This paper addresses the space-time change detection problem in climate data over the Iberian Peninsula using a 50 years dataset. The data were analyzed concerning the temporal and geographical information, using the ...
详细信息
This paper addresses the space-time change detection problem in climate data over the Iberian Peninsula using a 50 years dataset. The data were analyzed concerning the temporal and geographical information, using the following methodology: information about space-time drifts in climate data was obtained by applying a change detection algorithm on all the temporal data available for each physical location considered in this study; the performance and the robustness of this algorithm were then assessed by the McNemar nonparametric statistical test on cluster structures; geographical correlations were inferred using visualization tools and graphical representations of data. Most of the space-temporal drifts detected by the algorithm were confirmed by the results of the McNemar test and are in accordance with visual and graphical representations, supporting the advantage of using inter-disciplinary methods. This analysis also shows that there are locations which do not reveal any change along all the observed years.
This paper proposes a VT-AMDF pitch detection algorithm which based on average magnitude difference function (AMDF). Time processing is important when implement in real time system. In order to decrease computational ...
详细信息
This paper proposes a VT-AMDF pitch detection algorithm which based on average magnitude difference function (AMDF). Time processing is important when implement in real time system. In order to decrease computational time and complexity of pitch detection, the VT-AMDF uses only 55% of total time intervals. The method can reduce the computational time 1.3, 1.4, 4.8 and 5.4 times, compared with original AMDF, autocorrelation function (ACF), normalized square difference function (NSDF) and YIN, respectively. The experiments evaluate on seven words in five different tones of Thai isolated word. The results show that the gross error of VT-AMDF is 3.88%, which is more than original AMDF 0.48 and YIN 0.22, but less than ACF 0.54 and NSDF 1.47.
We consider a differentially encoded phase-shift keying (DPSK) signal transmitted over a channel affected by correlated Rayleigh fading. For this problem, we derive the exact maximum a posteriori (MAP) symbol detectio...
详细信息
ISBN:
(纸本)9781424443123
We consider a differentially encoded phase-shift keying (DPSK) signal transmitted over a channel affected by correlated Rayleigh fading. For this problem, we derive the exact maximum a posteriori (MAP) symbol detection algorithm. By analyzing its properties, we demonstrate that it can be implemented by a forward-backward estimator of the channel, followed by a symbol-by-symbol completion to produce the a posteriori probabilities of the information symbols. The resulting algorithm can be employed as a soft-input soft-output (SISO) block in turbo-iterative receivers and exhibits an excellent performance despite its limited computational complexity. The performance of the proposed algorithm is evaluated for time-domain modulations over frequency-flat channels and for frequency-domain modulations over time-invariant channels.
It is a commonly held belief that IPv6 provides greater security against random scanning worms by virtue of a very sparse address space. As a result, worm authors are looking for new ways to acquire vulnerable targets...
详细信息
It is a commonly held belief that IPv6 provides greater security against random scanning worms by virtue of a very sparse address space. As a result, worm authors are looking for new ways to acquire vulnerable targets without relying on random scanning for them. It is possible to find vulnerable Web servers by sending carefully crafted queries to search engines or Domain Name System (DNS) queries to DNS servers. In this paper, we discuss scanning strategies of possible worms in the IPv6 Internet. The performance of the worm depends heavily on these strategies, which in turn depend on how secure directory and naming services of a network are. We present an integrated system for the detection and automatic containment of worm propagation in an IPv6 local area network. The detection engine of our system utilizes the DNS anomalies of the worm traffic. We propose a worm detection algorithm based on user habit of sending DNS queries in an IPv6 Internet. Experiment results show that the algorithm is able to detect worms propagation accurately at its early stage in real-time. Our results bring insight on the future battle against worm attacks.
Impulse ultra-wideband radios (IR-UWB) show strong advantages in low power and low cost applications such as RFIDs and wireless sensor networks. This paper presents an IR-UWB receiver based on energy detection (ED) wi...
详细信息
Impulse ultra-wideband radios (IR-UWB) show strong advantages in low power and low cost applications such as RFIDs and wireless sensor networks. This paper presents an IR-UWB receiver based on energy detection (ED) with on-off keying (OOK) modulation. A novel synchronization and detection algorithm using the energy offset scheme with adaptive threshold detection is suggested, aiming to reduce energy consumption and simplify hardware complexity. Simulation and FPGA implementation reveal that the proposed method can avoid complex and power consuming synchronization blocks, and reduce the preamble length, whereas maintaining the performance in the target level. Hardware integration issues are discussed, implying that the proposed receiver architecture has the possibility to achieve low complexity and low power implementation with several nJs energy per bit, at a data rate of 10 Mb/s.
With the help of some labeled samples and rough C-means clustering, a rough-based semi-supervised outlier detection (RBSSOD) is proposed, which integrates the advantage of semi-supervised outlier detection (SSOD) and ...
详细信息
With the help of some labeled samples and rough C-means clustering, a rough-based semi-supervised outlier detection (RBSSOD) is proposed, which integrates the advantage of semi-supervised outlier detection (SSOD) and rough C-means clustering. This method takes into account the information of labeled points, as well as the points located in boundary area of each cluster, which can be further discussed the possibility to be reassigned as outliers. Experiment results show that our method not only keep, or improve precision and false alarm rate but also speed up the learning process.
This paper introduces a new method of electrocardiogram (ECG) R-wave detection algorithm based on LabVIEW. The algorithm adopts the adaptive difference threshold value method for identifying the R-wave, and calculates...
详细信息
ISBN:
(纸本)9781424441327
This paper introduces a new method of electrocardiogram (ECG) R-wave detection algorithm based on LabVIEW. The algorithm adopts the adaptive difference threshold value method for identifying the R-wave, and calculates the heart rate by the R-R interval. It has the advantages of high detection rate, fast processing, and easy completing and transplanting, therefore the researches lay the foundation for the further research on ECG.
We generalize reflection symmetry detection to a curved glide reflection symmetry detection problem. We propose a unifying, local feature based approach for curved glide reflection symmetry detection from real, unsegm...
详细信息
We generalize reflection symmetry detection to a curved glide reflection symmetry detection problem. We propose a unifying, local feature based approach for curved glide reflection symmetry detection from real, unsegmented images, where the classic reflection symmetry becomes one of four special cases. Our method detects and groups statistically dominant local reflection axes in a 3D parameter space. A curved glid reflection symmetry axis is estimated by a set of contiguous local straight reflection axes. Experimental results of the proposed algorithm on 40 real world images demonstrate promising performance.
Along with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This ...
详细信息
Along with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This paper proposes a credit card fraud detection model using outlier detection based on distance sum according to the infrequency and unconventionality of fraud in credit card transaction data, applying outlier mining into credit card fraud detection. Experiments show that this model is feasible and accurate in detecting credit card fraud.
An endmember detection algorithm that simultaneously partitions an input data set into distinct contexts, estimates endmembers, number of endmembers, and abundances for each partition is presented. In contrast to prev...
详细信息
An endmember detection algorithm that simultaneously partitions an input data set into distinct contexts, estimates endmembers, number of endmembers, and abundances for each partition is presented. In contrast to previous endmember detection algorithms based on the convex geometry model, this method is capable of describing non-convex sets of hyperspectral pixels. Endmembers are found for non-convex regions by partitioning the set of pixels into convex regions using the Dirichlet process and determining unique endmembers for each region. This novel endmember detection method naturally produces a classifier with a reject class. The algorithm can effectively identify to which context a test data point belongs and identify test pixels for which the associated context is unknown. Results are shown on AVIRIS Indian Pines hyperspectral data. The results show the classification capability of this context-based endmember algorithm.
暂无评论