Reconstruction- and example-based super-resolution
(SR) methods are promising for restoring a high-resolution
(HR) image from low-resolution (LR) image(s). Under large
magnification, reconstruction-based methods usually fail
to hallucinate visual details while example-based methods
sometimes introduce unexpected details. Given a generic
LR image, to reconstruct a photo-realistic SR image and
to suppress artifacts in the reconstructed SR image, we
introduce a multi-scale dictionary to a novel SR method
that simultaneously integrates local and non-local priors.
The local prior suppresses artifacts by using steering kernel regression to predict the target pixel from a small local
area. The non-local prior enriches visual details by taking
a weighted average of a large neighborhood as an estimate
of the target pixel. Essentially, these two priors are complementary to each other. Experimental results demonstrate
that the proposed method can produce high quality SR recovery both quantitatively and perceptually.
The idea of writing this book entitled “Cognitive Networked Sensing and Big Data”
started with the plan to write a briefing book on wireless distributed computing
and cognitive sensing. During our research on large-scale cognitive radio network
(and its experimental testbed), we realized that big data played a central role. As a
result, the book project reflects this paradigm shift. In the context, sensing roughly
is equivalent to “measurement.”
This book describes how global mobile communication was made. It is written for those who
want or need to know how this was achieved e.g.:
? Young professionals who want to build their career on GSM and UMTS and need to
understand the basics
? Strategic and technical planners who want to drive the future GSM and UMTS develop-
ment
? Strategists who plan to repeat GSM’s success in the fourth generation
? Academics, who want to understand and analyse the development of GSM and UMTS;
? Activists in other large scale international communication projects who want to use
experiences gained
This books presents the research work of COST 273 Towards Mobile Broadband Multimedia
Networks, hence, it reports on the work performed and on the results achieved within the project
by its participants. The material presented here corresponds to the results obtained in four years
of collaborative work by more than 350 researchers from 137 institutions (universities, operators,
manufacturers, regulators, independent laboratories and others – a full list is provided in Appendix
B) belonging to 29 countries (mainly European, but also from Asia and North America) in the area of
mobileradio. Theobjectiveofpublishingtheseresultsasabookisessentiallytomakethemavailable
to an audience wider than the project. In fact, it just follows a ‘tradition’ of previous COST Actions
in this area of telecommunications, i.e. COST 207, 231 and 259.
Since the principle of multi-carrier code division multiple access (MC-CDMA) was
simultaneously proposed by Khaled Fazel et al. and Nathan Yee et al. at the IEEE
International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC) in the year 1993, multi-carrier spread spectrum (MC-SS) has rapidly become
one of the most wide spread independent research topics on the field of mobile radio
communications. Therefore, the International Workshop on Multi-Carrier Spread
Spectrum (MC-SS) was initiated in the year 1997. Multi-carrier and spread spectrum
systems with their generic air interface and adaptive technologies are considered as
potential candidates to fulfill the requirements of next generation mobile communications
systems.
The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have tried hard to continuously come up with improved crypto-
graphic algorithms. But typically we do not need to wait too long to find an efficient way
to crack these algorithms. With the rapid progress of computational devices, the current
cryptographic methods are already becoming more unreliable. In recent years, wireless re-
searchers have sought a new security paradigm termed physical layer security. Unlike the
traditional cryptographic approach which ignores the effect of the wireless medium, physi-
cal layer security exploits the important characteristics of wireless channel, such as fading,
interference, and noise, for improving the communication security against eavesdropping
attacks. This new security paradigm is expected to complement and significantly increase
the overall communication security of future wireless networks.
Quality of Service ( QoS ) has always been in a world of its own, but as the technology
has been refi ned and has evolved in recent years, QOS usage has increased to the point
where it is now considered a necessary part of network design and operation. As with
most technologies, large - scale deployments have led to the technology becoming more
mature, and QOS is no exception.
It was only a few years ago that “ubiquitous connectivity” was recognized as the future of
wireless communication systems. In the era of ubiquitous connectivity, it was expected that
the broadband mobile Internet experience would be pervasive, and seamless connectivity on
a global scale would be no surprise at all. The quality of service would be guaranteed no
matter when/where/what the users wanted with the connectivity. Connectivity would even be
extended to object-to-object communication, where no human intervention was required. All
objects would become capable of autonomous communication.
This book was born from the perception that there is much more to spectrum use
and sharing than one sees reflected in publications, whether academic, commercial
or political. the former – in good research style – tend towards reductionism and
concentrate on specific, detailed aspects. commercial publications tend to empha-
size the positive aspects and they tend to put promise above practice. Given the ever
increasing pace of technology development and recent successes of new wireless
technologies, some pundits predict large-scale spectrum scarcity, potentially lead-
ing to economic catastrophe. Although economic theory has a hard time explaining
recent events that shook the world economy, the notion of spectrum scarcity is intui-
tively acceptable, even if not correct or immediately relevant.