Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractJune 2024
AI-SIPM 2024: International Workshop on Artificial Intelligence for Signal, Image Processing and Multimedia
- Mahasak Ketcham,
- Kanyalag Phodong,
- Patiyuth Pramkeaw,
- Worawut Yimyam,
- Narumol Chumuang,
- Pokpong Songmuang,
- Thittaporn Ganokratanaa
ICMR '24: Proceedings of the 2024 International Conference on Multimedia RetrievalPages 1330–1331https://doi.org/10.1145/3652583.3659998The International Workshop on Artificial Intelligence for Signal, Image Processing, and Multimedia (AI-SIPM) aims to provide a platform for researchers, practitioners, and industry professionals to exchange ideas, discuss recent advancements, and explore ...
- research-articleJanuary 2024
An original data encryption technique for communication networks
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 1Pages 73–83https://doi.org/10.1504/ijesdf.2024.136020A novel secure distribution technique of network communication data is developed based on data encryption algorithm to address the issues of poor transfer effectiveness and high transmission bit error rate in previous transmission methods. In order to ...
- research-articleDecember 2020
Reference model based discrete time sliding mode control of communication networks
International Journal of Adaptive Control and Signal Processing (ACSP), Volume 34, Issue 12Pages 1739–1750https://doi.org/10.1002/acs.3174AbstractIn this work, we propose a new sliding mode controller based on a reference model for controlling data transmission rates in a connection‐oriented communication network. In the proposed approach, we build a model of the network, which is ...
- research-articleSeptember 2020
Design of Edge-Coupled Microstrip Patches Filtenna
ICEMIS'20: Proceedings of the 6th International Conference on Engineering & MIS 2020Article No.: 3, Pages 1–5https://doi.org/10.1145/3410352.3410732A microwave structure that combines filtering and radiating functions is presented. The structure consists of three patches, two of which are aperture-fed, printed on stacked substrates. The array can be considered as three-pole edge-coupled filter with ...
- research-articleFebruary 2020
Regeneration scanning method for M‐WFRFT communication signals
Considering its simplicity and the uniform distribution of signal energy and interference after transformation, the weighted fractional Fourier transform (WFRFT) has been gradually applied to the field of communication. With in‐depth study of WFRFT, the ...
-
- research-articleSeptember 2019
Orthogonal frequency division multiplexing‐based time difference of arrival estimation
IET Communications (CMU2), Volume 13, Issue 15Pages 2322–2326https://doi.org/10.1049/iet-com.2019.0190This study presents a spectral approach to estimate the time difference of arrival (TDOA) between a reference unit, composed of a pair of very close antennas (small baseline regarding the operating bandwidth), acting as a known fixed location transmitter, ...
- research-articleJuly 2019
Projected block‐wise PIC detection for communication systems with non‐negativity constraints
IET Communications (CMU2), Volume 13, Issue 12Pages 1821–1827https://doi.org/10.1049/iet-com.2018.5761Recently, a number of interference cancellation (IC) detectors that exploit some prior information of the system have been proposed. Of particular interest is the projected parallel IC (PPIC) detector that makes use of the non‐negativity of the data and ...
- research-articleJuly 2019
Balanced quaternary sequences of even period with optimal autocorrelation
IET Communications (CMU2), Volume 13, Issue 12Pages 1808–1812https://doi.org/10.1049/iet-com.2018.5192In many communication systems, sequences with low correlation can reduce interference and noise. Tang and Lindner presented a construction of low autocorrelation quaternary sequences of period p based on cyclotomy, where p=4f+1=x2+4y2 is a prime (f, y are ...
- research-articleSeptember 2018
Workshop on Communication between Automated Vehicles and Vulnerable Road Users
AutomotiveUI '18: Adjunct Proceedings of the 10th International Conference on Automotive User Interfaces and Interactive Vehicular ApplicationsPages 65–71https://doi.org/10.1145/3239092.3239100The aim of this half-day workshop is to explore the topic of interaction between automated vehicles and vulnerable road users (VRUs), such as pedestrians or cyclists, in an interactive setting. The workshop is hands-on with no submission of position ...
- research-articleMarch 2018
Efficient identity‐based blind message recovery signature scheme from pairings
IET Information Security (ISE2), Volume 12, Issue 2Pages 150–156https://doi.org/10.1049/iet-ifs.2017.0342Blind signature (BS) schemes are a vital tool to design electronic cash (e‐cash), online transaction, electronic voting (e‐voting), digital right management (DRM) systems etc. The communication systems designed for such applications need small size and ...
- research-articleNovember 2017
Secure resource allocation for the SISO‐OFDM wiretap channel
IET Communications (CMU2), Volume 11, Issue 18Pages 2702–2712https://doi.org/10.1049/iet-com.2016.1468The broadcast nature of communication systems opens the possibility for attackers to eavesdrop the data and compromise data confidentiality. This study takes the information theoretic security at the physical layer of single‐input single‐output orthogonal ...
- research-articleJune 2016
Online load balancing under graph constraints
IEEE/ACM Transactions on Networking (TON), Volume 24, Issue 3Pages 1690–1703https://doi.org/10.1109/TNET.2015.2442597In several data center settings, each arriving job may only be served by one of a subset of servers. Such a graph constraint can arise due to several reasons. One is locality of the data needed by a job; for example, in content farms (e.g., in Netflix ...
- research-articleMarch 2016
Impact of the relay on the coverage region of multiple‐access channels
From practical and theoretical viewpoints, performance analysis of communication systems by using information‐theoretic results is important. In this study, first, the authors obtain a general achievable rate region for three‐user discrete memoryless ...
- research-articleDecember 2015
Rate-adaptive scheduling policies for network stability and energy efficiency
IEEE/ACM Transactions on Networking (TON), Volume 23, Issue 6Pages 1755–1764https://doi.org/10.1109/TNET.2014.2346507A key problem in the control of packet-switched data networks is to schedule the data so that the queue sizes remain bounded over time. Scheduling policies have been developed in a number of different models that ensure network stability as long as no ...
- research-articleSeptember 2015
Improved signal‐to‐noise ratio estimation algorithm for asymmetric pulse‐shaped signals
IET Communications (CMU2), Volume 9, Issue 14Pages 1788–1792https://doi.org/10.1049/iet-com.2014.1162The split‐symbol moment estimation (SSME) algorithm is a conventional method to estimate the signal‐to‐noise ratio (SNR) in communication systems for M‐ary phase shift keying signals. However, the conventional SSME is based on the assumption of symmetric ...
- extended-abstractJuly 2015
Re-imag(in)ing the digital domestic sphere: a critical-creative study of photography and motherhood in the 21st century
SIGDOC '15: Proceedings of the 33rd Annual International Conference on the Design of CommunicationArticle No.: 13, Pages 1–2https://doi.org/10.1145/2775441.2775450My research explores the relationship between photography and motherhood and, more specifically, the cultural construction of motherhood through digital photographs. The methodology of this critical-creative investigation involves two parts: 1) a case ...
- research-articleJuly 2013
Approximate distribution of log2(A + χ2) and its applications
This study concerns the approximate distribution of the random variable log2(A + χ2) and its applications in the performance analysis of communication systems where A is 0 or 1 and χ2 a chi‐square distributed random variable. The authors prove that log2(A ...
- articleJune 2013
QFQ: efficient packet scheduling with tight guarantees
IEEE/ACM Transactions on Networking (TON), Volume 21, Issue 3Pages 802–816https://doi.org/10.1109/TNET.2012.2215881Packet scheduling, together with classification, is one of the most expensive processing steps in systems providing tight bandwidth and delay guarantees at high packet rates. Schedulers with near-optimal service guarantees and O(1) time complexity have ...
- ArticleMay 2013
Lowering Error Floors in Stochastic Decoding of LDPC Codes Based on Wire-Delay Dependent Asynchronous Updating
ISMVL '13: Proceedings of the 2013 IEEE 43rd International Symposium on Multiple-Valued LogicPages 254–259https://doi.org/10.1109/ISMVL.2013.35Stochastic decoding provides ultra-low-complexity hardware for high-throughput parallel low-density parity-check (LDPC) decoders. Asynchronous stochastic decoding was pro- posed to demonstrate the possibility of low power dissipation and high throughput ...
- ArticleOctober 2012
A Taxonomy of Computer Mediated Conversation
SBSC '12: Proceedings of the 2012 Brazilian Symposium on Collaborative SystemsPages 29–34https://doi.org/10.1109/SBSC.2012.21In this century we have witnessed the emergence of systems such as Twitter, Facebook and other social media with millions of users. These post-massive systems provide different conversation media. This article discusses the conversation media ...