In order to study the optimal network of feeder bus lines for rail stations, this paper established an optimization model with the objective of minimizing the consume time and operating costs of unit traveler, and pro...
详细信息
ISBN:
(纸本)9783038350064
In order to study the optimal network of feeder bus lines for rail stations, this paper established an optimization model with the objective of minimizing the consume time and operating costs of unit traveler, and proposed an iterative algorithm to solve the model and then used an example to describe the practicality of the model and the algorithm.
A distributed system which comprises independent sensors and a fusion center is considered. Optimum quantization of sensor observations by Chernoff Information (CI) and deflection criterion (DC) for detection purpose ...
详细信息
ISBN:
(纸本)9781479930838
A distributed system which comprises independent sensors and a fusion center is considered. Optimum quantization of sensor observations by Chernoff Information (CI) and deflection criterion (DC) for detection purpose is studied. Chernoff information of overall system is derived, and locally optimum quantization of sensor observations is proved to achieve global optimality. A relationship between DC and CI of quantized observations is established. A novel iterative algorithm which works similar to Lloyd-Max algorithm is proposed to find optimum quantization intervals. Results indicate that optimum 2-bit quantization gives detection performance that is close to what is achievable by collecting soft reports from sensors.
The identification of the optic disc (OD) is necessary for the computer aided diagnosis of retinal diseases, but most methods for the OD detection often fail in the existence of retinal lesions and imaging artifacts. ...
详细信息
ISBN:
(纸本)9781479952779
The identification of the optic disc (OD) is necessary for the computer aided diagnosis of retinal diseases, but most methods for the OD detection often fail in the existence of retinal lesions and imaging artifacts. This paper proposes a new method based on iterative brightest pixels extraction (IBPE) for OD localization, which is designed to overcome the presence of large exudates or bright artifacts. The iterative algorithm integrates brightest pixels extraction and discrimination of geometric features. At each iteration step, the brightest pixels are extracted and a binary candidate map is constructed. In order to distinguish the OD region from candidates, two geometric features of each candidate are employed. Then, a checking process is performed. The algorithm deletes the false positive OD region and re-gets the new brightest pixels, iteratively. Hence, the real OD region rises finally though it is not bright at the first. The proposed method is evaluated on STARE retinal database. The experimental results show that the performance achieves a success rate of 95%.
A node position derivation algorithm called IR for WSNs is developed in this paper. IR is an iterative algorithm based on node-beacon distance information. It is assumed that each sensor node can connect with several ...
详细信息
A node position derivation algorithm called IR for WSNs is developed in this paper. IR is an iterative algorithm based on node-beacon distance information. It is assumed that each sensor node can connect with several beacons by one-hop or multihop and estimate the node-beacon distances, and then, the algorithm is executed in a distributed mode. Simulation is provided to compare our proposed algorithm with two representative position derivation algorithms, Min-max and Lateration, in terms of some evaluation parameters. The simulation shows that our proposed algorithm can be a utilitarian node position derivation algorithm for WSNs.
Model-based image reconstruction (MBIR) is a powerful technique for solving ill-posed inverse problems. Compared with direct methods, it can provide better estimates from noisy measurements and from incomplete data, a...
详细信息
Model-based image reconstruction (MBIR) is a powerful technique for solving ill-posed inverse problems. Compared with direct methods, it can provide better estimates from noisy measurements and from incomplete data, at the cost of much longer computation time. In this work, we focus on accelerating and applying MBIR for solving reconstruction problems, including X-ray computed tomography (CT) image reconstruction and light field reconstruction, using variable splitting based on the augmented Lagrangian (AL) methods. For X-ray CT image reconstruction, we combine the AL method and ordered subsets (OS), a well-known technique in the medical imaging literature for accelerating tomographic reconstruction, by considering a linearized variant of the AL method and propose a fast splitting-based ordered-subset algorithm, OS-LALM, for solving X-ray CT image reconstruction problems with penalized weighted least-squares (PWLS) criterion. Practical issues such as the non-trivial parameter selection of AL methods and remarkable memory overhead when considering the finite difference image variable splitting are carefully studied, and several variants of the proposed algorithm are investigated for solving practical model-based X-ray CT image reconstruction problems. Experimental results show that the proposed algorithm significantly accelerates the convergence of X-ray CT image reconstruction with negligible overhead and greatly reduces the noise-like OS artifacts in the reconstructed image when using many subsets for OS acceleration. For light field reconstruction, considering decomposing the camera imaging process into a linear convolution and a non-linear slicing operations for faster forward projection, we propose to reconstruct light field from a sequence of photos taken with different focus settings, i.e., a focal stack, using an alternating direction method of multipliers (ADMM). To improve the quality of the reconstructed light field, we also propose a signal-independent sp
The Pilot-Symbol Assisted Modulation (PSAM) is an usual channel method for OFDM systems. On the basis of Windowed the fourth Discrete Cosine Transform (WDCT-IV), a new channel estimation iterative algorithm for OFDM s...
详细信息
The Pilot-Symbol Assisted Modulation (PSAM) is an usual channel method for OFDM systems. On the basis of Windowed the fourth Discrete Cosine Transform (WDCT-IV), a new channel estimation iterative algorithm for OFDM systems is proposed. By exploiting the characteristics of iterative detection, the proposed algorithm inhibits the additive white Gaussian noise (AWGN) and inter-carrier interference (ICI) more effectively. Simulation result shows that the technique is effective and the system performance is better than one of Ref.[11] under the multipath fading channels.
In this paper an algorithm for the solution of the European electricity market coupling is presented, considering all block and complex orders available in the European Power Exchanges. The model takes into account th...
详细信息
In this paper an algorithm for the solution of the European electricity market coupling is presented, considering all block and complex orders available in the European Power Exchanges. The model takes into account the clearing conditions of profile and regular block orders, linked block orders, exclusive group of block orders and flexible hourly orders, as well as the clearing conditions of Minimum Income Condition and Load Gradient orders, possibly under a scheduled stop condition. The model considers also hourly flow ramping constraints on single interconnections or group of interconnections, net position ramping constraints, interconnection losses and tariffs. The flow-based approach is implemented, using the zonal PTDF matrix. The algorithm eliminates possible paradoxically accepted block and MIC orders within an iterative process. The proposed algorithm is evaluated in a pan-European day-ahead electricity marketplace.
In this paper a nodal-based approach is evaluated for the clearing of the pan-European day-ahead electricity market. In the proposed mathematical formulation, the widely used in European Power Exchanges (PXs) profile ...
详细信息
In this paper a nodal-based approach is evaluated for the clearing of the pan-European day-ahead electricity market. In the proposed mathematical formulation, the widely used in European Power Exchanges (PXs) profile block orders are explicitly modeled, whereas the full set of inter-zonal and intra-zonal normal and security (N-1) transmission constraints is incorporated. The proposed approach is evaluated using a real-world power system, the Balkan power system, and the economic and computational aspects of the proposed methodology are thoroughly discussed.
In previous work, we designed space fiducials with the aim of making camera pose determination as noise-insensitive as possible. These fiducials turned out to be sets of points that formed concentric regular polyhedra...
详细信息
In previous work, we designed space fiducials with the aim of making camera pose determination as noise-insensitive as possible. These fiducials turned out to be sets of points that formed concentric regular polyhedra. Here, we apply an idea of Dementhon and Davis and test and analyze an iterative linear algorithm in conjunction with our optimal fiducials to increase the accuracy of the computed camera pose. We also analyze under what circumstances this iterative algorithm is guaranteed to converge to the correct solution. Comprehensive computer simulations illustrate the behavior of the algorithm and the degree of improvement in pose determination in case of convergence. (C) 2009 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 19, 27-36, 2009;Published online in Wiley InterScience (***). DOI 10.1002/ima.20175
In this age of explosive growth in information exchanges, there is indeed no time at which security does not matter. One of the symmetric encryption algorithms, DES, has kept its dominant position in the area of data ...
详细信息
ISBN:
(纸本)9781479932795
In this age of explosive growth in information exchanges, there is indeed no time at which security does not matter. One of the symmetric encryption algorithms, DES, has kept its dominant position in the area of data encryption over the last few decades. However, with a rapid development in the field of computer hardware, DES has already been proved insecure. It takes a short time to translate the ciphertext to its corresponding plaintext using brute-force method at a reasonable cost. This is mainly due to the small key size DES employed. Given these issues, the objective of this article is to suggest an alternative on DES to obtain higher security and better execution efficiency by increasing the key size and updating the iteration technique. Comparisons were conducted with both DES and the advanced DES named triple DES (3DES). The results have demonstrated that the proposed algorithm outperforms both previous algorithms.
暂无评论