Compressive sensing (CS) relies on the fact that CS sampled signals are much closer to their information rate rather than
the signal bandwidth. This attribute helps to provide the much needed benefits of reduced storage or transmission
bandwidth for the next-generation broadband wireless communications and to overcome the hardware limitations for
wideband spectrum sensing in dynamic spectrum access. In order to opportunistically reuse holes in the spectrum, it is
essential to have a spectral detection and estimation technique that is capable of sensing and identifying available
frequency bands. Conventional methods of detection are saddled with the high sampling rate requirement of Nyquist
rate, however timing requirements limits the number of samples that can be taken from the signals. In a situation
whereby the signal spectrum in open-access networks is sparse in nature, this work develops a detection mechanism for
identifying spectrum holes using compressive sensing based algorithm technique. Different compressive sensing
reconstruction algorithms are investigated and FFT spectrogram with an edge detection algorithm is used to identify the
holes in the spectrum. A quick wideband spectrum sensing can be achieved using the compressive sensing technique and
a more refined sensing can be used by any of the other available methods such as energy detection. The proposed model
is evaluated in different fading propagation environments, taking into account of both additive and multiplicative noise.
KEYWORDS: Signal detection, Modulation, Signal processing, Receivers, Signal to noise ratio, Clocks, Compressed sensing, Environmental sensing, Telecommunications, Reconstruction algorithms
The need to efficiently and effectively monitor the frequency spectrum for identification of unoccupied bands is
essential in communication systems such as Cognitive Radio (CR), battlefield communications, etc. The Nyquist Folding
Analog-to-Information Receiver (NYFR) which is based on the theory of Compressed Sensing has been proposed
recently to address this problem in a sparse environment. Although, typical CS techniques, involve random projections
followed by a computationally intensive signal reconstruction process, the methods used in NYFR does not requires the
laborious l1 minimization algorithm. The NYFR performs analog compression via a non-uniform sampling process that
induces a chirp-like modulation on each received signal. Signal parameters can simply be determined by using timefrequency
analysis techniques without full signal reconstruction. This paper revisits the detection problem of using
NYFR for information recovery for appropriate frequency detection when the original signal in the presence of both the
additive white Gaussian noise and Rice multipath fading. An automatic detection algorithm was also developed to
determine the detected frequency parameters without looking at the FFT spectrogram plot.
In this paper, we present a novel approach on image object removal by extending subpatch texture synthesis
technique into redundant wavelet transform (RDWT) domain. As an overcompleted wavelet transform, RDWT
is shift invariant and obtained without downsampling. Also, each RDWT highpass subband exhibits one specific
orientation features of the image, in horizontal, vertical, or diagonal. All these make RDWT ideal for performing
texture synthesis object removal techniques. In our experiments, subpatch texture synthesis in RDWT is
introduced to remove unwanted objects from digital photographs. Specifically, for each RDWT subband, depending
on the subband orientation, a particular direction subpatch texture synthesis is applied independently.
Experimental results reveal that our simple algorithm performs better than previous methods.
Securing enterprise networks comes under two broad topics: Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS). The right combination of selected algorithms/techniques under both
topics produces better security for a given network. This approach leads to using layers of physical,
administrative, electronic, and encrypted systems to protect valuable resources. So far, there is no
algorithm, which guarantees absolute protection for a given network from intruders. Intrusion Prevention
Systems like IPSec, Firewall, Sender ID, Domain Keys Identified Mail (DKIM) etc. do not guarantee
absolute security just like existing Intrusion Detection Systems. Our approach focuses on developing an
IDS, which will detect all intruders that bypass the IPS and at the same time will be used in updating the
IPS, since the IPS fail to prevent some intruders from entering a given network. The new IDS will employ
both signature-based detection and anomaly detection as its analysis strategy. It should therefore be able to
detect known and unknown intruders or attacks and further isolate those sources of attack within the
network. Both real-time and off-line IDS predictions will be applied under the analysis and response stages.
The basic IDS architecture will involve both centralized and distributed/heterogeneous architecture to
ensure effective detection. Pro-active responses and corrective responses will be employed. The new
security system, which will be made up of both IDS and IPS, should be less expensive to implement
compared to existing ones. Finally, limitations of existing security systems have to be eliminated with the
introduction of the new security system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.