64 results
Search Results
2. Superposition Modulated Cooperative Diversity for Half-duplex Scenario
- Author
-
Koji Ishii
- Subjects
Ideal (set theory) ,Theoretical computer science ,Data_CODINGANDINFORMATIONTHEORY ,Outage probability ,Topology ,Cooperative diversity ,Superposition principle ,Superposition modulation ,Dirty paper coding ,Electrical and Electronic Engineering ,Rotation (mathematics) ,Computer Science::Information Theory ,Mathematics ,Constellation - Abstract
In this paper, the cooperative diversity with superposition modulation, which has been proposed as an instance of “dirty paper coding”, is theoretically analyzed using the outage probability. However, the conventional system with superposition modulation cannot ideally perform dirty paper coding. Thus, we propose to apply constellation rotation technique and iterative processing to the superposition modulated system, which yields a performance close to the ideal one.
- Published
- 2007
- Full Text
- View/download PDF
3. The Class Ratio Modeling Method of Non-Equigap GM(1,1) Model*.
- Author
-
Kang Xiaoqing, Wei Yong, and Shen Ying
- Subjects
MODELING languages (Computer science) ,DATABASES ,MATHEMATICS ,EQUATIONS ,ACCURACY - Abstract
Based on the analysis of the influence of the class ratio modeling to the model smoothness in equigap model, in this paper we put forward a practical method of raising non- equigap grey prediction precision that we model to non-equigap GM (1,1) model by the class ratio modeling method ,at the same time, propose a method that we predict the non-equigap model by carrying out prediction to the temporal series index with linking the suitable model, which is utilized to optimize and forecast the non- equigap model with the new method. Ultimately, examples that are cited from the actual works show that the method is good in stimulation and prediction precision. [ABSTRACT FROM AUTHOR]
- Published
- 2009
4. Analysis of Time Delay Stability for Telepresence System.
- Author
-
Wensong Hu, Min Zhu, and Zhuo Fang
- Subjects
TIME delay systems ,TELEPRESENCE ,REMOTE control ,EQUATIONS ,MATHEMATICS - Abstract
This paper presents a new analysis method on space force telepresence teleoperation system. Since there exists huge time delay in the communication channel between the master and slave sides, it will lead to the system instability and reduce operation ability. The study of this issue is to find out the factors that impact the system unconditional stability. The study method is to use the difference and differential equations, which are found on telepresence system time delay dynamic equation. At the end of this study, this paper illustrates a simulation results to verify the analysis method. [ABSTRACT FROM AUTHOR]
- Published
- 2009
5. A New Information Hiding Method for Image Watermarking Based on Mojette Transform.
- Author
-
Cui Zhang, Junyu Dong, Jining Li, and Autrusseau, Florent
- Subjects
DIGITAL watermarking ,DATA encryption ,MATHEMATICS ,CRYPTOGRAPHY ,COMPUTER networks - Abstract
This paper describes a new image watermarking method for which is suitable for both copyright protection and information hiding. The presented method is based upon the morphological mathematics properties of the Mojette Transform and the Mojette Phantoms. The main properties of the Mojette transform are briefly introduced and the concept of linked phantoms which depicts the null space of the operator is presented. In this paper the Mojette Phantoms can be used not only as the embeded watermark, but also can be used as the mark which is inscribed with some certain information, e.g. Chinese characters. Corresponding embedding and extractions of either the mark or the hidden message are then described. Finally, experimental results are presented in the last section. [ABSTRACT FROM AUTHOR]
- Published
- 2010
6. Research of Agent based Intrusion Detection Model of NDP.
- Author
-
Piao Long, Sun FuXiong, and Chen Xin
- Subjects
INTRUSION detection systems (Computer security) ,COMPUTER network architectures ,ALGORITHMS ,INTERNET ,MATHEMATICS - Abstract
To the security threats existed in Neighbor Discovery Protocol(NDP) of IPv6, the paper provides a distributed intrusion detection model based on Multi- Agent(MAIDM). The algorithm and Mechanism of agent's studying and detecting is described in detail based on a mechanism of Abnormity Presenting and Abnormity Triggering. Experimental results demonstrate the efficiency of the proposed MAIDM. [ABSTRACT FROM AUTHOR]
- Published
- 2009
7. Research on Cerebral Aneurysm Detection Based on OPTA Algorithm.
- Author
-
Jian Wu, Guangming Zhang, Jie Xia, and Zhiming Cui
- Subjects
INTRACRANIAL aneurysms ,ALGORITHMS ,SKELETON ,BIFURCATION theory ,MATHEMATICS - Abstract
It is the key step of the cerebral aneurysm recognition system to locate the cerebral aneurysm accurately and fast onto the image. A new detection method of cerebral aneurysm, which is based on the improved thinning algorithm, is proposed after analyzing the morphological characteristics of cerebral aneurysm fully in the paper. In this new detection method, the improved OPTA algorithm is used to get the skeleton tree of blood vessel firstly, and then cerebral aneurysms are detected by searching the skeleton tree. After doing lots of experiments, the cerebral aneurysm can be detected well by using this new method, which provides a premise for cerebral aneurysm recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2009
8. Extensional Completed L-measure and Its Choquet Integral Regression Model.
- Author
-
Hsiang-Chuan Liu, Chin-Chun Chen, Yu-Du Jheng, and Shih-Neng Wu
- Subjects
CHOQUET theory ,REGRESSION analysis ,FUZZY algorithms ,VECTORS (Calculus) ,MATHEMATICS - Abstract
The well known fuzzy measures, λ-measure and P-measure, have only one formulaic solution. A multivalent fuzzy measure with infinitely many solutions based on P-measure was proposed by our previous work, called completed L-measure. In this paper, a further improved fuzzy measure, called extensional completed L-measure, is proposed. This new fuzzy measure is proved that it is not only an extension of completed L-measure but also can be considered as an extension of the λ-measure and P-measure. For evaluating the Choquet integral regression models with our proposed fuzzy measure and other different ones, a real data experiment by using a 5-fold cross-validation mean square error (MSE) is conducted. The performances of Choquet integral regression models with fuzzy measure based on extensional completed L-measure, completed Lmeasure, L-measure, λ-measure, and P-measure, respectively, a ridge regression model, and a multiple linear regression model are compared. Experimental result shows that the Choquet integral regression models with respect to extensional completed L-measure based on γ-support outperforms others forecasting models. [ABSTRACT FROM AUTHOR]
- Published
- 2009
9. RBAC modeling based on B/S architecture and the application in SET payment system.
- Author
-
Li Hongxin and Guan Keqing
- Subjects
DIRECT deposit payments ,BANKING industry automation ,ELECTRONIC funds transfers ,COMPUTER network protocols ,MATHEMATICS - Abstract
With the development of Internet and Ecommerce, the issue of safety in electronic payment receives a wide publicity. In security protocols of electronic payment, SET protocol can provide a high level security, but it is complicate to implement. To improve the SET payment system, this paper proposed an implementation scheme of Core RBAC based on B/S architecture. Taking this as foundation, we introduce RBAC model into SET payment system, and propose a corresponding implementation framework. We try to simplify the payment process of SET by that. [ABSTRACT FROM AUTHOR]
- Published
- 2009
10. Maximum End-to-End Delay of QTNPOSS Network for Multimedia Traffic.
- Author
-
Ke Xiong, Yu Zhang, Zhengding Qiu, Shenghui Wang, and Dongmei Sun
- Subjects
END-to-End Negotiation Protocol (Computer network protocol) ,MATHEMATICS ,SWITCHING circuits ,NUMERICAL analysis ,QUEUEING networks - Abstract
To improve the Quality of Service (QoS) ability of TNPOSS (To Next-hop Port Sequence Switch) network, this paper proposes a QoS-enhanced TNPOSS (QTNPOSS) network model by introducing Fractal Leak Bucket (FLB) shaper and Weighted Fair Queuing (WFQ) scheduler. In the proposed model, packets of multimedia traffic are shaped by the FLB shaper and scheduled by the WFQ scheduler. Moreover, the service curve and the Maximum E2E delay of QTNPOSS network are given by using the mathematical tool of the network calculus. Numerical analysis shows that both the long-range dependence (LRD) property of multimedia traffic and the WFQ weight have influences on the maximum E2E delay, and the WFQ weight influences the maximum E2E delay more greatly than the LRD property does. [ABSTRACT FROM AUTHOR]
- Published
- 2009
11. Sub-optimum Analysis and Trusted Network.
- Author
-
Zengtang Qu and Ping He
- Subjects
COMPUTER network security ,SECURITY systems industry ,DATA protection ,MATHEMATICS ,EQUATIONS - Abstract
The paper describes sub-optimum method for trusted computing models of network security. trusted computing of network security is performed under both optimum and non-optimum learning. The task of selection is done using a knowledge-based network under sub-optimum degree learning. The methodology for trusted models involves minimization of non-optimum and maximization of optimum, defined in term of sub-optimum degree evaluation indices, in connectionist framework. For the non-optimum analysis method, the algorithm does not need know the number of cluster a priori. It is considered that the nonoptimum network does not exclude the targets and the results of sub-optimum in practice. The formation of nonoptimum network serves as the basis for existence of optimum network in uncertainty. Besides, the various characteristics and functions of the non-optimum network can be measured from the sub-optimum network. By summing the practice, this paper has also come at suboptimum principle of the network, established the conception of sub-optimum thresholds and put forward three theorems about sub-optimum parameters. Through the concept of sub-optimum, Finally, it analyzes the actual significance of trusted network. [ABSTRACT FROM AUTHOR]
- Published
- 2009
12. Distributed Virtual Conference Stereo Audio Reconstruction.
- Author
-
Bo Hang, Lei Yuan, and Zhao Wu
- Subjects
INTERNET ,ALGORITHMS ,COMPUTER systems ,CLIENTS ,MATHEMATICS - Abstract
To enhance the realistic experience of virtual conference, this paper proposed a distributed virtual conference stereo audio reconstruction model. The spatial audio parameters inter-aural level difference (ILD) is used to reconstruct the spatial sound field for each listener. The distributed synthesis system is designed to get a lower network payload. [ABSTRACT FROM AUTHOR]
- Published
- 2009
13. A Receiver Deniable Encryption Scheme.
- Author
-
Bo Meng and JiangQing Wang
- Subjects
DATA encryption ,DATA protection ,COMPUTER network protocols ,MATHEMATICS ,CRYPTOSYSTEMS - Abstract
A practical efficient receiver deniable encryption scheme based on BCP commitment scheme and idea of Klonowski et al. is proposed in the paper. The analysis of the proposed schemes is also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2009
14. Limited Feedback Based on Tree-structured Codebook for MIMO Systems over Time-varying Channels.
- Author
-
Min Wu, Chao Shen, and Zhengding Qiu
- Subjects
MIMO systems ,TIME-varying systems ,BEAMFORMING ,GEOMETRY ,MATHEMATICS - Abstract
In this paper, we propose a novel limited feedback approach for MIMO systems with transmit beamforming over time-varying channels, where the optimal beamforming vector of the current frame is selected from the son-codewords of the codewords neighboring to previous beamforming codeword. The proposed approach exploits the channel temporal correlation to improve the CSI quantized precise. The simulation results show that the proposed approach can efficiently improve the BER performance relative to the common feedback approach, and the feedback rate can be further reduced under some conditions. Moreover, the effect of Doppler frequency shift on the performance of the proposed approach is analyzed. [ABSTRACT FROM AUTHOR]
- Published
- 2009
15. Attribute Reduction based on Generalized Similarity Relation in Incomplete Decision System.
- Author
-
Yang Jilin, Qin Keyun, and Du Weifeng
- Subjects
MATHEMATICS ,SET theory ,INFORMATION storage & retrieval systems ,BINARY control systems ,DECISION making - Abstract
Attribute reduction is one of important problem in study of theory and application of rough set. According to the generalized similarity relation, concepts of distributive consistent set and positive region consistent set are introduced and the relative basis properties are discussed in incomplete decision system. The methods of distributive reduction and positive region reduction are given by discernibility functions. In incomplete decision system, the condition which depicts equivalence between distributive consistent set and positive region consistent set is given. Special examples to illustrate content of discussion in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2009
16. Analysis on Algorithm of Wavelet Transform And Its Realization in C Language.
- Author
-
Zhao Hong-tu and Xi Dong-mei
- Subjects
WAVELETS (Mathematics) ,MATHEMATICS ,ALGORITHMS ,C (Computer program language) ,PROGRAMMING languages - Abstract
Wavelet analysis is a branch of mathematics which formed and developed in the late 1980s. With the development and maturation of wavelet theory and application, wavelet transform has been widely applied to most aspects of engineer, but usually only use the MATLAB wavelet toolbox to do program. In order to reflect the algorithm and connotation of wavelet transform deeply, we should write the program ourselves to realize some functions. In this paper, we will introduce the theory and algorithm analysis on Mallat algorithm of wavelet transform. And then, we will give the program flowchart of this algorithm which is realized in C language. Finally we will take the DB2 wavelet for example to program the wavelet transform in C language, and using MATLAB to draw waveform figures of using this algorithm and MATLAB wavelet toolbox to compare the results. [ABSTRACT FROM AUTHOR]
- Published
- 2010
17. The Basis Algebra and Approximation Operator in L-Fuzzy Rough Set.
- Author
-
Wu Zhengjiang, Du Weifeng, and Qin Keyun
- Subjects
ALGEBRA ,FUZZY algorithms ,MATHEMATICS ,BINARY control systems ,AXIOMATIC set theory - Abstract
In the constructive approach of rough set, there exists three fundamental definition: approximation operator, binary relation on the universe and basis algebra. In this paper, we mainly discuss the the relation between the basis algebra and approximation operators in L-fuzzy rough set. [ABSTRACT FROM AUTHOR]
- Published
- 2009
18. An Improved Molecular Solution for the Partition Problem.
- Author
-
Xu Zhou and ShuangShuang Huang
- Subjects
ALGORITHMS ,DNA ,MATHEMATICS ,ENCODING ,POLYNOMIALS ,MOLECULAR biology - Abstract
Now the algorithms based on DNA computing for partition problem always converted the elements into binary number and then carry on mathematics operations on them. In this paper, our main purpose is to give an improved molecular solution for the partition problem. Our new algorithm does not need mathematics operations. So the algorithm is easier and the number of the operation is reduced. Besides, the time used in the biological experiment is less than before. In order to achieve this, we design a new encoding method. We also design a special parallel searcher to search the legal DNA strands in the solution space. [ABSTRACT FROM AUTHOR]
- Published
- 2010
19. Risk Analysis Method:A Fuzzy Approach.
- Author
-
Yong Deng, Xiaoyan Su, Wen Jiang, Jianling Xu, and Peida Xu
- Subjects
FUZZY numbers ,FUZZY sets ,MATHEMATICS ,ARITHMETIC ,FUZZY algorithms - Abstract
In this paper, we present a new fuzzy risk analysis method based on generalized fuzzy numbers. Firstly, we define new arithmetic operations between generalized fuzzy numbers. Then, we propose a new method to measure the degree of similarity between generalized fuzzy numbers. Finally, we apply the new arithmetic operations between generalized fuzzy numbers and proposed similarity measure to develop a new method to deal with fuzzy risk analysis problems. [ABSTRACT FROM AUTHOR]
- Published
- 2010
20. Genneralized Fuzzy Subalgebras of Boolean Algebras.
- Author
-
Shaoquan Sun
- Subjects
FUZZY algorithms ,BOOLEAN algebra ,MATHEMATICAL analysis ,HOMOMORPHISMS ,MATHEMATICS - Abstract
In this paper, the concepts of generalized fuzzy subalgebras and generalized fuzzy ideals of Boolean algebras are introduced, A necessary and sufficient condition for a fuzzy subset of Boolean algebra to be a generalized fuzzy subalgebra (ideal) is stated, and images and inverse-images of generalized fuzzy subalgebra (ideal) under Boolean algebra homomorphism are studied. [ABSTRACT FROM AUTHOR]
- Published
- 2009
21. First Order Deceptive Problem of Ant Colony Optimization Algorithm.
- Author
-
Chen Ling, Sun HaiYing, and WangSu
- Subjects
STOCHASTIC convergence ,PHEROMONES ,ITERATIVE methods (Mathematics) ,MATHEMATICS ,ALGORITHMS - Abstract
This paper shows that the first order deceptive problem of ant colony algorithm satisfies value convergence under certain initial pheromone distribution, but does not satisfy solution convergence. We also estimate the expected number of iterations required to reach the optimal solution by ACO on the first-order deceptive systems taking the n-bit trap problem as the test instance. We prove that such expected number of iterations required is O(n.log n), here n is the size of the problem. [ABSTRACT FROM AUTHOR]
- Published
- 2009
22. One Method for Judging the Reasonableness of Effect Measure Algorithms.
- Author
-
Xinhai Kong and Yong Wei
- Subjects
ALGORITHMS ,ELECTRONIC data processing ,DECISION making ,MATHEMATICS - Abstract
The concept of relative distance is put forward in this paper. And we also present a criterion to judge the effect measure algorithms whether are reasonable or not through the relative distance whether change. According to the criterion, we come to realize that the traditional upper limit effect measure algorithm is reasonable, while the traditional lower and medium limit effect measure algorithm are unreasonable. At the same time, using the judging criterion to check some new effect Measure algorithms, we find out that some are reasonable, and some are still unreasonable. We further discuss the differences among these reasonable algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2009
23. Texture Classification using Curvelet Transform.
- Author
-
Liran Shen and Qingbo Yin
- Subjects
WAVELETS (Mathematics) ,MATHEMATICS ,VECTOR algebra ,ARITHMETIC mean ,MATHEMATICAL singularities - Abstract
Texture classification has played an important role in many real life applications. Now, classification based on wavelet transform is being very popular. Wavelets are very effective in representing objects with isolated point singularities, but failed to represent line singularities. Recently, ridgelet transform which deal effectively with line singularities in 2-D is introduced. But images often contain curves rather than straight lines, so curvelet transform is designed to handle it. It allows representing edges and other singularities along lines in a more efficient way when compared with other transforms. In this paper, the issue of texture classification based on curvelet transform has been analyzed. One group feature vector can be constructed by the mean and variance of the curvelet statistical features, which are derived from the sub-bands of the curvelet decomposition and are used for classification. Experimental results show that this approach allows obtaining high degree of success rate in classification. [ABSTRACT FROM AUTHOR]
- Published
- 2009
24. The Topological Structure of Approximation Operators on a CCD Lattice.
- Author
-
Gao Yan, Du Weifeng, Yang Jilin, and Qin Keyun
- Subjects
DISTRIBUTIVE lattices ,AXIOMS ,FUZZY algorithms ,MATHEMATICS ,INFORMATION resources - Abstract
Rough sets deal with the vagueness and granularity in information systems. Reference[3] discusses rough approximations on a complete completely distributive lattice(CCD lattice for short) and brings generalizations of rough sets into a unified framework. This paper is devoted to the discussion of the relationship between approximations and topologies on a CCD lattice. It is proved that the set of all upper approximations (or of lower approximations) with respect to a partition consists of a clopen topology. [ABSTRACT FROM AUTHOR]
- Published
- 2009
25. Dominance-based Rough Set Approach in Set-valued Ordered Information Systems.
- Author
-
Chen Zichun, Qin Keyun, Du Weifeng, and Yang Jilin
- Subjects
DECISION logic tables ,INFORMATION resources ,MATHEMATICS ,ROUGH sets ,DECISION making - Abstract
Set-valued information systems are generalized single-valued information systems. In this paper, by introducing a type of dominance relation to set-valued ordered information systems, we establish dominance-based rough set approach and propose a ranking approach for all objects based on the dominance classes. Furthermore, we discuss dominance rules, propose attribute reductions of consistent set-valued ordered decision tables, and obtain the approach to compute decision reductions. [ABSTRACT FROM AUTHOR]
- Published
- 2009
26. Texture Segmentation Methods Based on Combinatorial of Morphological and Statistical Operations.
- Author
-
Kumar, Vakulabharanam Vijaya, Reddy, B. Eswara, Rao, A. Nagaraja, and Raju, U. S. N.
- Subjects
COMPUTER simulation ,ALGORITHMS ,COMPUTER systems ,MEDIAN (Mathematics) ,MATHEMATICS - Abstract
In this paper we introduce a novel and simple image segmentation schemes that are based on combinations of morphological and statistical operations. Mathematical morphology is very attractive for this purpose because it efficiently deals with geometrical features like as size, shape, contrast or connectivity that can be considered as segmentation oriented features. The present paper derives equations on the basis of dilation, erosion and median or mean which finally results segmentation. The segmentation algorithms are divided into three groups based on number of operations and type of operations, used. Some of the proposed methods of segmentation are useful for edge based segmentation while the other is useful for region based segmentation. The segmentation quality is improved, by dynamically changing the combinatorial coefficients that are used in equations. The present combinatorial method is applied on Brodatz textures and a good segmentation is resulted. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
27. TL-subalgebras and TL-ideals of BCK- algebras.
- Author
-
Shaoquan Sun and Fang He
- Subjects
MATHEMATICAL analysis ,FUZZY algorithms ,HOMOMORPHISMS ,MATHEMATICS ,BROUWERIAN algebras - Abstract
In this paper, the concepts of TL-subalgebras, TLideals and TL-implicative ideals of BCK-algebra are introduced, A necessary and sufficient condition for a Lsubset of BCK-algebra to be a L-subalgebra (ideal, implicative ideal) is stated, and images and inverse-images of TL-subalgebra under BCK-algebra homomorphism are studied. Also, several characterizations of TL-ideals (implicative ideals) are given. Where T is an arbitrary infinitely -distributive t-norm on a given complete Brouwerian lattice L. [ABSTRACT FROM AUTHOR]
- Published
- 2009
28. Reflections on and discussions about ‘Luminous Life: A New Model of Humanistic Psychotherapy’
- Author
-
Partha Choudhury and Mythili Hazarika
- Subjects
Forgiveness ,Psychoanalysis ,Process (engineering) ,lcsh:RC435-571 ,media_common.quotation_subject ,Humanistic psychology ,Culture ,Creativity ,Mental health ,Article ,Feedback ,Self-help ,Negotiation ,Orientation (mental) ,lcsh:Psychiatry ,Self-Help ,Mathematics ,media_common - Abstract
This paper is an attempt to introduce a new approach in Humanistic Psychotherapy. It grew out of a psychiatry consultant's years of work in individual psychotherapy with the patients and got published in a self-help format. Later a clinical psychology consultant read the book and reflected in detail on it. Then the colleagues contacted each-other and had some discussions on the reflections. Few patients' feedback was also included. Initially there are two chapters of Introduction and Humanistic Approach to Mental Health Problems. The major modules in the book comprise Health, Forgiveness, Self, Connections, Will-Power, Relationships, and Living with the Family. The additional modules include Time, Negotiation, Creativity, and Celebrating the Common Person. Also there are two final modules, Orientation for a Possible Future Culture and Summing Up. The paper narrates the entire process of reflection and the related discussion and highlights the major points of this new model of therapy.
- Published
- 2019
29. Bitmap Vectorization and Realization of Shoes Style.
- Author
-
Wan Pengbo, Jia Haichun, and Peng Wenli
- Subjects
FOOTWEAR ,INTEGER programming ,MATHEMATICS ,GENETIC algorithms ,ELECTROPLATING - Abstract
Bitmap vectorization is the key technique for shoes remodeling design and color matching during shoes design. In this paper through experiments, Vectorizing methods and techniques for black & white bitmap and color bitmap of shoes style are studied, the main influencing factors for effect of vectorization are analyzed, fast and efficient vectorizing methods for shoes image are summarized. All these provide technical support to recycle the effect drawing of shoes style. [ABSTRACT FROM AUTHOR]
- Published
- 2009
30. Improved Algorithm for Second Generation Wavelet Transform and Image Denosing.
- Author
-
Wu Chun and Wang Wenbo
- Subjects
ALGORITHMS ,WAVELETS (Mathematics) ,POLYNOMIALS ,COEFFICIENTS (Statistics) ,MATHEMATICS - Abstract
An improved algorithm for second generation wavelet transform is proposed by adopting the lifting scheme and least square orthogonal polynomial fitting. For designing predicting (or updating) coefficients of the lifting scheme, the orthogonal polynomials are taken as a basis, and the predicting (or updating) coefficients are solved by using least square curve fitting to fit the apoximate signals (or detail signals) of wavelet transform. The numerical experiment shows the method is a powerful method for denoising image, which combines second wavelet transform based on optimum fitting estimation and image nonlinear enhancement algorithm, but also it can compensate the foible of soft threshold denoising and keep the feature of image edge well. The proposed method is proved to be effectivly. [ABSTRACT FROM AUTHOR]
- Published
- 2009
31. Two-Party Attribute-based Key Agreement Protocol in the Standard Model.
- Author
-
Hao Wang, QiuLiang Xu, and Xiu Fu
- Subjects
CRYPTOGRAPHY ,MATHEMATICS ,CRYPTOSYSTEMS ,DATA encryption ,COMPUTER network protocols - Abstract
We present a new two-party attribute-based key agreement protocol that is secure without the random oracle model in groups equipped with a bilinear map. The attribute-based key agreement scheme is one type of the identity-based key agreement scheme, in which the identity can be viewed as a set of descriptive attributes. These kinds of schemes provide some new properties, such as hiding the identity information of the individual, increasing the flexibility of key management, and providing efficient means to revoke users from the system. [ABSTRACT FROM AUTHOR]
- Published
- 2009
32. Based on Binocular Stereo Vision of Moving Target Detection.
- Author
-
Zhiyong Wang, Tianding Chen, and Changhong Yu
- Subjects
BINOCULAR vision ,VIDEOCONFERENCING ,GAUSSIAN distribution ,MATHEMATICS ,ROBUST control - Abstract
Moving target detection and tracking in videose quences are to determine whether there are exercise objectives and monitor exercise goals and exercise track temporal and spatial variation. In moving target detection, the commonly used method has the background difference method and the inter-frame difference method. This paper analyzes their advantages and disadvantages of adopting an access function for target detection. Through the establishment and updating the background model, using of the principle of binocular stereo vision matching the characteristics of implementation goals, dynamic shadow removal of the target, such as steps to improve environmental changes in the sport of target detection accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2009
33. A new reconstruction method based on the volume-based approach.
- Author
-
Baozhi Xie, Liping Chen, and Liucan Chen
- Subjects
ENGINEERING drawings ,ALGORITHMS ,MATHEMATICS ,GRAPHIC arts ,CYLINDER (Shapes) - Abstract
When using volume-based approach to reconstruct 3D model by engineering drawings, some lost projection lines of a primitive feature parts will result in incorrect recognitions of a complex part, so preprocess of engineering drawings will be necessary. The approach presented in this paper proposes an iterative procedure of pattern recognition and projection mending. By the process, feature parts will be recognized easily with their integrated information. [ABSTRACT FROM AUTHOR]
- Published
- 2009
34. Research in Irreversible Depletion Model Based on the Blood of Industry.
- Author
-
Xuejun Wu and Jun Lu
- Subjects
PETROLEUM industry ,REGRESSION analysis ,FINANCIAL crises ,MATHEMATICS ,FUZZY relational equations - Abstract
Few people would deny that the world runs on oil. Oil, regarded as the blood of industry, may cause economic crises, and even lead to conflicts and wars. Three applicable models and several feasible policies are presented to settle the problem. We devise the Irreversible Depletion Model, and use global statistics data in logistic regressions to predict the total ultimate oil recovery. Relying on the estimated cumulative production, we make a prediction of the remaining ultimate recovery, and finally obtain the estimate of depletion year. We conclude that the prediction of the total ultimate Recovery equals 3.402Tbl and the depletion year is in 2080. As a result, our model is robust. [ABSTRACT FROM AUTHOR]
- Published
- 2009
35. Research on Female Neck Rhizosphere Line of Virtual Mannequin Based on Point-Cloud Data
- Author
-
Bingfei Gu, Guolian Liu, and Pinying Gu
- Subjects
business.industry ,Datum reference ,Point cloud ,STRIDE ,Girth (geometry) ,Collar ,Software ,Artificial Intelligence ,Computer graphics (images) ,Media Technology ,Point (geometry) ,Electrical and Electronic Engineering ,Line (text file) ,business ,Simulation ,Mathematics - Abstract
With the rapid development of computer network and information technology, traditional clothing industry has taken a giant stride forward to computer information and digitization. In this paper, 250 3D point-cloud photos of young females were selected as subjects, and related characteristic points of neck rhizosphere (including front neck point, side neck point and back neck point) were determined. Then the height size, width size, thickness size and girth size of characteristic points were measured by the software named Imageware 12.1. At last, with software called Excel and SPSS, the height rules of characteristic points were analyzed, front and back neck rhizosphere were obtained by width and thickness sizes of characteristic points. The research in this paper has laid the foundation for building female neck rhizosphere line of virtual mannequin which provides datum line and basic sizes for 3D collar patterns
- Published
- 2014
- Full Text
- View/download PDF
36. Laser Vision-Based Plant Geometries Computation in Greenhouses
- Author
-
Yu Zhang and Xiaochan Wang
- Subjects
Point cloud ,Centroid ,Laser ,law.invention ,Length measurement ,Artificial Intelligence ,law ,Media Technology ,Curve fitting ,Leaf angle distribution ,Calibration ,Point (geometry) ,Electrical and Electronic Engineering ,Simulation ,Mathematics ,Remote sensing - Abstract
Plant growth statuses are important parameters in the greenhouse environment control system. It is time-consumed and less accuracy that measuring the plant geometries manually in greenhouses. To find a portable method to measure the growth parameters of plants portably and automatically, a laser vision-based measurement system was developed in this paper, consisting of a camera and a laser sheet that scanned the plant vertically. All equipments were mounted on a metal shelf in size of 30cm*40cm*100cm. The 3D point cloud was obtained with the laser sheet scanning the plant vertically, while the camera videoing the laser lines which projected on the plant. The calibration was conducted by a two solid boards standing together in an angle of 90. The camera’s internal and external parameters were calibrated by Image toolbox in MatLab®. It is useful to take a reference image without laser light and to use difference images to obtain the laser line. Laser line centers were extracted by improved centroid method. Thus, we obtained the 3D point cloud structure of the sample plant. For leaf length measurement, iteration method for point clouds was used to extract the axis of the leaf point cloud set. Start point was selected at the end of the leaf point cloud set as the first point of the leaf axis. The points in a radian of certain distance around the start point were chosen as the subset. The centroid of the subset of points was calculated and taken as the next axis point. Iteration was continued until all points in the leaf point cloud set were selected. Leaf length was calculated by curve fitting on these axis points. In order to increase the accuracy of curve fitting, bi-directional start point selection was useful. For leaf area estimation, exponential regression model was used to describe the grown leaves for sampled plant (water spinach) in this paper. To evaluate the method in a sample of 18 water spinaches, planted in the greenhouse (length 16 meter and width 8 meter) on the roof of library building in Nanjing Agricultural University, the lengths of 200 leaves and were measured manually and plotted versus their automatically measured counterparts. The accuracy of leaf lengths is 95.39% respectively. For the leaf length measurement, the average error is less than 5mm which is in the boundary of error. A few laser measurement results take on larger errors, because that some leaves were shaded from the others which make an effect on the curve fitting. In additional, the results are affected by the over-wide laser line. Manual measurement gave result information an accuracy of millimeter level, while laser measurement improved the measurement precision. For the leaf area estimation, the accuracy of modeling trained by 200 sampled leaves, is 81.9% with 50 testing sampled leaves. For the plant growth properties, plant height and canopy width are obtained by point clouds reconstruction of plant. The test experiment proved that laser vision-based method could be used on plants geometry measurement and growth monitoring in greenhouses. This method will improve visualization and digitalization of plants in greenhouses, and make a progress on greenhouse environment control system
- Published
- 2014
- Full Text
- View/download PDF
37. On an Orthogonal Space-Time-Polarization Block Code
- Author
-
Beata J. Wysocki, Sarah Spence Adams, and Tadeusz A. Wysocki
- Subjects
Block code ,Theoretical computer science ,Spacetime ,Space time ,Bit error rate ,Electrical and Electronic Engineering ,Quaternion ,Polarization (waves) ,Algorithm ,Polarization diversity ,Coding (social sciences) ,Mathematics - Abstract
Over the past several years, diversity methods such as space, time, and polarization diversity have been successfully implemented in wireless communications systems. Orthogonal space-time block codes efficiently combine space and time diversity, and they have been studied in detail. Polarization diversity has also been studied, however it is usually considered in a simple concatenation with other coding methods. In this paper, an efficient method for incorporating polarization diversity with space and time diversity is studied. The simple yet highly efficient technique is based on extending orthogonal space-time block codes into the quaternion domain and utilizing a description of the dual-polarized signal by means of quaternions. The resulting orthogonal space-timepolarization block codes have given promising results in simulations. In the example described in this paper, the achievable performance gain for two transmit and one receive antennas is approximately 6 dB at a bit error rate of 10-4 when compared with the Alamouti code.
- Published
- 2009
- Full Text
- View/download PDF
38. Cell Site Power Characterization for Multi-rate Wireless CDMA Data Networks Using Lognormal Approximation
- Author
-
Ashraf S. Hasan Mahmoud
- Subjects
Cumulative distribution function ,Statistics ,Log-normal distribution ,Path loss ,Probability density function ,Electrical and Electronic Engineering ,Radio resource management ,Noise (electronics) ,Random variable ,Algorithm ,Standard deviation ,Mathematics - Abstract
An analytical model is developed to solve the power-rate assignment problem for multi-rate CDMA systems and calculate the probability density function (PDF) for the downlink traffic power as a function of the bit rate assignment scheme, the target link quality figure, and the other network parameters. This paper proposes the use of the lognormal random variable as an approximation for an empirical parameter (denoted herein by fi) that is needed to solve the energy per-bit to noise spectral power density equation for scheduled data bursts. The approximation depends on matching the mean and standard deviation of the lognormal variable to the mean and standard deviation of the empirical parameter fi where the matching depends only the radio frequency (RF) path loss model and the shadowing process standard deviation. The paper presents example calculations for the cumulative probability distribution (CDF) of the downlink traffic power and outage probabilities for a general CDMA system assuming specific scenarios of data bit rate assignments. The study also compares between analytical results and those obtained using conventional Monte-Carlo simulations. Comparisons indicate that the developed model provides an appropriate mechanism to approximate both the PDF or CDF, and the outage probability for the cell site total downlink traffic power.
- Published
- 2008
- Full Text
- View/download PDF
39. Routing in Optical and Non-Optical Networks using Boolean Satisfiability
- Author
-
Mokhtar Aboelaze, Bashar Al Rawi, and Fadi Aloul
- Subjects
#SAT ,Theoretical computer science ,Link-state routing protocol ,Shortest path problem ,Suurballe's algorithm ,K shortest path routing ,Electrical and Electronic Engineering ,Pathfinding ,Boolean satisfiability problem ,Algorithm ,Dijkstra's algorithm ,Mathematics - Abstract
Today, most routing problems are solved using Dijkstra’s shortest path algorithm. Many efficient implementations of Dijkstra’s algorithm exist and can handle large networks in short runtimes. Despite these advances, it is difficult to incorporate user-specific conditions on the solution when using Dijkstra’s algorithm. Such conditions can include forcing the path to go through a specific node, forcing the path to avoid a specific node, using any combination of inclusion/exclusion of nodes in the path, etc. In this paper, we propose a new approach to solving the shortest path problem using advanced Boolean satisfiability (SAT) techniques. SAT has been heavily researched in the last few years. Significant advances have been proposed and has lead to the development of powerful SAT solvers that can handle very large problems. SAT solvers use intelligent search algorithms that can traverse the search space and efficiently prune parts that contain no solutions. These solvers have recently been used to solve many problems in Engineering and Computer Science. In this paper, we show how to formulate the shortest path problem in non-optical networks as a SAT problem. We also show how to use SAT in finding routing and wavelength assignments in optical networks. Our approach is verified on various network topologies. The results are promising and indicate that using the proposed approach can improve on previous techniques.
- Published
- 2007
- Full Text
- View/download PDF
40. Intra-psychic disarray of gender identity and sexual orientation: in the process of coming out as transsexual
- Author
-
Soumitra Ghosh and Budhiswatya Shankar Das
- Subjects
understanding ,Psychoanalysis ,Process (engineering) ,lcsh:RC435-571 ,media_common.quotation_subject ,Transition (fiction) ,transgender ,Reflexive pronoun ,Transsexual ,Psychic ,Negotiation ,confusion ,lcsh:Psychiatry ,Transgender ,Sexual orientation ,disclosure ,media_common ,Mathematics - Abstract
The present paper takes a step towards understanding the confusion that a transgender individual undergoes, while coming in terms with one's gender identity. Here, we will be presenting a case study with few anecdotes to put forward concepts of negotiation, self-understanding, and disclosure. We will refer to the individual as ‘him’ as the person identifies himself as a male and is in the process of transition. Here, we have introduced the coming out process as a one-way and two-way process.
- Published
- 2020
41. The Annihilator and its Structure in Lattice Implication Algebras.
- Author
-
Hua Zhu, Weifeng Du, and Jianbin Zhao
- Subjects
ALGEBRA ,LATTICE theory ,HOMOMORPHISMS ,MATHEMATICAL functions ,MATHEMATICS - Abstract
The notion of annihilator of lattice implication algebras is proposed. An annihilator is proved to be an ideal and a sl ideal. Then the special characteristics of an annihilator are obtained. The relationships between an annihilator and an ideal, between the lattice implication homomorphism image of annihilator and the annihilator of lattice implication homomorphism image are discussed, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2010
42. The Revising Method for Fuzzy Judgment Matrix without Ordinal Consistency.
- Author
-
Xixiang Zhang, Guangxue Yue, Xiaojing Liu, and Fei Yu
- Subjects
FUZZY mathematics ,ORDINAL measurement ,DECISION making ,MATRICES (Mathematics) ,MATHEMATICS - Abstract
Ordinal consistency is the prerequisite of a fuzzy judgment matrix. Based on the transitivity of its superior relation, two concepts of non-transitive route number and non-transitive route contribution number were put forward. Through the nontransitive route number and non-transitive route contribution number guidance, a revising method for fuzzy judgment matrix without ordinal consistency was proposed, in which the irrational element can be identified. The revising method can help the decision-maker revise his/her judgment matrix effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2009
43. Efficient Codes for Writing Equal-bit Information in a WOM Twice
- Author
-
Zhongtao Li, Ru Jia, Shuai Zhao, and A. J. Han Vinck
- Subjects
Logarithm ,Code word ,Time data ,Upper and lower bounds ,Artificial Intelligence ,Media Technology ,Electrical and Electronic Engineering ,Arithmetic ,MATLAB ,Algorithm ,computer ,Coding (social sciences) ,Mathematics ,computer.programming_language - Abstract
In this paper, we concentrate on WOM coding for writing equal-bit information twice (WOM2E). We studied the definition and coding solution of WOM2E. We encoded information via a codeword table and found that WOM2E achieved a better WOM-rate. However, the codeword table for large WOM2E cells is difficult to determine. We also introduced the coding sum rate to define the WOM2E efficiency. The sum rate of WOM2E is the sum of the ratios of information bits to the number of cells each time data is written to memory. In order to obtain the maximum coding sum rate, we can utilize more cells. Furthermore, we discover that, as the number of cells in memory increases, the sum rate is perfectly asymptotic to the logarithm. We use Matlab to calculate the upper bound of the sum rate of WOM2E, and find that it has a value of 1.546
- Published
- 2014
- Full Text
- View/download PDF
44. Fast Approximation Algorithm for Restricted Euclidean Bottleneck Steiner Tree Problem
- Author
-
Zimao Li and Wenying Xiao
- Subjects
Mathematical optimization ,K-ary tree ,Approximation algorithm ,Computer Science::Computational Geometry ,k-minimum spanning tree ,Steiner tree problem ,Bottleneck ,Combinatorics ,symbols.namesake ,Tree (data structure) ,Artificial Intelligence ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Euclidean minimum spanning tree ,Media Technology ,symbols ,Mathematics::Metric Geometry ,Electrical and Electronic Engineering ,Computer Science::Data Structures and Algorithms ,Time complexity ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
Bottleneck Steiner tree problem asks to find a Steiner tree for n terminals with at most k Steiner points such that the length of the longest edge in the tree is minimized. The problem has applications in the design of wireless communication networks. In this paper we study a restricted version of the bottleneck Steiner tree problem in the Euclidean plane which requires that only degree-2 Steiner points are possibly adjacent in the optimal solution. We first show that the problem is NP-hard and cannot be approximated within unless P=NP, and provide a fast polynomial time deterministic approximation algorithm with performance ratio .
- Published
- 2014
- Full Text
- View/download PDF
45. Durational Evidence for Syllable Boundary of /n/ and /l/ in Text-to-Speech Synthesis
- Author
-
Fang Tian
- Subjects
Text to speech synthesis ,Artificial Intelligence ,Duration (music) ,Speech recognition ,Stress (linguistics) ,Media Technology ,Boundary (topology) ,Syllabic verse ,Electrical and Electronic Engineering ,Syllable ,Coda ,Mathematics - Abstract
The Text-to-Speech (TTS) system does rely on syllable boundary information for segmental duration. However, ambisyllabic consonants always pose a problem to TTS because the system requires clear syllable boundaries to segment and concatenate. In order to provide a possible solution to this problem, /n/ and /l/ in V L C A V R are chosen in this paper as the target to be examined whether their durations behave more like the syllabic onset or coda when comparing with the durational properties of /n/ and /l/ both as onsets in CV and codas in VC . As the syllable boundaries, onset C shows much more sensitivity to stress than coda C while coda C shows more sensitivity to syllabic position than onset C . Moreover, C A in V L C A V R is also influenced by two variables of stress and position as C in CV and VC . The results show that the intervocalic C A holds the properties of both the syllabic onset and coda, which states the possibility that intervocalic consonants should be considered as a rather independent concatenative unit in TTS synthesis.
- Published
- 2013
- Full Text
- View/download PDF
46. Optimized LSB Matching Steganography Based on Fisher Information
- Author
-
Yifeng Sun, Zhanzhan Gao, Guangming Tang, and Danmei Niu
- Subjects
Steganography ,business.industry ,Fisher kernel ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,MathematicsofComputing_NUMERICALANALYSIS ,Pattern recognition ,Quadratic function ,Mixture model ,symbols.namesake ,Artificial Intelligence ,Joint probability distribution ,Media Technology ,symbols ,Embedding ,Artificial intelligence ,Quadratic programming ,Electrical and Electronic Engineering ,Fisher information ,business ,Mathematics - Abstract
This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients of quadratic term are determined by the joint probability distribution of cover elements. By modeling the groups of elements in a cover image as Gaussian mixture model, the joint probability distribution of cover elements for each cover image is obtained by estimating the parameters of Gaussian mixture distribution. For each sub-Gaussian distribution in Gaussian mixture distribution, the quadratic term coefficients of Fisher information are calculated, and the optimized embedding transferring probabilities are solved by quadratic programming. By maximum posteriori probability principle, cover pixels are classified as the categories corresponding to sub-Gaussian distributions. At last, in order to embed message bits, pixels chose to add or subtract one according to the optimized transferring probabilities of the category. The experiments show that the security performance of this new algorithm is better than the existing LSB matching.
- Published
- 2012
- Full Text
- View/download PDF
47. A New Method for Edge Detection Based on the Criterion of Separability
- Author
-
Xikui Sun, Xujun Han, and Genyun Sun
- Subjects
Morphological gradient ,Pixel ,business.industry ,Boundary (topology) ,Pattern recognition ,Function (mathematics) ,Edge (geometry) ,Edge detection ,Artificial Intelligence ,Media Technology ,Canny edge detector ,Noise (video) ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Mathematics - Abstract
This paper presents a new edge detection algorithm based on calculating the difference value of two clusters. An edge is defined as a boundary that separates two adjacent regions that are relatively homogenous. For each image pixel, a window is first defined by placing the pixel at the center, and this window is partitioned into two sub- regions respectively in four different directions. An appropriate function is then selected to estimate the difference between each pair of two adjacent regions and to calculate edge information in terms of edge stre ngth and direction by maximizing the difference value. Finally, the non-maxima suppression is adopted to derive the output edge map. Experiments on a variety of noise contaminated images show that the new algorithm is more robust under noisy conditions. In addition, the proposed algorithm can also be applied to color or multi-spectral images.
- Published
- 2011
- Full Text
- View/download PDF
48. Solving the Antisymmetry Problem Caused by Pitch Interval and Duration Ratio in Geometric Matching of Music
- Author
-
Hwei-Jen Lin, Shwu-Huey Yen, Hsiao-Wei Chang, and Hung-Hsuan Wu
- Subjects
Geometric matching ,Pitch interval ,Speech recognition ,Measure (mathematics) ,humanities ,Transposition (music) ,Artificial Intelligence ,Duration (music) ,Antisymmetry ,otorhinolaryngologic diseases ,Media Technology ,Electrical and Electronic Engineering ,Representation (mathematics) ,Algorithm ,Mathematics - Abstract
M usic representation with pitch interval and duration ratio can achieve invarian ce to transposition and tempo. However, altering the pitch or duration of a single music note will cause an antisymmetry effect. This paper proposes a n a lgorithm for computing a geometric measure between two music fragments represented with pitch interval and duration ratio, with the capability of detect ing and reduc ing these effects to improve search effectiveness.
- Published
- 2010
- Full Text
- View/download PDF
49. Features Fusion Based on FLD for Face Recognition
- Author
-
Xiaopeng Wei, Qiang Zhang, Ziqi Wei, and Changjun Zhou
- Subjects
Image fusion ,Contextual image classification ,Orientation (computer vision) ,business.industry ,Computer science ,Gabor wavelet ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Linear discriminant analysis ,Facial recognition system ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial Intelligence ,Face (geometry) ,Principal component analysis ,Media Technology ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Mathematics - Abstract
In this paper, we introduced a features fusion method for face recognition based on Fisher’s Linear Discriminant (FLD). The method extract features by employed Two-Dimensional principal component analysis (2DPCA) and Gabor wavelets, and then fuse their features which are extracted with FLD respectively. As a holistic feature extraction method, 2DPCA performs dimensional reduction to the input dataset while retaining characteristics of the dataset that contribute most to its variance by eliminating the later principal components. On the contrary, the Gabor transformed face images exhibit strong characteristics of spatial locality, scale and orientation selectivity, which produce salient local features which are most suitable for face recognition. So, we use Gabor wavelets for the local features and then integrate Gabor features with 2DPCA features. In addition to, because FLD could make not only the scatter between classes as large as possible, but the scatter within class as small as possible, the features which are extracted by FLD are reliable for classification. And then, the FLD features of the Gabor and 2DPCA features leads to the application of the support vector machine (SVM) for classification. Finally, the computer simulation illustrates the effectivity of this method on three independent face databases.
- Published
- 2010
- Full Text
- View/download PDF
50. BER and Outage Probability of DPSK Subcarrier Intensity Modulated Free Space Optics in Fully Developed Speckle
- Author
-
Wasiu O. Popoola, Zabih Ghassemlooy, and Erich Leitgeb
- Subjects
Exponential distribution ,business.industry ,Optical communication ,Keying ,Antenna diversity ,Subcarrier ,Diversity gain ,Bit error rate ,Electronic engineering ,Electrical and Electronic Engineering ,Telecommunications ,business ,Free-space optical communication ,Mathematics - Abstract
In this paper a differential phase shift keying (DPSK) subcarrier intensity modulated (SIM) free space optical (FSO) link is considered in negative exponential atmospheric turbulence environment. To mitigate the scintillation effect, the selection combining spatial diversity scheme (SelC) is employed at the receiver. Bit error rate (BER) and outage probability (Pout) analysis are presented with and without the SelC spatial diversity. It is shown that at a BER of 10-6, a maximum diversity gain 25 dB is predicted. And about 60 dBm signal power is required to achieve an outage probability of 10-6, based on a threshold BER of 10-4.
- Published
- 2009
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.