Search
Search Results
-
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor
In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of...
-
Fiber Bragg grating as a sole dispersion compensation unit for a long haul optical link
This paper presents a comprehensive study of the Gaussian Apodized Fiber Bragg Grating (GA-FBG) as a stand-alone dispersion compensator for a 150 km...
-
Stepped frequency chirp signal imaging radar jamming using two-dimensional nonperiodic phase modulation
Stepped frequency chirp signal obtains high-resolution radar images by synthesizing multiple narrowband chirp pulses. It has been one of the most...
-
Radar based automated system for people walk identification using correlation information and flexible analytic wavelet transform
A contact-free people walk identification has numerous applications in surveillance and suspicious activity detection to take the precautionary...
-
Human body recognition based on the sparse point cloud data from MIMO millimeter-wave radar for smart home
Human body recognition is widely used in smart home. The current mainstream perception modalities, i.e., camera and wearable device, are vulnerable...
-
Expanding the Positioning Area for Acoustic Localization Using COTS Mobile Devices
In this paper, we propose a novel acoustic localization system using commercial off-the-shelf (COTS) mobile devices. Acoustic-based systems have... -
Convolution based quadratic-phase Stockwell transform: theory and uncertainty relations
In the field of optics and signal processing, the novel quadratic-phase Fourier transform (QPFT) has emerged as a powerful tool. However, it has a...
-
Power-efficient gesture sensing for edge devices: mimicking fourier transforms with spiking neural networks
One of the key design requirements for any portable/mobile device is low power. To enable such a low powered device, we propose an embedded gesture...
-
Efficient encrypted speech retrieval based on hadoop cluster under SW CPU
Most encrypted speech retrieval algorithms are over-optimized for discriminability and robustness, which leads to poor security and efficiency. And...
-
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
In order to satisfy the requirements of retrieval time-efficiency and security for encrypted speech data retrieval in the cloud environment, and to...
-
Lightweight micro-motion gesture recognition based on MIMO millimeter wave radar using Bidirectional-GRU network
Non-contact gesture recognition is a novel form of human–computer interaction. It has broad prospects in many applications, such as Augmented...
-
Application of semi-circle law and Wigner spiked-model in GPS jamming confronting
Detection and reduction of global positioning system (GPS) jamming threats are inevitable considering importance of satellite navigation in different...
-
Wireless Sensing Methodologies
This chapter introduces introduce the information that can be sensed using wireless signals and principal methodologies to obtain the information,... -
Radatron: Accurate Detection Using Multi-resolution Cascaded MIMO Radar
Millimeter wave (mmWave) radars are becoming a more popular sensing modality in self-driving cars due to their favorable characteristics in adverse... -
Ubiquitous WiFi and Acoustic Sensing: Principles, Technologies, and Applications
With the increasing pervasiveness of mobile devices such as smartphones, smart TVs, and wearables, smart sensing, transforming the physical world...
-
Cowork: Gamified, Virtual Coworking Web Application to Support Remote Learning for Students
Coworking spaces allow students focused on different tasks to work in the same environment, support productivity and self-efficacy, and promote... -
Disaster Mitigation Using a Peer-to-Peer Near Sound Data Transfer System
With the rise of the novel coronavirus pandemic, there has emerged an eminent need for social distancing to flatten the curve of the infected. The... -
Convolution Neural Networks Based Automatic Subsurface Anomaly Detection and Characterization in Quadratic Frequency Modulated Thermal Wave Imaging
Recent trends in thermal non-destructive testing focusing on artificial intelligence and various deep learning architectures have been investigated...
-
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit
The massive deployment of IoT devices comes with the creation of many wireless communication protocols designed to support various applications.... -
IDS and IPS in LPWAN (LoRaWAN, Sigfox, and NB-IoT)
Information security is of vital importance in any industry. Due to the emergence of smart devices, the need has only soared. Especially in wireless...