Search results for "NETWORK"
showing 10 items of 7718 documents
Implementation of pattern recognition algorithm based on RBF neural network
2002
In this paper, we present implementations of a pattern recognition algorithm which uses a RBF (Radial Basis Function) neural network. Our aim is to elaborate a quite efficient system which realizes real time faces tracking and identity verification in natural video sequences. Hardware implementations have been realized on an embedded system developed by our laboratory. This system is based on a DSP (Digital Signal Processor) TMS320C6x. The optimization of implementations allow us to obtain a processing speed of 4.8 images (240x320 pixels) per second with a correct rate of 95% of faces tracking and identity verification.
On the feasibility of personal audio systems over a network of distributed loudspeakers
2018
Los sistemas de reproducción de audio personal se ocupan de la creación de zonas sonoras personales dentro de una habitación sin necesidad de utilizar auriculares. Estos sistemas utilizan un conjunto de altavoces y diseñan los filtros necesarios en cada altavoz con el fin de que la señal de audio deseada llegue a cada persona en la sala lo más libre de interferencias posible. Existen propuestas muy interesantes en la literatura que hacen uso de arrays circulares o lineales, pero en este trabajo estudiamos el problema considerando una red de altavoces distribuidos controlados por un conjunto de nodos acústicos, que pueden intercambiar información a través de una red. Enunciamos el modelo de …
Statistical Properties of Double Hoyt Fading With Applications to the Performance Analysis of Wireless Communication Systems
2018
In this paper, we investigate the statistical properties of double Hoyt fading channels, where the overall received signal is determined by the product of two statistically independent but not necessarily identically distributed single Hoyt processes. Finite-range integral expressions are first derived for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades of the envelope fading process. A closed-form approximate solution is also deduced for the LCR by making use of the Laplace approximation theorem. Applying the derived PDF of the double Hoyt channel, we then provide analytical expressions for the average…
Fast Graph Filters for Decentralized Subspace Projection
2020
A number of inference problems with sensor networks involve projecting a measured signal onto a given subspace. In existing decentralized approaches, sensors communicate with their local neighbors to obtain a sequence of iterates that asymptotically converges to the desired projection. In contrast, the present paper develops methods that produce these projections in a finite and approximately minimal number of iterations. Building upon tools from graph signal processing, the problem is cast as the design of a graph filter which, in turn, is reduced to the design of a suitable graph shift operator. Exploiting the eigenstructure of the projection and shift matrices leads to an objective whose…
Exosomal and Plasma Non-Coding RNA Signature Associated with Urinary Albumin Excretion in Hypertension
2022
Non-coding RNA (ncRNA), released into circulation or packaged into exosomes, plays important roles in many biological processes in the kidney. The purpose of the present study is to identify a common ncRNA signature associated with early renal damage and its related molecular pathways. Three individual libraries (plasma and urinary exosomes, and total plasma) were prepared from each hypertensive patient (with or without albuminuria) for ncRNA sequencing analysis. Next, an RNA-based transcriptional regulatory network was constructed. The three RNA biotypes with the greatest number of differentially expressed transcripts were long-ncRNA (lncRNA), microRNA (miRNA) and piwi-interacting RNA (piR…
Customers' Perceived Risk and Trust in Using Mobile Money Services—an Empirical Study of Ghana
2019
Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept approach and an online survey. Str…
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
A Networking Framework for Multi-Robot Coordination
2008
Autonomous robots operating in real environments need to be able to interact with a dynamic world populated with objects, people, and, in general, other agents. The current generation of autonomous robots, such as the ASIMO robot by Honda or the QRIO by Sony, has showed impressive performances in mechanics and control of movements; moreover, recent literature reports encouraging results about the capability of such robots of representing themselves with respect to a dynamic external world, of planning future actions and of evaluating resulting situations in order to make new plans. However, when multiple robots are supposed to operate together, coordination and communication issues arise; w…
Unraveling the Molecular Mechanism of Action of Empagliflozin in Heart Failure With Reduced Ejection Fraction With or Without Diabetes
2019
Visual Abstract
A Novel Energy Harvester for Powering Small UAVs: Performance Analysis, Model Validation and Flight Results
2019
The proposed work aims at exploring and developing new strategies to extend mission parameters (measured as travel distance and mission duration (MD)) of a new class of unmanned vehicles, named Micro Air Vehicles (MAVs). In this paper, a new analytical model, identifying all factors, which determine the MAV power consumption, is presented. Starting from the new model, the design of a nanoarray energy harvester, based on plasmonics nano-antenna technology is proposed. The preliminary study was based on a 22,066,058 22,066,058 ×