Search
Now showing items 41-50 of 76
Channel Estimation for Residual Self-Interference in Full-Duplex Amplify-and-Forward Two-Way Relays
(IEEE-INST Electrical Electronics Engineers Inc, 2017)
Training schemes for full duplex two-way relays are investigated. We propose a novel one-block training scheme with a maximum likelihood estimator to estimate the channels between the nodes as well as the residual ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Bayesian estimation of discrete-time cellular neural network coefficients
(TUBITAK Scientific & Technical Research Council Turkey, 2017)
A new method for finding the network coefficients of a discrete-time cellular neural network (DTCNN) is proposed. This new method uses a probabilistic approach that itself uses Bayesian learning to estimate the network ...
Fully Decentralized and Collaborative Multilateration Primitives for Uniquely Localizing WSNs
(Springer International Publishing Ag, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
Ranking Protein-Protein Binding Using Evolutionary Information and Machine Learning
(Association for Computing Machinery, 2017)
Discriminating native-like complexes from false-positives with high accuracy is one of the biggest challenges in protein-protein docking. The relationship between various favorable intermolecular interactions (e.g. Van ...
Dark Patches in Clustering
(IEEE, 2017)
This survey highlights issues in clustering which hinder in achieving optimal solution or generates inconsistent outputs. We called such malignancies as dark patches. We focus on the issues relating to clustering rather ...
Improving Energy-Efficiency of WSNs through LEFCA
(Sage Publications Inc, 2016)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...
New 2-Edge-Balanced Graphs from Bipartite Graphs
(Wiley-Blackwell, 2016)
Let G be a graph of order n satisfying that there exists lambda epsilon Z(+) for which every graph of order n and size t is contained in exactly. distinct subgraphs of the complete graph K-n isomorphic to G. Then G is ...
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
(Zarka Private Univ, 2016)
Steganography is the art of hiding user information in various file types including image audio and video. Security of steganography lies in imperceptibility of secret information in the cover image. Human Visual System ...
Optimizing NEURON Brain Simulator With Remote Memory Access On Distributed Memory Systems
(Institute of Electrical and Electronics Engineers Inc., 2016)
The Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation ...