Power cable problem under the normal operating condition is very important in electric power systems. In practical operation, Various cable faults will happen. Recognizing the cable faults correctly and timely is very...
详细信息
Power cable problem under the normal operating condition is very important in electric power systems. In practical operation, Various cable faults will happen. Recognizing the cable faults correctly and timely is very crucial. A method is proposed that an annealed chaotic competitive learning network (ACCLN) recognizes power cable types in this paper. The result shows a better performance than SVM and IPSO-SVM method. The result shows that the fault recognition accuracy reached 96.2% by 54 data test sample data. The network training time is about 0.032 second. The proposed method is applied for the cable fault classification effectively.
This paper focuses on a challenging task for representing and detecting multiple changes in multitemporal hyperspectral images. To this aim, a novel Sequential Spectral Change Vector Analysis (S~2CVA) method is propos...
详细信息
This paper focuses on a challenging task for representing and detecting multiple changes in multitemporal hyperspectral images. To this aim, a novel Sequential Spectral Change Vector Analysis (S~2CVA) method is proposed that extends the use of the popular C~2VA method [1]. The proposed S~2CVA approach is designed in a sequential and semiautomatic fashion, where a fully automatic 2-D change representation and an interactive change identification are included at each level of the processing, exploiting the multiple change information hierarchically. In particular, an adaptive reference vector scheme is developed to drive the change representation, and thus the sequential analysis, by following a top-down structure. Changes are represented and separated according to their spectral change significance. Experimental results obtained on multitemporal Hyperion images confirm the effectiveness of the proposed method.
In the past year, Cooperative Learning has become one of the most important teaching strategies. Helping learners group appropriately is now becoming more and more important. To solve the problem, a lot of methods hav...
详细信息
In the past year, Cooperative Learning has become one of the most important teaching strategies. Helping learners group appropriately is now becoming more and more important. To solve the problem, a lot of methods have been proposed. In this paper, we employ a novel approach that considers the complementary degree of learner's learning state and social networks to enhance interaction and teamwork between learners. Moreover, this paper using genetic algorithm (GA) to generate better grouping results. By recording the learning statuses of learners, we can adjust grouping result from each assignment dynamically. Results show that the proposed approach can optimize the grouping well.
Secure data communication is the most important and essential issue in the area of message transmission over the networks. Cryptography provides the way of making secure message for confidential message transfer. Cryp...
详细信息
Secure data communication is the most important and essential issue in the area of message transmission over the networks. Cryptography provides the way of making secure message for confidential message transfer. Cryptography is the process of transforming the sender's message to a secret format called cipher text that only intended receiver will get understand the meaning of the secret message. There are various cryptographic or DNA based encoding algorithms have been proposed in order to make secret message for communication. But all these proposed DNA based encryption algorithms are not secure enough to provide better security as compared with the today's security requirement. In this paper, we have proposed a technique of encryption that will enhance the message security. In this proposed algorithm, a new method of DNA based encryption with a strong key of 256 bit is used. Along with this big size key various other encoding tools are used as key in the encoding process of the message like random series of DNA bases, modified DNA bases coding. Moreover a new method of round key selection is also given in this paper to provide better security in the message. The cipher text contains the extra bit of information as similar with the DNA strands that will provide better and enhanced security against intruder's attack.
The rapid increase of power consumption due to Internet traffic growth has made the reduction of power used by network equipment a vital issue. We earlier proposed a dynamic transmission capacity control scheme to red...
详细信息
Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, w...
详细信息
Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.
The use of vaccinia virus, an oncolytic virus, in cancer immune therapy enhances the overall immune response. The mechanism of immune response against cancer and virus infection is similar. We found sequence relations...
详细信息
ISBN:
(纸本)9781479956708
The use of vaccinia virus, an oncolytic virus, in cancer immune therapy enhances the overall immune response. The mechanism of immune response against cancer and virus infection is similar. We found sequence relationships between vaccinia virus proteins and human proteins that are often regarded as hallmarks of cancer. From comparing human and vaccinia virus protein sequences, genetically engineered viruses associated with immune response have been used for cancer immune therapy in many clinical trials. Using published papers about cancer immunology, we classified proteins as either positively or negatively associated with cancer immune therapy. We searched for sequence relationships between human proteins and vaccinia virus proteins that are related to the classified proteins.
This paper presents an adaptive framework for detection of changes of relevance occurring in image time series in a recursive way. With the availability of reference data for only one image pair from the time series (...
详细信息
ISBN:
(纸本)9781479953141
This paper presents an adaptive framework for detection of changes of relevance occurring in image time series in a recursive way. With the availability of reference data for only one image pair from the time series (source domain), the proposed methodology employs change vector analysis in the 3-dimensional spherical domain to determine a decision region R associated with the change of relevance. Then, by exploiting the similarity among domains, the same kind of change can be detected by adapting R to the rest of image pairs belonging to the time series. The methodology was tested in a multispectral time series made up by TM-Landsat images marked by sequential deforestation activities in the Amazon with reference data. The quantitative analysis of the results indicates the soundness of the proposed approach.
In this paper, a light-weight 3D object reconstruction system is proposed. It aims to fulfill the increasing demand for fast and reliable 3D reconstruction in a mobile environment. Thereby, people can directly use the...
详细信息
In this paper, a light-weight 3D object reconstruction system is proposed. It aims to fulfill the increasing demand for fast and reliable 3D reconstruction in a mobile environment. Thereby, people can directly use their own device (e.g. mobile phone or tablet) to reconstruct desired objects into 3D models. The system is implemented and tested on an embedded board, MIO-5250, that is equipped with the recent Intel Atom N2600 series. With massive development of 3D technology, we believe the application proposed in this work would have rapidly expanding usages in the near future.
We present an abandoned object detection system in this paper. A finite-state-machine model is introduced to extract stationary foregrounds in a scene for visual surveillance, where the state value of each pixel is in...
详细信息
ISBN:
(纸本)9781479952106
We present an abandoned object detection system in this paper. A finite-state-machine model is introduced to extract stationary foregrounds in a scene for visual surveillance, where the state value of each pixel is inferred via the cooperation of short-term and long-term background models constructed in the proposed approach. To identify the left-luggage event, we then verify whether the static foregrounds are abandoned objects through the analysis of owner's moving trajectory back-tracked to the static foreground locations. Experimental results reveal that the proposed approach tackles the problem well on publicly available datasets.
暂无评论