In this paper a recursive algorithm with regular structure is first presented for computing the discrete cosine transform(DCT-II), it requires no data shifts, the multiplication coefficients can be generated by a simp...
详细信息
ISBN:
(纸本)7505338900
In this paper a recursive algorithm with regular structure is first presented for computing the discrete cosine transform(DCT-II), it requires no data shifts, the multiplication coefficients can be generated by a simple recursion. Then the recursive algorithms for DCT-I and DCT-IV are presented. These algorithms have no value stable problem, which complexity is the same as that of Reference[3] and [7], and these algorithms are very useful for practice.
Due to the continuous development of radar signalprocessing technology, the MTI-MTD (moving target detection) technology is deeply studied in this paper. This article introduces the principles and properties of MTI a...
详细信息
The segmentation and de-noising are basic operations, required in every signalprocessing and classification system. The classical segmentation and de-noising approaches are time-invariant. Consequently, it results in...
详细信息
ISBN:
(纸本)9781538663967
The segmentation and de-noising are basic operations, required in every signalprocessing and classification system. The classical segmentation and de-noising approaches are time-invariant. Consequently, it results in the post processing of unnecessary information and causes an increase in the system processing activity and power consumption. In this context, an efficient event-driven segmentation and de-noising technique is proposed. It is founded on the principles of level crossing and activity selection. Therefore, it can adapt its sampling frequency, segmentation window length and position along with the filter order by analyzing the input signal local characteristics. As a result, the computational complexity and the power consumption of the proposed system is reduced compared to the counter ones. The suggested system performance is compared with the classical one. It is done for the case of a 118 channels Electroencephalogram (EEG) signals. Results show a noticeable compression gain with an effective adaptation of the de-noising filters order. It promises a significant computational gain, transmission data rate reduction and power consumption reduction of the proposed technique, compared to the counter ones. It shows that the proposed solution is an attractive candidate to embed in the new generation EEG devices.
Video data is complex, unstructured and voluminous unlike conventional text data. For providing effective retrieval facilities, video data needs to be stored in a database with an appropriate data structure. Hence, id...
详细信息
ISBN:
(纸本)7505338900
Video data is complex, unstructured and voluminous unlike conventional text data. For providing effective retrieval facilities, video data needs to be stored in a database with an appropriate data structure. Hence, identifying the required information units and formulating a data structure have become the fundamental tasks. data mining methods analyze data for extracting patterns. In this paper, we elaborate the characteristics of video data which must play a significant role in the development of the data mining algorithm. We have discussed the characteristics of video data under three classes, namely, dominant, native and assigned which have influenced us in arriving at a scheme for analysis.
In this paper, a virtual view image post-processing method using background information is proposed. Firstly, a depth-based method is used to deal with overlapping between two images. Secondly, the artifacts of the le...
详细信息
Artificial intelligence-based communication is the newtechnological tool, that is going to apply for signalprocessing techniques gives the main consociate to implement any type of applications. The antenna that needs...
详细信息
In data mining techniques, Clustering is a performed by grouping objects based on similarity of its characteristics to provide patterns and knowledge of given user data. Different types of clustering algorithms called...
详细信息
ISBN:
(纸本)9781509049295
In data mining techniques, Clustering is a performed by grouping objects based on similarity of its characteristics to provide patterns and knowledge of given user data. Different types of clustering algorithms called partitioning, hierarchical and grid based clustering methods. Here k-means clustering, k-medoids clustering, Hierarchical clustering, DBSCAN and Fuzzy c means clustering. Clustering algorithms are used for customer churn analysis;one of the important reasons is that the cost of increasing a new customer is much higher than retaining an existing customer by using customer churn analysis. Initially KNIME analytics platform is used to analyse and visualization of data and later it is used to create model, rules and interactive views of data.
In the Philippines, cooperative transition to becoming technology-driven actors in the development sector by initiating the development of ICT solutions specifically catered to cooperatives and their operations. Witho...
详细信息
ISBN:
(纸本)9781450362047
In the Philippines, cooperative transition to becoming technology-driven actors in the development sector by initiating the development of ICT solutions specifically catered to cooperatives and their operations. Without data mining behind crucial decision making in a cooperative management, the fate of these cooperatives may be likened to banks on the verge of bankruptcy. Therefore, cooperative basic business data mining to discover patterns and trends helpful in decision making is being introduced in this study. All districts than can be equated to municipalities are well represented by members of the multipurpose cooperative. There is an equally efficient collection measures of the cooperative management on equity and Mutual Aid System (MAS).
To survive in the telecommunications industry39;s severe competition and to keep existing loyal customers, predicting prospective churn consumers has become a critical task that may be accomplished with efficient pr...
详细信息
In view of the low input and output efficiency of traditional supply chain sharing mining technology, a trusted sharing mining technology of supply chain big data based on improved data envelope analysis algorithm was...
详细信息
暂无评论