The Kepler Mission simultaneously measures the brightness of more than 160,000 stars every 29.4 minutes over a 3.5-year mission to search for transiting planets. Detecting transits is a signal-detection problem where ...
详细信息
ISBN:
(纸本)9780819482303
The Kepler Mission simultaneously measures the brightness of more than 160,000 stars every 29.4 minutes over a 3.5-year mission to search for transiting planets. Detecting transits is a signal-detection problem where the signal of interest is a periodic pulse train and the predominant noise source is non-white, non-stationary (1/f) type process of stellar variability. Many stars also exhibit coherent or quasi-coherent oscillations. The detection algorithm first identifies and removes strong oscillations followed by an adaptive, wavelet-based matched filter. We discuss how we obtain super-resolution detection statistics and the effectiveness of the algorithm for Kepler flight data.
because of the existence of non-linear loads,they will be inpouring a lot of harmonic current to the power system,in order to restrain harmonic,we have to take relevant measures to restrain. This paper introduces thre...
详细信息
ISBN:
(纸本)9783037859247
because of the existence of non-linear loads,they will be inpouring a lot of harmonic current to the power system,in order to restrain harmonic,we have to take relevant measures to restrain. This paper introduces three measures of harmonic restraint firstly, expounds the active power filter, and then it analyses the work principle and mathematical model of shunt active power filter, building three-phase shunt active power filter simulation model,;At last, using MATLAB simulation experiment,the result shows that the shunt active power filter of harmonic detection algorithm and the control strategy are correct and effective, and also it has the important significance to the power system harmonic restraint.
In the modern technology warfare, infrared weak target detection technology occupies a very important position. In civil use, the infrared weak target detection technology has also been widely applied and developed. T...
详细信息
In the modern technology warfare, infrared weak target detection technology occupies a very important position. In civil use, the infrared weak target detection technology has also been widely applied and developed. The application and research status of infrared weak targets are briefly analyzed. The characteristics of infrared weak targets are introduced. The principles and steps of some classic improved methods for infrared small target detection methods in recent years are summarized. Finally, the differences of several classical algorithms such as Gauss filtering, mean filtering, median filtering, morphology and adaptive Wiener filtering are compared. This paper lays a foundation for the learning of infrared small target detection algorithm and is helpful to the research of improved algorithm for infrared small target detection.
This paper proposes a new control device based on tongue motions to control and communicate with a support system for a paralyzed patient. We focus on the tongue movements as one of output of human intentions, because...
详细信息
ISBN:
(纸本)9781424498628
This paper proposes a new control device based on tongue motions to control and communicate with a support system for a paralyzed patient. We focus on the tongue movements as one of output of human intentions, because the tongue has one of capable parts for the motions and it does not affected by spinal cord damage. The tongue motion is easily observed from his/her mouse inside, it is, however, hard to observe them from outside. We therefore propose a detection algorithm of the tongue motions by using multiple array electrodes attached on a skin surface around a neck. The tongue motions are detected based on the center position of distributions of muscle elctric potentials that are measured by the electrodes. We investigated the precisions of the detection algorithm through some experiments and then confirmed that almost accucracy of discrimination is more than 70 as for six tongue movements such as left, right, forward, back, up, and down. Additionally, we evaluated operability of the proposed algorithm quantitatively using Fitts' law based test bed GUI, and the performance of the proposed interface was compared with that of other available interfaces.
The detection of multiple-input multiple-output (MIMO) system is an important issue. The radius adaptive K-Best (RAKB) algorithm is proposed for the detection of the MIMO system, it decomposes the searching tree into ...
详细信息
ISBN:
(纸本)9781467356978;9781467356992
The detection of multiple-input multiple-output (MIMO) system is an important issue. The radius adaptive K-Best (RAKB) algorithm is proposed for the detection of the MIMO system, it decomposes the searching tree into several sub-branches and provides similar bit-error-rate (BER) performance to the K-Best algorithm. But the complexity of the RAKB algorithm is still very high, it will pay an additional arithmetic at low signal-to-noise ratio (SNR). In this paper, we improve the RAKB algorithm to simply the complexity. The improved algorithm only searches the preinstall sub-branch at low SNR. Simulation results show that the improved algorithm achieves similar performance to the K-Best algorithm with a significantly reduced complexity, in terms of the number of visited nodes and computational time.
Due to heavy traffic the network monitoring is very difficult and cumbersome job, hence the probability of network attacks increases substantially. So there is the need of extraction anomalies. Anomaly extraction mean...
详细信息
ISBN:
(纸本)9780769550336
Due to heavy traffic the network monitoring is very difficult and cumbersome job, hence the probability of network attacks increases substantially. So there is the need of extraction anomalies. Anomaly extraction means to find flows associated with the anomalous events, in a large set of flows observed during an anomalous time interval. Anomaly extraction is very important for root-cause analysis, network forensics, attack mitigation and anomaly modeling. To identify the suspicious flows, we use meta-data provided by several histogram based detectors and then apply association rule with multidimensional mining concept to find and summarize anomalous flows. By taking rich traffic data from a backbone network, we show that our technique effectively finds the flows associated with the anomalous events. So by applying multidimensional mining rule to extract anomaly, we can reduce the work-hours needed for analyzing alarms and making anomaly systems more effective.
Statistical model of measuring signals in systems of time domain reflectometry was proposed. On the basis of this reflectometry the estimates of reflected signal parameters were obtained by means of complete sufficien...
详细信息
ISBN:
(纸本)9781509040698
Statistical model of measuring signals in systems of time domain reflectometry was proposed. On the basis of this reflectometry the estimates of reflected signal parameters were obtained by means of complete sufficient statistics. Simulation modeling, which confirmed the consistency and efficiency of the estimates, was conducted. Based on the principle of unbiasedness the synthesis of uniformly most powerful unbiased detection algorithm of change in slope parameter of linearly-varying measuring signal was carried out. Simulation modeling has indicated the efficiency of the algorithm and expediency of its application to detect small changes in the measuring signal parameters of time domain reflectometry systems.
This study examines an application of simulated single-particle spectra for analysis of IR scattering by suspensions of small particles. Particularly, the case of aerosols comprised of solid particles is explored. The...
详细信息
ISBN:
(纸本)9781510674301;9781510674318
This study examines an application of simulated single-particle spectra for analysis of IR scattering by suspensions of small particles. Particularly, the case of aerosols comprised of solid particles is explored. These particles vary in size, shape, and orientation with respect to the incident light. Single particle scattering is numerically calculated and the simulated data is surveyed. The scattering of particle ensembles is considered and a prototype system consisting of a sparse distribution of particles is evaluated.
Code Reuse-based Attacks (popularly known as CRA) are becoming increasingly notorious because of their ability to reuse existing code, and evade the guarding mechanisms in place to prevent code injection-based attacks...
详细信息
ISBN:
(纸本)9781479929870
Code Reuse-based Attacks (popularly known as CRA) are becoming increasingly notorious because of their ability to reuse existing code, and evade the guarding mechanisms in place to prevent code injection-based attacks. Among the recent code reuse-based exploits, Jump Oriented Programming (JOP) captures short sequences of existing code ending in indirect jumps or calls (known as gadgets), and utilizes them to cause harmful, unintended program behavior. In this work, we propose a novel, easily implementable algorithm, called JOP-alarm, that computes a score value to assess the potential for JOP attack, and detects possibly harmful program behavior. We demonstrate the effectiveness of our algorithm using published JOP code, and test the false positive alarm rate using several unmodified SPEC2006 benchmarks.
An automated parasite detection is one of the challenges in computer vision and medicine field. Recently, an automated detection system became necessary in order to assist the parasitologist in detecting parasite. How...
详细信息
ISBN:
(纸本)9781728123806
An automated parasite detection is one of the challenges in computer vision and medicine field. Recently, an automated detection system became necessary in order to assist the parasitologist in detecting parasite. However, the development of automated parasite detection had several challenges. Mostly, previous research studies were conducted with the homogeny dataset. Hence, it will become a problem if the research was conducted with various dataset. According to those facts, this study proposed a scheme for detecting Plasmodium parasites. In this study, 46 thin blood smear digital microscopic images of Plasmodium Falciparum with several kinds of pixel intensity were used. The proposed method started by normalizing the data. The normalization result was then segmented by using Otsu thresholding and some operations of morphological operation. Based on the segmentation result, parasite candidate detection was done by storing the location of an object in segmentation result and labeling the object by using BLOB analysis. The result of detection process produced high number of false positive. To reduce the number of false positive, feature extraction process followed by classification process was conducted. Several texture features such as histogram, GLCM and GLRLM were used to extract information of parasite. Classification process was conducted by applying several kernels of SVM classifier. According to the evaluation process, the proposed method has better performance than previous study and successfully distinguish parasite and non-parasite by using the cubic kernel of SVM with accuracy, sensitivity, specificity, PPV and NPV of 97.4%, 100%, 94.8%, 95.1% and 100%, respectively. These results indicated that the proposed scheme is proper in order to assist the expert in detecting Plasmodium parasites effectively.
暂无评论