In this paper, we introduce branching context bisimulation, branching normal bisimulation and branching barbed congruence for higher order pi-calculus. Moreover we prove the equivalence of the three branching bisimula...
详细信息
In this paper, we introduce branching context bisimulation, branching normal bisimulation and branching barbed congruence for higher order pi-calculus. Moreover we prove the equivalence of the three branching bisimulations. At last, we compare branching context bisimulations with other bisimulations for higher order pi-calculus.
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hop...
详细信息
ISBN:
(纸本)9781424435623
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hops from the source to the destination may not be the best path. Considered the remaining power and the node selfishness, we propose an improved AODV routing protocol, I-AODV in this paper. We use a new term, node status, regard the node status as a function of the remaining power and the fame and regard the node status as the basic condition for choosing the next hop in the new routing protocol.
A DCT-domain based character detection algorithm is proposed for video stream. It utilizes the directional features of the texture in character blocks and the property that the characters in video usually distribute i...
详细信息
A DCT-domain based character detection algorithm is proposed for video stream. It utilizes the directional features of the texture in character blocks and the property that the characters in video usually distribute in row or column. The character/non-character blocks are effectively separated by a new adaptive threshold, then the noise and false text regions are further removed by morphological operation. Finally, the text regions are accurately obtained by horizontal and vertical projection. Experimental results demonstrate that the proposed approach can detect characters accurately even in video with complex background , and it is of good robustness and high practical value.
By researching the Brushlet domain coefficients of texture images, we found that the distribution of the magnitudes of Brushlet domain coefficients roughly meet rayleigh distribution. And there are correlations betwee...
详细信息
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computationa...
详细信息
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computational complexity of 2D Otsu method, a fast algorithm is proposed based on improved histogram. Two-dimensional histogram is projected onto the diagonal, which forms 1D histogram with obvious peak and valley distribution. Then two-dimensional Otsu method is applied on a line that is vertical to the diagonal to find the optimal threshold. Furthermore, three look-up tables are utilized to improve the computational speed by eliminating the redundant computation in original two-dimensional Otsu method. Theoretical analysis and experimental simulation show that the proposed approach greatly enhances the speed of thresholding and has better immunity to salt and pepper noise.
This paper presents a novel machine learning model-Kernel Granular Support Vector Machine (KGSVM), which combines traditional support vector machine (SVM) with granular computing theory. By dividing granules and repla...
详细信息
This paper presents a novel machine learning model-Kernel Granular Support Vector Machine (KGSVM), which combines traditional support vector machine (SVM) with granular computing theory. By dividing granules and replacing with them in kernel space, the datasets can be reduced effectively without changing data distribution. And then the generalization performance and training efficiency of SVM can be improved. Simulation results on UCI datasets demonstrate that KGSVM is highly scalable for large datasets and very effective in terms of classification.
In practical issues, categorical data and numerical data usually coexist, and a unified data reduction technique for hybrid data is desirable. In this paper, an information measure is proposed for computing the discer...
详细信息
In practical issues, categorical data and numerical data usually coexist, and a unified data reduction technique for hybrid data is desirable. In this paper, an information measure is proposed for computing the discernibility power of a categorical or numeric attribute. Based on the measure, a uniform definition of significance of attributes with categorical values and numerical values is proposed. Furthermore, an algorithm to obtain an attribute reduct from hybrid data is presented, and one of its accelerated version is also constructed. Experiments show that these two algorithms can get the same reducts, and the classification accuracies of reduced datasets are similar with the ones using Hu's algorithm. However, the accelerated version consumes much less time than the original one and Hu's algorithm do.
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate...
详细信息
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate over the Markov wireless error model is investigated. Based on this character, the algorithm can detect the nature of packet losses by sending large and small packets alternately, and control the sending rate of nodes. Furthermore, by use of an updating factor K, the algorithm can adapt to the changes of network states quickly. Extensive computer simulations demonstrate that the proposed scheme is effective in satisfying the end to end quality of service and reducing the congestion loss rate in various network topologies.
Generally, the threshold of percolation in complex networks depends on the underlying structural characterization. However, what topological property plays a predominant role is still unknown, despite the speculation ...
详细信息
Generally, the threshold of percolation in complex networks depends on the underlying structural characterization. However, what topological property plays a predominant role is still unknown, despite the speculation of some authors that degree distribution is a key ingredient. The purpose of this paper is to show that power-law degree distribution itself is not sufficient to characterize the threshold of bond percolation in scale-free networks. To achieve this goal, we first propose a family of scale-free networks with the same degree sequence and obtain by analytical or numerical means several topological features of the networks. Then, by making use of the renormalization-group technique we determine the threshold of bond percolation in our networks. We find an existence of nonzero thresholds and demonstrate that these thresholds can be quite different, which implies that power-law degree distribution does not suffice to characterize the percolation threshold in scale-free networks.
Support vector machine is kind of novel machine learning method, based on statistical learning theory, which becomes the hotspot of machine learning because of its excellent learning performance. The method of support...
详细信息
暂无评论