Process monitoring is an essential part of industrial systems. It requires higher product quality and safety operations. Therefore, a nonlinear data-driven approach based reduced KPCA (RKPCA) for statistical monitorin...
详细信息
We consider the problem of finding secrecy rate of a multiple-input multiple-output (MIMO) wire-tap channel. A transmitter, a legitimate receiver, and an eavesdropper are all equipped with multiple antennas. The chann...
详细信息
In this paper we present a web-based tutoring system designed to enhance a student's conceptual understanding by providing many concept-centered exercises. The system relies on a course textbook from an introducto...
详细信息
In this paper we present a web-based tutoring system designed to enhance a student's conceptual understanding by providing many concept-centered exercises. The system relies on a course textbook from an introductory signalprocessing course for knowledge representation, and also on a large database of relevant problems. We construct concept maps from the textbook to create meta-data for various textbook derived resources, as well as for tagging all the exercise questions. The system tracks each student's comprehension of the course material by evaluating the student's problem solving proficiency in terms of the concepts from the textbook..
We present a method for constructing fractal interpolation surfaces and volumes through points sampled on rectangular lattices. Unlike other surface constructions ours uses rectangular rather than triangular tilings, ...
详细信息
We present a method for constructing fractal interpolation surfaces and volumes through points sampled on rectangular lattices. Unlike other surface constructions ours uses rectangular rather than triangular tilings, halving the number of required parameters. This method is no more complex than previous constructions and yet does not suffer from their limitations. Additionally, our construction extends easily to volumetric interpolation, for which there were no previous (continuous) constructions. In addition to an example with synthetic data, a real image is interpolated using a fractal surface. Limitations and possible improvements are mentioned.
Delay-and-sum (DS) beam-forming is one of the basic beam-forming methods, and it is effective for both narrow- And wide-band sources. However, DS beam-forming exhibits high computational complexity. Recently, a fast m...
详细信息
Since previous secure communications methods using chaotic systems require very high SNRs, knowledge of the initial conditions, and/or chaotic systems with the self-synchronization property, their application is limit...
Since previous secure communications methods using chaotic systems require very high SNRs, knowledge of the initial conditions, and/or chaotic systems with the self-synchronization property, their application is limited. In this paper, a new secure communications scheme based on chaotic switching is discussed. The proposed scheme makes decisions on the incoming bits by comparing the power level of the dynamical error for each symbol signal after applying a noise reduction method based on the known system dynamics. A multi-user secure communications scheme is also considered where each user's symbol signal is mapped through a unique scramble matrix. We also examine whether these scramble matrices help to combat against smart jamming. The proposed system does not require self-synchronization between the chaotic receiver and transmitter and exhibits Seasonable performance at relatively low SNRs.
Speech and audio processing algorithms, which are based on the processing of the features and signals, are often written using poor programming styles. Understanding the existing source code and extending it is thus a...
详细信息
Speech and audio processing algorithms, which are based on the processing of the features and signals, are often written using poor programming styles. Understanding the existing source code and extending it is thus a time-consuming process that forces researchers to deal with programming problems instead of speech and audio processing innovations. We have developed a new system in C++ to overcome these problems. The programming techniques used in this environment allow a researcher to concentrate on innovations in an environment that still allows the rapid implementation of efficient real-time speech and audio processing applications.
The aim of this study is to assess the functional connectivity from resting state functional magnetic resonance imaging (fMRI) data. Spectral clustering algorithm was applied to the realistic and real fMRI data acquir...
详细信息
ISBN:
(纸本)9781424466238
The aim of this study is to assess the functional connectivity from resting state functional magnetic resonance imaging (fMRI) data. Spectral clustering algorithm was applied to the realistic and real fMRI data acquired from a resting healthy subject to find functionally connected brain regions. In order to make computation of the spectral decompositions of the entire brain volume feasible, the similarity matrix has been sparsified with the t-nearestneighbor approach. Realistic data were created to investigate the performance of the proposed algorithm and comparing it to the recently proposed spectral clustering algorithm with the Nystrom approximation and also with some well-known algorithms such as the Cross Correlation Analysis (CCA) and the spatial Independent Component Analysis (sICA). To enhance the performance of the methods, a variety of data pre and post processing steps, including data normalization, outlier removal, dimensionality reduction by using wavelet coefficients, estimation of number of clusters and optimal number of independent components (ICs). Results demonstrate the applicability of the proposed algorithm for functional connectivity analysis.
This paper introduces a pioneering fault diagnosis technique termed Interval Ensemble Learning based on Sine Cosine Optimization Algorithm (IEL- SCOA), tailored to tackle uncertainties prevalent in wind energy convers...
详细信息
The goal of this research is to add automatic target recognition (ATR) capabilities to existing passive radar systems. We do so by comparing the radar cross section (RCS) of detected targets to the precomputed RCS of ...
详细信息
The goal of this research is to add automatic target recognition (ATR) capabilities to existing passive radar systems. We do so by comparing the radar cross section (RCS) of detected targets to the precomputed RCS of known targets in the target class. The precomputed RCS of the targets comprising the target class is modeled using a multi-step process involving programs such as the fast Illinois solver code (FISC). Advanced refractive effects prediction system (AREPS) and numerical electromagnetic code (NEC2). A Rician likelihood model compares the power profile of the detected target to the precomputed power profiles of the targets in the target class; this comparison results in target identification. Thus far, the results of simulations are encouraging, indicating that the algorithm correctly identifies aircraft with high probability at the anticipated noise level. Performance can be expected to decline as the noise power surpasses the maximum signal power.
暂无评论