Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Pad Pedram"'
The training phase of deep neural networks requires substantial resources and as such is often performed on cloud servers. However, this raises privacy concerns when the training dataset contains sensitive content, e.g., face images. In this work, we
Externí odkaz:
http://arxiv.org/abs/2408.05092
Deep neural networks provide state-of-the-art accuracy for vision tasks but they require significant resources for training. Thus, they are trained on cloud servers far from the edge devices that acquire the data. This issue increases communication c
Externí odkaz:
http://arxiv.org/abs/2303.02384
Preserving privacy is a growing concern in our society where sensors and cameras are ubiquitous. In this work, for the first time, we propose a trainable image acquisition method that removes the sensitive identity revealing information in the optica
Externí odkaz:
http://arxiv.org/abs/2106.14577
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2011, Iss 1, p 62 (2011)
Abstract This paper is a tutorial review on important issues related to code-division multiple-access (CDMA) systems such as channel capacity, power control, and optimum codes; specifically, we consider optimum overloaded codes that achieve errorless
Externí odkaz:
https://doaj.org/article/de4af10f17794c32b8a82af61661f9e5
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Pad, Pedram, Unser, Michael
It is known that the Karhunen-Lo\`{e}ve transform (KLT) of Gaussian first-order auto-regressive (AR(1)) processes results in sinusoidal basis functions. The same sinusoidal bases come out of the independent-component analysis (ICA) and actually corre
Externí odkaz:
http://arxiv.org/abs/1312.1147
In CDMA systems, the received user powers vary due to moving distance of users. Thus, the CDMA receivers consist of two stages. The first stage is the power estimator and the second one is a Multi-User Detector (MUD). Conventional methods for estimat
Externí odkaz:
http://arxiv.org/abs/1104.4612
Recently, a new class of binary codes for overloaded CDMA systems are proposed that not only has the ability of errorless communication but also suitable for detecting active users. These codes are called COWDA [1]. In [1], a Maximum Likelihood (ML)
Externí odkaz:
http://arxiv.org/abs/1001.4423
In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. W
Externí odkaz:
http://arxiv.org/abs/0810.0763
In this paper we wish to introduce a method to reconstruct large size Welch Bound Equality (WBE) codes from small size WBE codes. The advantage of these codes is that the implementation of ML decoder for the large size codes is reduced to implementat
Externí odkaz:
http://arxiv.org/abs/0810.0764