Many algorithms have been proposed for detecting disjoint communities (relatively densely connected subgraphs) in networks. One popular technique is to optimize modularity, a measure of the quality of a partition in t...
详细信息
ISBN:
(纸本)9781424447374;9781424447541
Many algorithms have been proposed for detecting disjoint communities (relatively densely connected subgraphs) in networks. One popular technique is to optimize modularity, a measure of the quality of a partition in terms of the number of intracommunity and intercommunity edges. Greedy approximate algorithms for maximizing modularity can be very fast and effective. We propose a new algorithm that starts by detecting disjoint cliques and then merges these to optimize modularity. We show that this performs better than other similar algorithms in terms of both modularity and execution speed.
Linear minimum mean square error (MMSE) detector has been shown to alleviate the noise amplification problem, resulting in the conventional zero-forcing (ZF) detector. In this paper, we analyze the performance improve...
详细信息
ISBN:
(纸本)9781424445219
Linear minimum mean square error (MMSE) detector has been shown to alleviate the noise amplification problem, resulting in the conventional zero-forcing (ZF) detector. In this paper, we analyze the performance improvement by the MMSE detector in terms of the condition number of its filtering matrix, and in terms of the post-precessing signal to noise ratio (SNR) improvement. To this end, we derive explicit formulas for the condition numbers of the filtering matrices and the post-processing SNRs. Analytical and simulation results demonstrate that the improvement achieved by the MMSE detector over the ZF detector is not only dependent on the noise variance and the condition number of the channel matrix, but also on how close the smallest singular values are to the noise variance.
A two-fingered micro hand has been available for use for years and allows dexterous manipulation of a single cell: grabbing, positioning, rotating and releasing. The end-effector of this micro hand consists of two gla...
详细信息
A two-fingered micro hand has been available for use for years and allows dexterous manipulation of a single cell: grabbing, positioning, rotating and releasing. The end-effector of this micro hand consists of two glass needles; however, the glass tips must be finely adjusted and the micro hand must be calibrated prior to use. Because these initial procedures require highly skilled human operators and a great deal of time, a fine adjustment module (FAM) has been developed for assisting with the fine adjustment work and was successfully shown to make the initial setup easier. However, problems with the calibration process and with the dependence on a user of the FAM control are still present. One means of improving the system for users is to automate the initial setup. The detection of the glass tips in a wide range of Z directions from a microscopic image having a small depth of focus requires robust calibration and must be possible using an automated FAM control. From this perspective, the tip position detection algorithm using the evaluation function, Image Quality Measurement (IQM), is proposed in this paper. Based on this algorithm, the automated initial setup method is explained and its effectiveness is experimentally evaluated.
In any organization, there are generally several applications in place and usually, each application has its own security policy. In fact, the ability to define multiple security policies is needed in several cases. M...
详细信息
In any organization, there are generally several applications in place and usually, each application has its own security policy. In fact, the ability to define multiple security policies is needed in several cases. Moreover, heterogeneous security mechanisms can be used to achieve security objectives. However, implementing a unified security policy for all theses mechanisms becomes then unfeasible. Hence, a formal representation of security policies is needed. Furthermore, since theses policies are generally written by different people, they may have conflicts. The main contribution of this paper concerns then, the formalization of security policies conflicts as well as their detection and resolution.
This paper analyzes accuracy of algorithms commonly adopted in instrument devoted to the detection and the characterization of voltage dips (also called sags). This analysis is particularly interesting because the res...
详细信息
ISBN:
(纸本)9781424433520
This paper analyzes accuracy of algorithms commonly adopted in instrument devoted to the detection and the characterization of voltage dips (also called sags). This analysis is particularly interesting because the results of dip measurements are utilized for calculation of severity levels and the site index assessment that are parameters adopted in determination of quality level of power supply but also in developing planning and design criteria of new electrical power grid or for selecting equipment with proper intrinsic immunity. Anyway there is a certain degree of freedom is left to instrument manufacturers (f.i. the choice of dip detection algorithm) and it can be found that, different instruments significantly disagree in some actual measurements. The paper analyzes most diffused dip detection algorithms presenting the introduced systematic deviations in event characterization. The obtained results are aimed to be taken into account and applied to performance verification of a commercial dip monitoring instrument.
In a distributed system, a monitor process collects the execution states and invokes a detection procedure to test and debug the program. This paper investigates the global state analyzing problems for the non-FIFO di...
详细信息
In a distributed system, a monitor process collects the execution states and invokes a detection procedure to test and debug the program. This paper investigates the global state analyzing problems for the non-FIFO distributed environments. In this paper, the states unknown to the monitor process are represented by using the pseudo states. Based on this technique, this paper develops an algorithm capable of identifying the maximum number of useless states for the programs run in an non-FIFO distributed environment.
Performing and detecting object interference or collision detection in urban environment simulation is always challenging problem for researchers to come out with fast and efficient collision detection algorithm. Most...
详细信息
Performing and detecting object interference or collision detection in urban environment simulation is always challenging problem for researchers to come out with fast and efficient collision detection algorithm. Most of previous method seems trying to tackle the problems of involving specific geometric models colliding pairs with restricted rules and guidelines. For example, convex hull bounding-volume tends to solve the collision detection problems by make the collision more accurate. However, its limitation of performing fast collision detection method must be left behind. Hence, in this paper we introduce new traversal algorithm using bounding-volume hierarchies (BVH) for collision detection in urban environment simulation. By using hierarchical approach, the efficiency of detecting object interference in urban simulation is increase. We believe that BVH method can be useful in urban simulation for collision detection between static rigid models and dynamic rigid models. Thus it should be able to overcome the equipment of urban environment simulation. Our result shows that bounding-volume hierarchies achieve favorable frame-rates in real time simulation using top-down binary tree. In practice, the construction of bounding-volume hierarchies in urban environment simulation are not just useful for collision detection but they also useful for others detecting object interference technique such culling and raytracing.
Traditional curvature scale space (CSS) corner detection algorithms did not differentiate various physical causes of image differential structure, therefore these algorithms could not detect corners correctly in color...
详细信息
Traditional curvature scale space (CSS) corner detection algorithms did not differentiate various physical causes of image differential structure, therefore these algorithms could not detect corners correctly in color image with shadows and highlights. According to the problem above mentioned, dichromatic reflection model was applied to differentiate image differential structure and multi scale localization and multi scale detection algorithm was improved. Finally new dichromatic reflection model based CSS algorithm was proposed. Experimental results showed that the new algorithm could detect the corner of the objects in image with highlights and shadows correctly, while traditional algorithm obtained many false corners. The new algorithm is better than the traditional algorithms in performance.
In this paper, an outlier elimination algorithm for ellipse/ellipsoid fitting is proposed. This two-stage algorithm employs a proximity-based outlier detection algorithm (using the graph Laplacian), followed by a mode...
详细信息
ISBN:
(纸本)9781424451791;9781424451807
In this paper, an outlier elimination algorithm for ellipse/ellipsoid fitting is proposed. This two-stage algorithm employs a proximity-based outlier detection algorithm (using the graph Laplacian), followed by a model-based outlier detection algorithm similar to random sample consensus (RANSAC). These two stages compensate for each other so that outliers of various types can be eliminated with reasonable computation. The outlier elimination algorithm considerably improves the robustness of ellipse/ellipsoid fitting as demonstrated by simulations.
RAWVec is a private watermarking method for vector maps that uses a raster image as watermark. Visually recognizable watermarks can add extra information like integrity and authentication, while blind watermarks do no...
详细信息
RAWVec is a private watermarking method for vector maps that uses a raster image as watermark. Visually recognizable watermarks can add extra information like integrity and authentication, while blind watermarks do not need the original data to be published for the detection. This work presents a semi-blind version of RAWVec, i.e. a method that uses the original vector map during the detection without revealing it, but maintains the watermark as a raster image.
暂无评论