Requirements for which no recommendation can be calculated are unsatisfactory for the user. The detection and resolution of conflicts between those requirements and the product assortment is an important functionality...
详细信息
Requirements for which no recommendation can be calculated are unsatisfactory for the user. The detection and resolution of conflicts between those requirements and the product assortment is an important functionality to successfully guide the user to a solution. In this paper we introduce a new approach how to identify minimal conflict sets in over constrained problems through network analysis. Conflict sets offer the information which constraints (requirements) need to be changed to retrieve a solution. Random constrained problems are used to evaluate our approach and compare it to existing conflict detection algorithms. A major result of this evaluation is that our approach is superior in settings typical for knowledge-based recommendation problems.
It is essential to equip the sensor nodes with simple and efficient coverage boundary detection mechanisms for ensuring the network reliability and providing the required quality of service. The existing coverage boun...
详细信息
It is essential to equip the sensor nodes with simple and efficient coverage boundary detection mechanisms for ensuring the network reliability and providing the required quality of service. The existing coverage boundary detection solutions require accurate knowledge of the sensors locations,which cannot be easily obtained, or they cannot provide guarantees on the coverage quality. Therefore, we propose a distributed algorithm for individual sensor nodes to identify whether they are on the coverage boundary, by using only localized distance information. Furthermore, we extend the algorithm to k-coverage boundary detection scheme. We show the correctness and efficiency of our algorithm by theoretical proofs.
In the paper, a evaluation method was introduced in electrocardiogram (ECG) waveform validity analysis. The method is ECG waveform pattern comparison. The evaluation work was done on a dynamic ECG waveform selection. ...
详细信息
In the paper, a evaluation method was introduced in electrocardiogram (ECG) waveform validity analysis. The method is ECG waveform pattern comparison. The evaluation work was done on a dynamic ECG waveform selection. It is very important to get the real accurate of the selection strategy. The pattern comparison method gives the method, result, and analysis on ECG waveform selection effect. The accurate can reach 96%. And the method can be process on all the ECG waveforms which as preprocessed by the strategy used in the paper.
The progressive switching median (PSM) filter implements a noise detection algorithm before filtering. Both noise detection and filtering procedures are progressively repeated for a number of iterations. As an attempt...
详细信息
The progressive switching median (PSM) filter implements a noise detection algorithm before filtering. Both noise detection and filtering procedures are progressively repeated for a number of iterations. As an attempt to improve the PSM filter, an improved progressive switching median filter (IPSM) is proposed to enhance progressive median filter in term of its noise filtering ability. The proposed algorithm sets a limit on the number of good pixels used in determine median and mean values, and substitute impulse pixel with half of the value of the summation of median and mean value. Experimental results show that the proposed algorithm performs a better noise filtering ability as the images are highly corrupted.
Islanding detection is an essential function for safety and reliability in grid connected distributed generation (DG) systems. Several methods for islanding detection are proposed, but most of them are not efficient f...
详细信息
Islanding detection is an essential function for safety and reliability in grid connected distributed generation (DG) systems. Several methods for islanding detection are proposed, but most of them are not efficient for multi-source configurations, or they may produce important power quality degradation getting worst with DG penetration increasing. This paper presents an active islanding detection algorithm for voltage source inverter (VSI) based multi-source DG systems. The proposed method is based on voltage positive feedback theory. Simulations by MATLAB/Simulink/SimPowerSystems were used to evaluate its performance and its advantages concerning time response and power quality effects under critical conditions as load's unity power factor and high quality factor.
We propose a novel building detection algorithm for processing high-resolution aerial images. Our algorithm exploits the building-shadow geometric relationship according to lighting models, making it suitable to detec...
详细信息
ISBN:
(纸本)9781424447374;9781424447541
We propose a novel building detection algorithm for processing high-resolution aerial images. Our algorithm exploits the building-shadow geometric relationship according to lighting models, making it suitable to detect buildings in a more general setting, possibly with irregular shapes. We use image segmentation to provide spatial support for both building and shadow detections. A novel confidence method is developed to label building and shadow segments by jointly reasoning: 1) the likelihood of shadows; 2) building-shadow configuration, and 3) building-building similarity. Our method is tested on a wide range of aerial images. Qualitative and quantitative results demonstrate its effectiveness on detecting and extracting buildings from background clutter.
Robust beat detection under noisy conditions is required in order to obtain a correct clinical interpretation of the ECG in ambulatory settings. This paper describes the evaluation and optimization of a beat detection...
详细信息
Robust beat detection under noisy conditions is required in order to obtain a correct clinical interpretation of the ECG in ambulatory settings. This paper describes the evaluation and optimization of a beat detection algorithm that is robust against high levels of noise. An evaluation protocol is defined in order to study four different characteristics of the algorithm: non-rhythmic patterns, different levels of SNR, exact peak detection and different levels of physical activity. This protocol is based on the MIT/BIH arrhythmia database and additional ECG recordings obtained under different levels of physical activity measured by 2-axis accelerometers. The optimized algorithm obtained a Se=99.65% and +P=99.79% on the MIT/BIH arrhythmia database while keeping a good performance on ECGs with high levels of activity (overall of Se=99.86%, +P=99.91%). In addition, this method was optimized to work in real time, for future implementation in a Wireless ECG sensor based on a microprocessor.
Line matching is useful in many computer vision tasks such as object recognition, image registration, and 3D reconstruction. The literature on line matching has advanced in recent years, nevertheless, compared to othe...
详细信息
ISBN:
(纸本)9781424448081
Line matching is useful in many computer vision tasks such as object recognition, image registration, and 3D reconstruction. The literature on line matching has advanced in recent years, nevertheless, compared to other features (such as point and region matching approaches) it has made little progress. Especially, very few algorithms address the problem of image scaling. In this paper, we present a new line detection and matching algorithm that is invariant to image scale variation (SILT). The algorithm detects line segments as local extrema in the scale-space. Each detected line segment is represented in a distinctive manner using Haar-like features. PCA is further deployed to improve upon the compactness and robustness of representation. Experimental results demonstrate the effectiveness of the proposed approach to deal with image scale variations.
Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of Internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS...
详细信息
Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of Internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS attacks have been a serious threat to Internet security and stability. In this paper we propose a set of novel methods using probability metrics to distinguish DDoS attacks from Flash crowds effectively, and our simulations show that the proposed methods work well. In particular, these methods can not only distinguish DDoS attacks from Flash crowds clearly, but also can distinguish the anomaly flow being DDoS attacks flow or being Flash crowd flow from Normal network flow effectively. Furthermore, we show our proposed hybrid probability metrics can greatly reduce both false positive and false negative rates in detection.
In real-time video stream application, a feature point detector is very necessary. Stable feature points are useful in machine vision application. Feature point detectors such as SIFT, Harris and SUSAN are good method...
详细信息
ISBN:
(纸本)9781424449095
In real-time video stream application, a feature point detector is very necessary. Stable feature points are useful in machine vision application. Feature point detectors such as SIFT, Harris and SUSAN are good methods which extracted high quality features, but neither the Harris detector nor the detection stage of SIFT can operate at real-time frame rate. In this paper, we present a new corner detection algorithm which uses fuzzy similarity matrix to calculate average similarity of contiguous pixels. It can be used in real-time applications of any complexity. In our experiments to evaluate our corner detector, difference image transformations are computed and the repeatability of feature points between a reference image and each of the transformed images are computed. Experiment results show our corner detector could give good results.
暂无评论