We propose a time-domain approach to detect cross-trial frequencies based on nonlinear correlation functions. this method is a multivariate extension of discrete Fourier transform (DFT) and can be applied to short and...
详细信息
ISBN:
(纸本)9781467319690
We propose a time-domain approach to detect cross-trial frequencies based on nonlinear correlation functions. this method is a multivariate extension of discrete Fourier transform (DFT) and can be applied to short and/or sparse time series. Cross-trial and/or cross-channel spectra (CTS) can be obtained for electroencephalography (EEG) data where multiple short data segments of the same experiment are available. there are two versions of CTS: the first one assumes some phase coherency across the trials while the second one is independent of phase coherency. We demonstrate that the phase dependent version is more consistent with traditional spectral methods as implemented in EEGLAB. this multivariate spectral analysis is a spatio-temporal extension of DFT and should not be confused with cross-spectral analysis. We appliedthis method to EEG data recorded while participants reached for and grasped a virtual object where we compared a cross-trial spectrogram (CTS) of data around a stimulus with traditional event related spectral perturbations (ERSP) analysis. We show that CTS can be applied to shorter data windows than ERSP by using spatio-temporal information in the EEG and therefore yields higher temporal resolution. Furthermore a CTS can be computed for each individual subject while ERSP is commonly computed on a whole population of subjects.
the alphabet decomposition of quasi-negacyclic codes is developed. By the use of the Chinese Remainder theorem (CRT), or of the discrete Fourier Transform (DFT), the ring Fq [X]/〈xm + 1〉 can be decomposed into a direc...
详细信息
In this paper, we propose the novel design method of directional selection for three-dimensional complex discrete wavelet transform (3D-CDWT) (hereafter, all abbreviations will be written with capital letters). Previo...
详细信息
ISBN:
(纸本)9780819499967
In this paper, we propose the novel design method of directional selection for three-dimensional complex discrete wavelet transform (3D-CDWT) (hereafter, all abbreviations will be written with capital letters). Previously, the complex discrete wavelet transform has been able to extract directional edges from images using the directional selection property. this can be applied to shape and texture analysis. However the angular range of each directional edge is still unclear and the angular ranges are fixed. thus, it is difficult to be applied to image processing. therefore, we firstly clarify the angular range of directional edges by using frequency characteristics. Secondly, we propose a design method for the angular range of directional edges with a desirable angular range. As a result, we can clarify the angular ranges of directional edges and it is possible to obtain the directional edges with arbitrary angular range.
Design, implementation and test of a communication network require the use of tools allowing the execution of simulations accurate enough to enable: a) the assessment of the correctness of the algorithmsthat govern t...
详细信息
To achieve good imperceptibility and robustness, a hybrid image watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed using the characteristics of human vi...
详细信息
ISBN:
(纸本)9781479901920
To achieve good imperceptibility and robustness, a hybrid image watermarking algorithm based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is proposed using the characteristics of human visual system model for copyright protection and authenticity. In the proposed watermarking algorithm, one level DWT is applied to selected image blocks to obtain four sub-bands of each block and then the U component of low frequency sub-band (LL) obtained after SVD transformation is explored under different threshold values for embedding and extracting the watermark. the experimental results show that HVS model based hybrid image watermarking scheme is imperceptible and robust against several image processing operations like JPEG compression, median filtering, sharpening, cropping and addition of Gaussian noise. Peak signal to noise ratio (PSNR) and bit correction rate (BCR) are used to measure the quality of watermarked image and extracted watermark respectively.
Watermarking is a basic secure communication method. It is used for embedding a recognizable pattern in media in such a manner that modification of the media also modifies the pattern, thus making it easy to detect th...
详细信息
ISBN:
(纸本)9781467363969;9781467363952
Watermarking is a basic secure communication method. It is used for embedding a recognizable pattern in media in such a manner that modification of the media also modifies the pattern, thus making it easy to detect the modification. this technique and its variants have many practical applications pertaining to secure communications, media verification, etc. Digital image watermarking is a technique for embedding data within an image signal in such a way that the original and the modified image signals are essentially identical. the embedded data can be used for various purposes such as secure communication in military applications, owner identification and verification, content authentication, etc. In this study a watermark image signal is hidden in a message image signal by using a discrete cosine transform (DCT) domain approach. the tests of fidelity between the original and the watermarked signal and robustness applied to the watermarked signal. the results with boththe Human Visiual System (HVS) and numeric/graphic aspects are presented. the results show that an embedded watermark is not easily detectable using either the HVS or other techniques. Additionally, it can be detected successfully in the simulation domain, but it may be susceptible to some noise and channel limitations in the real world.
this paper discusses a preliminary design of a High-level control loop of a ventilation system in the Blanka tunnel, which is a part of the City Circle Road in Prague, Czech Republic. the design is based on a discrete...
详细信息
ISBN:
(纸本)9780976348696
this paper discusses a preliminary design of a High-level control loop of a ventilation system in the Blanka tunnel, which is a part of the City Circle Road in Prague, Czech Republic. the design is based on a discrete Event System (DES) model of ventilation system states, which is actually an adapted Markov diagram. the first objective of the DES model is to specify all causes of state transitions. this task includes assessment of actions connected with states and state transitions, which should be implemented in high-level control algorithms and subordinate Programmable Logic Controllers. that means, that model presented here determines behavior of these system control elements. the second objective of the model is a reliability analysis for obtaining state probabilities and finding weak points in the control loop structure.
Pebble flow simulation plays an important role in the steady state and transient analysis of thermal-hydraulics and neutronics for Pebble Bed Reactors (PBR). the discrete Element Method (DEM) and the modified Molecula...
详细信息
ISBN:
(纸本)9781627486439
Pebble flow simulation plays an important role in the steady state and transient analysis of thermal-hydraulics and neutronics for Pebble Bed Reactors (PBR). the discrete Element Method (DEM) and the modified Molecular Dynamics (MD) method are widely used to simulate the pebble motion to obtain the distribution of pebble concentration, velocity, and maximum contact stress. Although DEM and MD present high accuracy in the pebble flow simulation, they are quite computationally expensive due to the large quantity of pebbles to be simulated in a typical PBR and the ubiquitous contacts and collisions between neighboring pebbles that need to be detected frequently in the simulation, which greatly restricted their applicability for large scale PBR designs such as PBMR400. Since the contact detection accounts for more than 60% of the overall CPU time in the pebble flow simulation, the acceleration of the contact detection can greatly enhance the overall efficiency. In the present work, based on the design features of PBRs, two contact detection algorithms, the basic cell search algorithm and the bounding box search algorithm are investigated and applied to pebble contact detection. the influence from the PBR system size, core geometry and the searching cell size on the contact detection efficiency is presented. Our results suggest that for present PBR applications, the bounding box algorithm is less sensitive to the aforementioned effects and has superior performance in pebble contact detection compared with basic cell search algorithm.
作者:
Oepomo, Tedja SantanoeScience
Technology Engineering and Mathematics Division West LA/LA Harbor Colleges School of Business California International University 1301 Las Riendas Drive La Habra CA 90631 United States
the aim of this manuscript is to study and to compare several iterative procedures based on Oepomo, Power, and QR methods for solving dominant eigenvalues of essentially positive matrices. Ascending and descending tec...
详细信息
Several methods for finding exact bounds of average pairwise network connectivity (APNC) are proposed. these methods allows faster decision making about if a network is reliable for its purpose. Previous results on cu...
详细信息
暂无评论