In the gird environment, grid workflow can carry on grid application conveniently, and it can improve the performance and efficiency of the grid application, but it may be referred to deadlock problem during its execu...
详细信息
In the gird environment, grid workflow can carry on grid application conveniently, and it can improve the performance and efficiency of the grid application, but it may be referred to deadlock problem during its execution in operation process. There are a lot of modelling and analysis tools available for workflow, but Petri net is more preferable because of its solid mathematical foundation and graphical nature. After analysing the difference between grid workflow and traditional workflow, the grid workflow is modelled by D-Petri net, and deadlock detection algorithm based on reachable-graph is adopted to carry on deadlock detection on the grid workflow. Finally, verification is carried on the instance of software test workflow in the grid environment.
This paper presents a contour-based approach to separate vertically attached traffic signs. The algorithm is based on using binary images which are generated by any color segmentation algorithm to represent objects wh...
详细信息
This paper presents a contour-based approach to separate vertically attached traffic signs. The algorithm is based on using binary images which are generated by any color segmentation algorithm to represent objects which could be candidate traffic signs. Since all traffic signs are similar about their vertical axis, an improved cross-correlation algorithm is invoked to determine this similarity and filters traffic sign candidates. Shape decomposition is used to smooth the contour of the candidate object iteratively in order to reduce white noise. Flipping point detection algorithm which locates black noise along the smoothed contour and the curve prediction algorithm are invoked to determine the final cut points. A separation accuracy of 94% is achieved by the algorithm. In this experiment more that 70000 images of different traffic sign combinations are invoked to achieve this result. The algorithm is tested on one-sign images, two-sign images, and three-sign images which are combined together for the purpose of testing this algorithm.
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The associated computational complexity often poses significant challenges for practical receiver implementations, in particula...
详细信息
ISBN:
(纸本)9781424422562
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The associated computational complexity often poses significant challenges for practical receiver implementations, in particular in the context of multiple- input multiple-output wireless systems. In this paper, we present a low-complexity SISO sphere decoder which is based on the single tree search paradigm, proposed originally for soft-output detection in Studer et al., IEEE J-SAC, 2008. The algorithm incorporates clipping of the extrinsic log-likelihood ratios in the tree search, which not only results in significant complexity savings, but also allows to cover a large performance/complexity trade-off region by adjusting a single parameter.
UWB communication and localization systems have many inherent advantages for robust performance in dense, indoor multipath environments. Although UWB systems have been designed for numerous industrial applications, th...
详细信息
UWB communication and localization systems have many inherent advantages for robust performance in dense, indoor multipath environments. Although UWB systems have been designed for numerous industrial applications, there exists the need for short range (i.e. 5-10 m) UWB localization systems with accuracy an order of magnitude higher (i.e. mm-range) than existing commercial systems. Many system level challenges must be overcome to achieve accuracy on the order of tens of picoseconds, such as high Rx sampling rate, Tx-Rx LO phase noise, Tx-Rx pulse repetition frequency clock phase noise, Rx-induced jitter from sequential sampling, Rx-side calibration of phase offsets in I and Q channels, multipath interference due to dense indoor environments, etc. A detailed system level simulation is setup in order to quantify the contribution of these effects on overall system accuracy. Simulation results are used to highlight these system level errors and show how they can be mitigated.
In this paper, a variety of link mining methods are handled in an integrated manner with previous data mining methods, and a network mining framework (NMF) is proposed. This paper also presents example usages of the N...
详细信息
In this paper, a variety of link mining methods are handled in an integrated manner with previous data mining methods, and a network mining framework (NMF) is proposed. This paper also presents example usages of the NMF, and discusses how high-level network mining are achieved by using the NMF.
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper, several detection algorithms based on MIMO-OFDM systems ...
详细信息
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper, several detection algorithms based on MIMO-OFDM systems are briefly introduced, and their performances are evaluated by computer simulation. The simulation results indicate that performance of these algorithms for MIMO-OFDM system is similar to the performance for flat MIMO system. We conclude that the so-called ZF-PIC algorithm is very attractive compared to conventional ZF-VBLAST in performance.
Steganography is the art of hiding the information that is going to be sent from one party to another. Information can be hidden into image, text, audio or video. Steganography allowed communication to happen without ...
详细信息
Steganography is the art of hiding the information that is going to be sent from one party to another. Information can be hidden into image, text, audio or video. Steganography allowed communication to happen without other people notice there is transmission of message except the intended party. This paper explains the implementation of receiver operating characterictic (ROC) graph addressing the incorrect classification of images for stegogramme and non-stegogramme classes using pairs analysis detection technique. The threshold value to discriminate between the two classes is identified, to reduce the rate of false negative (FN).
We present a very low complexity QRD-M algorithm for MIMO systems. The original QRD-M algorithm decomposes the MIMO channel matrix into upper triangular matrix and applies a limited tree search. To accomplish near- ML...
详细信息
We present a very low complexity QRD-M algorithm for MIMO systems. The original QRD-M algorithm decomposes the MIMO channel matrix into upper triangular matrix and applies a limited tree search. To accomplish near- MLD(Maximum Likelihood detection) performance for QRD-M algorithm, number of search points at each layer must be the modulation size. In the proposed scheme, each of survival branches are extended only to the corresponding QR decomposition (QRD)-based detection symbol in the next layer and its neighboring symbols in the constellation. Using this approach, we can significantly decrease the complexity of conventional QRD-M algorithm. Simulation results show that the proposed algorithm scheme achieves the detection performance near to that of the MLD with negligibly low complexity.
In this paper we present a simple and efficient method for detecting the blurriness in the pictures. Recently, many digital cameras are equipped with auto-focusing functions to help the users take well-focused picture...
详细信息
In this paper we present a simple and efficient method for detecting the blurriness in the pictures. Recently, many digital cameras are equipped with auto-focusing functions to help the users take well-focused pictures. However, digital images can be degraded by limited contrast, inappropriate exposure, imperfection of auto-focusing or motion compensating devices, limited knowledge of amateur photographers, and so on. In order to detect blurry images for deleting them or making them go through an enhancement process automatically, a reliable measure of image degradation is needed. This paper presents a blurriness/sharpness detection algorithm based on the prediction-error variance, and demonstrates its feasibility by using extensive experiments. This method is fast, easy to implement and accurate. Regardless of the detection accuracy, the proposed method in this paper is not demanding on computation time.
This paper investigates the effectiveness of a single-channel speech enhancement system that contains spectral subtraction and voice activity detection algorithm for noise elimination. We first extract features from a...
详细信息
This paper investigates the effectiveness of a single-channel speech enhancement system that contains spectral subtraction and voice activity detection algorithm for noise elimination. We first extract features from a noisy signal and use these features as the inputs of a recurrent neuro-fuzzy network for detecting the voice activities of the signal. Based on the detection, we describe the characteristics of the background noise of the speech segments by a minimum frequency energy (MFE) parameter and then apply spectral subtraction algorithms with the parameter to eliminate the noise. Our simulation results show that the proposed enhancement system with a nonlinear spectral subtraction algorithm has superior performance.
暂无评论