The measuring accuracy of the TDR cable length measurement system relies on the recognition of the reflected wave. The reflected wave is susceptible to be affected by noise and the reflected wave detecting error is co...
详细信息
ISBN:
(纸本)9783642293894
The measuring accuracy of the TDR cable length measurement system relies on the recognition of the reflected wave. The reflected wave is susceptible to be affected by noise and the reflected wave detecting error is comparatively large. In order to correctly identifying and detecting the reflected wave, this dissertation studies four reflected wave recognition algorithms, which are established according to the threshold method, centroid method, polynomial fitting method and the wavelet modulus maxima method respectively. The advantages and disadvantages of these algorithms are analyzed. The repeatability and accuracies of the reflected wave arrival time for these algorithms are compared through practical applications.
This paper provides a preliminary survey of the algoritms used in ISAR imaging for the ship recognition. It provides an overview of existing literature and summarises the current state on a topic. The author of the pa...
详细信息
ISBN:
(纸本)9781509025183
This paper provides a preliminary survey of the algoritms used in ISAR imaging for the ship recognition. It provides an overview of existing literature and summarises the current state on a topic. The author of the paper focuses on the algorithms for a single target.
The human face is one of the most visible features of our unique identity as individuals. Interestingly, mono -zygotic twins share almost identical facial traits and the same DNA sequence but could exhibit differences...
详细信息
The human face is one of the most visible features of our unique identity as individuals. Interestingly, mono -zygotic twins share almost identical facial traits and the same DNA sequence but could exhibit differences in other biometrical parameters. The expansion of the world wide web and the possibility to exchange pictures of humans across the planet has increased the number of people identified online as virtual twins or doubles that are not family related. Herein, we have characterized in detail a set of "look-alike"humans, defined by facial recognition algorithms, for their multiomics landscape. We report that these individuals share similar genotypes and differ in their DNA methylation and microbiome landscape. These results not only provide in-sights about the genetics that determine our face but also might have implications for the establishment of other human anthropometric properties and even personality characteristics.
In this paper we give a recognition algorithm in O(n(n + m)) time for bipartite chain graphs, and directly calculate the density of such graphs. For their stability number and domination number, we give algorithms com...
详细信息
In this paper we give a recognition algorithm in O(n(n + m)) time for bipartite chain graphs, and directly calculate the density of such graphs. For their stability number and domination number, we give algorithms comparable to the existing ones. We point out some applications of bipartite chain graphs in chemistry and approach the Minimum Chain Completion problem.
Regional and cultural diversities around the world have given birth to a large number of writing systems and scripts, which consist of varying character sets. Developing an optimal character recognition for such a var...
详细信息
Regional and cultural diversities around the world have given birth to a large number of writing systems and scripts, which consist of varying character sets. Developing an optimal character recognition for such a varying and large character set is a challenging task. Unlimited variations in handwritten text due to mood swings, varying writing styles, changes in medium of writing, and many more puzzle the research community. To overcome this problem, researchers have proposed various techniques for the automatic recognition of cursive languages like Urdu, Pashto, and Arabic. With the passage of time, the field of text recognition matured, and the number of publications exponentially increased in the targeted field. It is very difficult to find all the techniques developed, calculate the time and resource consumptions, and understand the cost-benefit tradeoffs among these techniques. These tradeoffs resist making this technology able for practical use. To address these tradeoffs, this article systematic analysis to identify gaps in the literature and suggest new enhanced solution accordingly. A total of 153 of the most relevant articles from 2008 to 2022 are analyzed in this systematic literature review (SLR) work. This systematic review process shows (1) the list of techniques suggested for cursive text recognition purposes and its capabilities, (2) set of feature extraction techniques proposed, and (3) implementation tools used to design and simulate the empirical studies in this specialized field. We have also discussed the emerging trends and described their implications for the research community in this specialized domain. This systematic assessment will ultimately help researchers to perform an overview of the existing character/text recognition approaches, recognition capabilities, and time consumption and subsequently identify the areas that requires a significant attention in the near future.
In this paper we show an O(m) time recognition algorithm for a class of graphs named Strict 2-Threshold that have threshold number 2. Our algorithm improves the previously known O(m(2)) algorithm and generates the two...
详细信息
In this paper we show an O(m) time recognition algorithm for a class of graphs named Strict 2-Threshold that have threshold number 2. Our algorithm improves the previously known O(m(2)) algorithm and generates the two threshold components. The algorithm can be easily adapted to recognize 2-threshold graphs with exactly three cutpoints.
In this work we provide a decomposition theorem for a class of quaternary signed- graphic matroids. The decomposition is based on k- sums and a new operation called star composition, while the building blocks are grap...
详细信息
In this work we provide a decomposition theorem for a class of quaternary signed- graphic matroids. The decomposition is based on k- sums and a new operation called star composition, while the building blocks are graphic matroids and nongraphic matroids which become graphic upon the deletion of any co circuit. This result generalizes previous results for binary signed-graphic matroids and graphic matroids, and it provides the theoretical basis for a recognition algorithm.
Graph G is the square of graph H if two vertices x,y have an edge in G if and only if x,y are of distance at most two in H. Given H it is easy to compute its square H (2), however Motwani and Sudan proved that it is N...
详细信息
Graph G is the square of graph H if two vertices x,y have an edge in G if and only if x,y are of distance at most two in H. Given H it is easy to compute its square H (2), however Motwani and Sudan proved that it is NP-complete to determine if a given graph G is the square of some graph H (of girth 3). In this paper we consider the characterization and recognition problems of graphs that are squares of graphs of small girth, i.e. to determine if G=H (2) for some graph H of small girth. The main results are the following. There is a graph theoretical characterization for graphs that are squares of some graph of girth at least 7. A corollary is that if a graph G has a square root H of girth at least 7 then H is unique up to isomorphism. There is a polynomial time algorithm to recognize if G=H (2) for some graph H of girth at least 6. It is NP-complete to recognize if G=H (2) for some graph H of girth 4.
A graph G = (V, E) is a threshold tolerance graph if each vertex v is an element of V can be assigned a weight w(v) and a tolerance t(v), such that two vertices x, y is an element of V are adjacent if w(x) + w(y) >...
详细信息
A graph G = (V, E) is a threshold tolerance graph if each vertex v is an element of V can be assigned a weight w(v) and a tolerance t(v), such that two vertices x, y is an element of V are adjacent if w(x) + w(y) >= min(t(x), t(y)). Currently, the most efficient recognition algorithm for threshold tolerance graphs is the algorithm of Monma, Reed, and Trotter which has an O(n(4)) runtime. We give an O(n(2)) algorithm for recognizing threshold tolerance and their complements, the co-threshold tolerance (co-TT) graphs, resolving an open question of Golumbic, Weingarten, and Limouzy. (C) 2015 Elsevier B.V. All rights reserved.
In this paper, we study the class of distance-hereditary comparability graphs, that is, those graphs which admit a transitive orientation and are completely decomposable with respect to the split decomposition. We pro...
详细信息
In this paper, we study the class of distance-hereditary comparability graphs, that is, those graphs which admit a transitive orientation and are completely decomposable with respect to the split decomposition. We provide a characterization based on a restricted number of forbidden subgraphs. We also provide further characterizations and one of them, based on the split decomposition, is used to devise a recognizing algorithm working in linear time. Finally, we show how to build distance-hereditary comparability graphs. (C) 2012 Elsevier B.V. All rights reserved.
暂无评论