Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 70 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. A Novel Binary Image Representation Algorithm by Using NAM and Coordinate Encoding Procedure and its Application to Area Calculating | |||
ZHENG Yunping,Mudar Sarem | |||
Information Science and System Science 02 April 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we propose a novel binary image representation algorithm by using the Non-symmetry and Anti-packing Model (NAM) and the Coordinate Encoding Procedure, which is called NAMCEP. By taking some idiomatic standard binary images in the field of image processing as typical test objects, and by comparing our proposed NAMCEP representation with the linear quadtree (LQT) representation and the binary tree (Bintree) representation, the experimental results presented in this paper show that the NAMCEP can not only reduce the average node numbers by 75.99% and 68.22% than the LQT and the Bintree, respectively, but also can simultaneously improve the average compression ratios by 422.44% and 163.62% than the LQT and the Bintree, respectively. Therefore, our proposed NAMCEP representation algorithm of binary images is much more effective than the LQT and the Bintree representation algorithms. As an application of the NAMCEP representation, we also present a novel NAMCEP-based algorithm for area calculating. The experimental results presented in this paper also show that the average executing time improvement ratio for area calculating of the proposed NAMCEP representation over that of the LQT representation and the Bintree representation is 71.92% and 65.91%, respectively. Therefore, our proposed NAMCEP-based algorithm for area calculating is much faster than the LQT-based algorithm and the Bintree-based algorithm for area calculating. | |||
TO cite this article:ZHENG Yunping,Mudar Sarem. A Novel Binary Image Representation Algorithm by Using NAM and Coordinate Encoding Procedure and its Application to Area Calculating[OL].[ 2 April 2013] http://en.paper.edu.cn/en_releasepaper/content/4533913 |
2. Constructions of Quasi-Cyclic Measurement Matrices Based on Array Codes | |||
LIU Xin-Ji,XIA Shutao | |||
Information Science and System Science 19 March 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Recently, Dimakis, Smarandache, and Vontobel indicated that the parity-check matrices of good LDPC codes can be used as emph{provably} good measurement matrices for emph{compressed sensing} (CS) under emph{basis pursuit} (BP).In this paper, we consider the parity-check matrix $H(r,q)$ of the emph{array codes}, one of the most important kind of structured LDPC codes.The emph{spark}, i.e. the smallest number of linearly dependent columns in a matrix, of $H(2,q)$ and $H(3,q)$ are determined and two lower bounds of the sparks of $H(r,q)$ are given for $rgeq4$.Moreover, we carry out numbers of simulations and show that many parity-check matrices of array codes and their submatrices perform better than the corresponding Gaussian random matrices.The proposed measurement matrices have perfect quasi-cyclic structures and can make the hardware realization convenient and easy, thus having great potentials in practice. | |||
TO cite this article:LIU Xin-Ji,XIA Shutao. Constructions of Quasi-Cyclic Measurement Matrices Based on Array Codes[OL].[19 March 2013] http://en.paper.edu.cn/en_releasepaper/content/4529603 |
3. The general theory of three-party quantum secret sharing protocols under phase-damping channels | |||
SONG Ting-Ting, QIN Su-Juan, WEN Qiao-Yan, ZHANG Wei-Wei, and SUN Ying | |||
Information Science and System Science 25 January 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial three-qubit pure tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels, and figure out that for different kinds of initial states the successful probabilities Alice's secret can be recovered by legal agents are different. At the end, we discuss the security of one recent proposed QSS protocol, and show that the protocol would leak one bit of Alice's secret under the participant attack strategy. | |||
TO cite this article:SONG Ting-Ting, QIN Su-Juan, WEN Qiao-Yan, et al. The general theory of three-party quantum secret sharing protocols under phase-damping channels[OL].[25 January 2013] http://en.paper.edu.cn/en_releasepaper/content/4518224 |
4. Coordinated Adaptive Control for Collective Motion on Level Curves with a Time-Invariant Orbital Velocity | |||
CHEN Yang-Yang,TIAN Yu-Ping | |||
Information Science and System Science 24 January 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper develops a distributed strategy that stabilizescollective motion in fully actuated models of multiple surfacevessels that travel on given convex loops and approach a time-invariant reference orbital velocity. Aconsensus-based adaptive control law under the bidirectionalcommutation topology is proposed to estimate the desired orbitalvelocity so that the restriction that every vehicle in the familyhas access to the reference in the literature is removed. Theassumption of nonzero linear speed of each vessel is avoided by introducing apotential function. An simulation example is presented as a proof ofconcept. | |||
TO cite this article:CHEN Yang-Yang,TIAN Yu-Ping. Coordinated Adaptive Control for Collective Motion on Level Curves with a Time-Invariant Orbital Velocity[OL].[24 January 2013] http://en.paper.edu.cn/en_releasepaper/content/4516334 |
5. Experimental Research on Passive MMW Imaging for Security Application | |||
LU Xuan,XIAO Zelong,WU Li,HU Taiyang,XU Jianzhong | |||
Information Science and System Science 10 January 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Focused on security application, experiments are carried out to research on passive millimmeter wave imaging. The personnel concealed object detection model is discussed, and a prototype of conically scanning single pixel imaging system is realized and introduced. The control experiment is carried out using the prototype, and the images with and without the concealed object are respectively obtained. A nonlinear brightness transform function is also designed to process the obtained images. The experiment result demonstrates the capability of the realized PMMW imaging system for security application, and the designed brightness transform function could effectively enhance the intelligibilityof the images. | |||
TO cite this article:LU Xuan,XIAO Zelong,WU Li, et al. Experimental Research on Passive MMW Imaging for Security Application[OL].[10 January 2013] http://en.paper.edu.cn/en_releasepaper/content/4513794 |
6. Partial synchronization of the distributed parameter system with time delay via fuzzy control | |||
YUAN Kun,FEI Shumin,CAO Jinde | |||
Information Science and System Science 27 December 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, partial synchronization of thedistributed parameter system (DPS) with time delay is considered via the Galerkin's method and the fuzzy control. First, based on the Galerkin's method, the dynamics of master DPs and slave DPS can be described by low-order ordinary differential equations (ODE), respectively. Then the low-order functional ODEs is used as the basis for the design of the fuzzy controller to ensure the synchronization between the two low-order ODEs, moreover, when the slow system of masterDPS and the slow system of slave DPS is synchronized, the errorbetween master DPS and slave DPS is bounded. Some criteria are derived for stabilization and linear matrix inequality (LMI) design approach is developed. The effectiveness of the proposed controller design methodology is finally demonstrated through numerical simulation . | |||
TO cite this article:YUAN Kun,FEI Shumin,CAO Jinde. Partial synchronization of the distributed parameter system with time delay via fuzzy control[OL].[27 December 2012] http://en.paper.edu.cn/en_releasepaper/content/4505494 |
7. The Interference Effect of Group Diversity on Social Information Foraging | |||
SUN Guichuan,HOU Wenjun,CUI Yu | |||
Information Science and System Science 09 October 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Based on the analysis of social information foraging model and related theories, this paper focused on the interference effect between patches in the social information foraging environment and proposed that group diversity play an important role in this process. Then this paper built the interference cost model of this process to improve the social information foraging model. Experimental results show the correctness and practical value of this model. | |||
TO cite this article:SUN Guichuan,HOU Wenjun,CUI Yu. The Interference Effect of Group Diversity on Social Information Foraging[OL].[ 9 October 2012] http://en.paper.edu.cn/en_releasepaper/content/4489905 |
8. A Continuous-time Recurrent Neural Network for Real-time Support Vector Regression | |||
Liu Qingshan | |||
Information Science and System Science 24 September 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper presents a continuous-time recurrent neural network described by differential equations for real-time support vector regression (SVR). The SVR is first formulated as a convex quadratic programming problem, and then a continuous-time recurrent neural network with one-layer structure is designed for training the support vector machine. Furthermore, simulation results on an illustrative example are given to demonstrate the effectiveness and performance of the proposed neural network. | |||
TO cite this article:Liu Qingshan. A Continuous-time Recurrent Neural Network for Real-time Support Vector Regression[OL].[24 September 2012] http://en.paper.edu.cn/en_releasepaper/content/4489716 |
9. Research and Analysis of Method of Ranking Micro-blog Search Results Based on Binary Logistic Model | |||
Zhang Jing,Hou Wenjun | |||
Information Science and System Science 21 September 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Ranking results in micro-blog search as user's interests is challenging because of the special form of micro-blog search results. To attempt to solve the problem, in this paper, we summarize the characteristics of micro-blog search results, propose a method using a sort of decision model- binary logistic model, test the confidence level of the model and estimate the weight of the variable in the model collecting the real samples. The result shows the relation between user's decision and the factors from each individual micro-blog search result as well as the feasibility of ranking using the model. We also analyze the model. | |||
TO cite this article:Zhang Jing,Hou Wenjun. Research and Analysis of Method of Ranking Micro-blog Search Results Based on Binary Logistic Model[OL].[21 September 2012] http://en.paper.edu.cn/en_releasepaper/content/4489919 |
10. An Algorithm for Detection of Malicious Messages on CAN Buses | |||
Ling Congli ,Dongqin Feng | |||
Information Science and System Science 12 September 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Control systems are encountering increasing security threats; as one of the common systems, CAN control system is very facile to be attacked. Aiming at the improvement of CAN control system security, an algorithm for detection of malicious CAN messages is given, and it has been implemented in the CANoe simulation environment. The result shows that this algorithm has powerful detection function and valuable practice signification. | |||
TO cite this article:Ling Congli ,Dongqin Feng. An Algorithm for Detection of Malicious Messages on CAN Buses[OL].[12 September 2012] http://en.paper.edu.cn/en_releasepaper/content/4488602 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated