In this paper, we proposed 2 algorithms based on L1 and L2 norm estimator to recover the signal by using just few components. Moreover we comprehensively present the recovery algorithm based on L1, L2 and SL0 for digi...
详细信息
ISBN:
(纸本)9789746724913
In this paper, we proposed 2 algorithms based on L1 and L2 norm estimator to recover the signal by using just few components. Moreover we comprehensively present the recovery algorithm based on L1, L2 and SL0 for digital signal or image under some several noise models from their incomplete observation. The proposed algorithm is used with a matrix that the number of row is much fewer than the column. The algorithm states that if signal or image is sufficient sparse, we can recover it from small number of linear measurement by solving convex program of observation vector. Base on the very important properties of the image which most of the signal information tends to be concentrated in few low frequency components of the DCT. Finally experiments results are presented on both synthesis and real image under various kind of noise (AWGN, Salt & Pepper Noise and Speckle Noise) with different noise power. The effects of different noise models will be compared in order to show the improvement of L1 norm over SL0 and L2 norm under heavy noise or some noise that doesn't have Gaussian form.
Accurate forecasting of urban water consumption can provide guidance to urban water supply and planning. In recent patents, artificial neural network (ANN) has been applied in urban water consumption forecasting. Howe...
详细信息
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The ...
详细信息
ISBN:
(纸本)9780769541457
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more s
The area of mobile ad hoc networking has gained widespread interest of the network research community in recent years because of the ability of the MANETs to provide truly distributed and decentralized communication f...
详细信息
Step-graded InGaP_ySb_(1-y) and In_xGa_(1-x)As metamorphic buffer layer (MBL) structures are grown on GaAs substrates by metal-organic chemical vapor deposition (MOCVD). AFM analysis indicates that graded group V InGa...
详细信息
ISBN:
(纸本)9781457717536
Step-graded InGaP_ySb_(1-y) and In_xGa_(1-x)As metamorphic buffer layer (MBL) structures are grown on GaAs substrates by metal-organic chemical vapor deposition (MOCVD). AFM analysis indicates that graded group V InGaP_ySb_(1-y) MBLs exhibit significantly lower surface roughness (~4.7nm) compared with more conventional graded group III In_xGa_(1-x)As MBLs, which typically have rms surface roughness in the range of 7-14nm. To reduce the surface roughness of the In_xGa_(1-x)As MBL, a post growth Chemical-Mechanical Polishing (CMP) procedure is implemented. AFM image analysis indicates the CMP process is effective in reducing the step-graded In_xGa_(1-x)As MBL surface roughness from ~7.3 nm (as-grown) to 2.3 nm post CMP. Preliminary studies indicate that bulk InGaAs layers regrown on top of the MBL subjected to CMP exhibit improved static and transient PL characteristics compared with those deposited on as-grown MBLs.
Recently, there is need for the automatic logo detection and document image retrieval because of the increasing requirements of intelligent document images. In this work, we proposed an automatic logo detection and ex...
详细信息
This work presents a Propositional Dynamic Logic (πDL) in which the programs are described in a language based on the π-Calculus without replication. Our goal is to build a dynamic logic that is suitable for the des...
详细信息
Due to the mission-critical nature of command-and-control traffic in the telemetry environment, it is imperative that reliable transfer be supported. The AeroTP disruption-tolerant transport protocol is intended for t...
详细信息
This paper is about the development of a framework for the formal certification of software for masquerade detection based upon natural mimicry. A masquerade is when an intruder mimics a genuine user in order to compr...
详细信息
In the signaling plane of an IMS (IP Multimedia Subsystem) network, the interrogating Call/Session Control Function (I-CSCF) is required to choose the serving CSCF (SCSCF) for user requests arriving at the proxy CSCFs...
详细信息
ISBN:
(纸本)9781424488360
In the signaling plane of an IMS (IP Multimedia Subsystem) network, the interrogating Call/Session Control Function (I-CSCF) is required to choose the serving CSCF (SCSCF) for user requests arriving at the proxy CSCFs (P-CSCF). This requires S-CSCF selection in such a way that the response time is minimized. However, in an overloaded situation, the PCSCF entry points for arriving requests must balance between rejecting new requests and having an acceptable response time from S-CSCF for those that are allowed to enter. In this setting, we consider a number of controls for congestion avoidance that work in conjunction with S-CSCF selection in an IMS Network. For balancing between rejection of requests and the response time, we also propose a composite metric. Through our studies on grid topologies, we observe that one of the avoidance algorithms, the bang-bang control, generally shows to be the most promising toward striking a good balance between rejection of requests and the response time.
暂无评论