Non-negative Matrix factorization (NMF) has increasingly been used as a tool in signal processing in the last couple of years. NMF, like independent component analysis (ICA) is useful for decomposing high dimensional ...
详细信息
Non-negative Matrix factorization (NMF) has increasingly been used as a tool in signal processing in the last couple of years. NMF, like independent component analysis (ICA) is useful for decomposing high dimensional data sets into a lower dimensional space. Here, we use NMF to learn the features of both structural and functional magnetic resonance imaging (sMRI/fMRI) data. NMF can be applied to perform group analysis of imaging data and we apply it to learn the spatial patterns which linearly covary among subjects for both sMRI and fMRI. We add an additional contrast term to NMF (called co-NMF) to identify features distinctive between two groups. We apply our approach to a dataset consisting of schizophrenia patients and healthy controls. The results from co-NMF make sense in light of expectations and are improved compared to the NMF results. Our method is general and may prove to be a useful tool for identifying differences between multiple groups.
The architecture and characteristic of Wireless Mesh networks (WMN), as well as the significance of Intrusion Detection System (IDS) in its application were investigated Based on the embedded analyzing of IDS technolo...
详细信息
The architecture and characteristic of Wireless Mesh networks (WMN), as well as the significance of Intrusion Detection System (IDS) in its application were investigated Based on the embedded analyzing of IDS technologies in Ad hoc network and WLAN (Wireless Local Area network), combined with the security requirements in WMN itself, it is concluded that both the architecture of distributed and cooperative IDS in Ad hoc network and distributed IDS in WLAN can not be applied directly in WMN. A new architecture of asymmetric distributed and cooperative IDS for WMN based on the application of agent was proposed in the paper. This new architecture of IDS in WMN was then simulated by the attack detection of IEEE 802.11 MAC selfish behavior in NS2, using the IDS selfish behavior attack detection model ground on the judgment mechanism of double mode, which was also brought forward. The result of the simulation shows that the given new architecture of asymmetric distributed and cooperative IDS and the IDS selfish behavior attack detection model fitted WMN well.
Bill Gates mentioned in Scientific America that robot will enter every home in ten year the same as personal computers have entered into almost every home in ten year. This project is to response to this trend, and to...
详细信息
Bill Gates mentioned in Scientific America that robot will enter every home in ten year the same as personal computers have entered into almost every home in ten year. This project is to response to this trend, and to think about how robot can enhance learning, for example, robot can be as learning tools, teaching tools, learning companions, teaching partner, or some other models to enhance learning.
Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance th...
详细信息
Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services and to solve both the requester and provider side cannot recognize the security token, in this paper, we aim at proposing a SOAP information registration and security token proxy model for Web services (SIRSTPM). We has carried on the formalizing and verifying of this model. The result of theoretical verification shows this model is secure and effective. This model is helpful for solving the problem between security and performance contradiction as well as the token cannot be recognized by both the requester and the provider.
We propose a novel interference canceller with an automatic phase control (APC) circuit that compensates for the phase error of interference signals. The proposed APC circuit estimates and compensates for the phase ro...
详细信息
We propose a novel interference canceller with an automatic phase control (APC) circuit that compensates for the phase error of interference signals. The proposed APC circuit estimates and compensates for the phase rotation of interference signals, enabling the proposed interference canceller with APC to achieve high BER performance. We use a maximum likelihood sequence estimation (MLSE) interference canceller for fixed wireless access (FWA) co-channel interferences. Degradations of signal replica accuracy incur a BER performance penalty. The novel APC circuit, which uses a simple estimation algorithm, can effectively compensate for frequency offset and phase rotation. computer simulations show that our proposed interference canceller improves BER performance.
In general, there are three popular basis representations, standard (canonical, polynomial) basis, normal basis, and dual basis, for representing elements in GF(2^m). Various basis representations have their disti...
详细信息
In general, there are three popular basis representations, standard (canonical, polynomial) basis, normal basis, and dual basis, for representing elements in GF(2^m). Various basis representations have their distinct advantages and have their different associated multiplication architectures. In this paper, we will present a unified systolic multiplication architecture, by employing Hankel matrix-vector multiplication, for various basis representations. For various element representation in GF(2^m), we will show that various basis multiplications can be performed by Hankel matrix-vector multiplications. A comparison with existing and similar structures has shown that time complexities. the proposed architectures perform well both in space and
This investigation presents an effective algorithm for computing multiplication over a class of GF(2m) based on both irreducible all one polynomials (AOPs) and equally spaced polynomials (ESPs). The proposed AOP-based...
详细信息
This investigation presents an effective algorithm for computing multiplication over a class of GF(2m) based on both irreducible all one polynomials (AOPs) and equally spaced polynomials (ESPs). The proposed AOP-based multiplier uses the modified Booth's algorithm to develop a new multiplexer-based bit-parallel multiplier that is simple and modular and such properties are important for VLSI hardware implementation. The multiplier requires ⌈m/4⌉ (m+1) MUX4×1 and (1.5m 2+0.5m - 1) XOR gates. Its time delay is not greater than T M + (3 + log2⌈m/4⌉)TX, where T M and Tx are the time delays of MUX4×1 and 2-input XOR gate, respectively. For a certain degree, an irreducible ESP with a high degree can be obtained from a corresponding irreducible AOP with a relatively very low degree. Using the subword parallel processing, the proposed AOP-based multiplier with low degree can also be adopted to realize ESP-based multipliers with high degrees.
This paper proposes a new concept of the genetic robot which has its own robot genome, in which each chromosome consists of many genes that contribute to defining the robotpsilas personality. The large number of genes...
详细信息
This paper proposes a new concept of the genetic robot which has its own robot genome, in which each chromosome consists of many genes that contribute to defining the robotpsilas personality. The large number of genes also allows for a highly complex system, however it becomes increasingly difficult and time-consuming to ensure reliability, variability and consistency for the robotpsilas personality while manually initializing values for the individual genes. To overcome this difficulty, this paper proposes an evolutionary algorithm for a genetic robotpsilas personality (EAGRP). EAGRP evolves a gene pool that customizes the robotpsilas genome so that it closely matches a simplified set of features desired by the user. It does this using several new techniques. It acts on a 2 dimensional individual upon which a new masking method, the Eliza-Meme scheme, is used to derive a plausible individual given the restricted preference settings desired by the user. The proposed crossover method allows reproduction for the 2-dimensional genome. Finally, the evaluation procedure for individuals is carried out in a virtual environment using tailored perception scenarios.
暂无评论