most algorithms have been carried out at radio frequency (RF). With the coming of SDR, the processing can be done at baseband frequencies which are more compatible with the fast developing software radio technology. This paper looks at selected demodulation algorithms and investigates the possibility and benefits of carrying them out at quadrature baseband (QBB). Simple beamforming, multipath/Doppler shift compensation cases are considered. The analysis is carried out using MatLab simulations at RF and QBB and the results do show the possibility of carrying out the selected demodulation algorithms at QBB with the expected benefits. [ABSTRACT FROM AUTHOR]
- Published
- 2009
44. Replicating Cytokines in Modelling Signal Exchange between Nodes in Wireless Mesh Networks.
- Author
-
Mowjoon, Mahira M., Agbinya, Johnson I., and Chaczko, Zenon
- Subjects
CYTOKINES ,SIGNAL processing ,WIRELESS communications ,COMPUTER networks ,IMMUNE system ,ROUTING (Computer network management) - Abstract
In recent years wireless mesh network (WMN) technologies and their applications have been actively researched and developed as the promising solution for future wireless mobile networks. Conversely security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper proposes an emerging perception to model danger signal exchange between nodes in WMN by emulating the function of Cytokines in Human Immune System (HIS). [ABSTRACT FROM AUTHOR]
- Published
- 2009
45. Joint Detection and Hop Parameters Estimation of Slow FHSS/MFSK Signals Using DHWT-AC Technique in Rayleigh Block Fading Channels.
- Author
-
Hosseini, S. N. and Razavi, H.
- Subjects
PARAMETER estimation ,WIRELESS communications ,SIGNAL processing ,RADIO transmitter fading ,MATHEMATICAL transformations ,AUTOCORRELATION (Statistics) ,COMPUTER simulation - Abstract
Frequency hopping spread spectrum (FHSS) has been paid much attention and has been employed by various wireless systems. For the reception of FHSS signals, first of all, we need to detect the presence of signal, and then to estimate hop parameters such as hop timing and hop frequency. In this paper, we propose an efficient algorithm for joint detection and hop parameters estimation of the slow FHSS/MFSK signals using two different methods, namely, the Discrete Haar Wavelet Transform (DHWT) and the autocorrelation (AC) in Rayleigh block fading channels. This algorithm can be used in communication intelligent (COMINT) systems for surveillance issues. The performance and behavior of the proposed algorithm are examined through computer simulations over practical measured data. [ABSTRACT FROM AUTHOR]
- Published
- 2009
46. An Adaptive Threshold in Joint Approximate Diagonalization by the Information Criterion.
- Author
-
Matsuda, Yoshitatsu and Yamaguchi, Kazunori
- Abstract
Joint approximate diagonalization is one of well-known methods for solving independent component analysis and blind source separation. It calculates an orthonormal separating matrix which diagonalizes many cumulant matrices of given observed signals as accurately as possible. It has been known that such diagonalization can be carried out efficiently by the Jacobi method, where the optimization for each pair of signals is repeated until the convergence of the whole separating matrix. The Jacobi method decides whether the optimization is actually applied to a given pair by a convergence decision condition. Generally, a fixed threshold is used as the condition. Though a sufficiently small threshold is desirable for the accuracy of results, the speed of convergence is quite slow if the threshold is too small. In this paper, we propose a new decision condition with an adaptive threshold for joint approximate diagonalization. The condition is theoretically derived by a model selection approach to a simple generative model of cumulants in the similar way as in Akaike information criterion. In consequence, the adaptive threshold is given as the current average of all the cumulants. Only if the expected reduction of the cumulants on each pair is larger than the adaptive threshold, the pair is actually optimized. Numerical results verify that the method can choose a suitable threshold for artificial data and image separation. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
47. Minimum Variance Gain Nonuniformity Estimation in Infrared Focal Plane Array Sensors.
- Author
-
San-Martin, César and Hermosilla, Gabriel
- Abstract
In this paper, a minimum variance estimator for the gain nonuniformity (NU) in infrared (IR) focal plane array (FPA) imaging system is presented. Recently, we have developed a recursive filter estimator for the offset NU using only the collected scene data, assuming that the offset is a constant in a block of frames where it is estimated. The principal assumption of this scene-based NU correction (NUC) method is that the gain NU is a known constant and does not vary in time. However, in several FPA real systems the gain NU drift is significant. For this reason, in this work we present a gain NU drift estimation based on the offset NU recursive estimation assuming that gain and offset are jointly distributed. The efficacy of this NUC technique is demonstrated by employing several real infrared video se quences. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
48. Automatic Music Transcription Based on Wavelet Transform.
- Author
-
Azizi, Amir, Faez, Karim, Delui, Amin Rezaeian, and Rahati, Saeid
- Abstract
In this paper, we introduce a method which uses a note model and signal post processing for a musical instrument to make a piece of music. one of the important issues in note transcription is extraction of multiple pitches. Most of the examined methods face error in joint harmonics and frequencies. A good model for note of a specified musical instrument can help us identify a note better. The presented method is based on wavelet transform, onset detection, note model and conformity reduction error algorithm or regression and post-processing for improved result. The results obtained show that detecting musical notes in a piece played on the guitar is, in comparison with similar methods, of higher detection accuracy and even in the case of noisy sound signals, the results are more acceptable. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
49. Estimation of Eye Blinking Using Biopotentials Measurements for Computer Animation Applications.
- Author
-
Krupiński, Robert and Mazurek, Przemysław
- Abstract
In the paper, the estimation algorithm of eye blinking for a computer animation system using biopotentials occurring on an actor΄s face is considered. The measuring system incorporates minimal 3–electrodes configuration, which is relatively cheap solution. The proposed algorithm allows both the measurement of eyes orientation and detection of eyes blinking. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
50. Coexistence between WiMAX and Existing FWA Systems in the Band 3500 MHz.
- Author
-
Shamsan, Zaid A. and Rahman, Tharek Abd
- Subjects
IEEE 802.16 (Standard) ,WIRELESS communications ,SIGNAL processing ,BANDWIDTHS ,RADIO frequency - Abstract
In this paper, the coexistence of WiMAX system and existing fixed wireless access (FWA) systems is studied. Spectral emission mask is used as well as interference to noise ratio (I/N) of -6 dB as one of standard sharing criterion value at FWA systems recommended by international telecommunication union radio sector ITU-R. Three channel bandwidths of (3.5, 7, and 10 MHz) of WiMAX system are selected to be studied with 7 MHz FWA channel in dense urban area. All parameters of the two systems are presented and methodology is explained. It is well known that frequency distance rules are an important of frequency coordination process in most radio services, so frequency and distance separations are determined and analyzed for both terms cochannel interference and adjacent channel interference in the different interference scenarios which are supposed. [ABSTRACT FROM AUTHOR]
- Published
- 2008
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.