Fuzzy TOPSIS is one of the sensitive methods for multi-criteria decision making(MCDM).This paper presents the possibility of using fuzzy TOPSIS method and fuzzy evaluation framework for the quality of
Fuzzy TOPSIS is one of the sensitive methods for multi-criteria decision making(MCDM).This paper presents the possibility of using fuzzy TOPSIS method and fuzzy evaluation framework for the quality of
Fuzzy TOPSIS is one of the sensitive methods for multi-criteria decision making(MCDM). This paper presents the possibility of using fuzzy TOPSIS method and fuzzy evaluation framework for the quality of student mobilit...
详细信息
Fuzzy TOPSIS is one of the sensitive methods for multi-criteria decision making(MCDM). This paper presents the possibility of using fuzzy TOPSIS method and fuzzy evaluation framework for the quality of student mobility in the Erasmus programme. The framework estimates the mobility quality by analysing the answers from the final report study of the implemented mobility. The quality analysis is carried out at the level of individual responses, the entire report and the faculties participating in the programme. The numerical example demonstrates the use of frameworks and determination of quality.
In this paper,we propose and present a novel unsupervised change detection(CD) algorithm for synthetic aperture radar(SAR) images based on regularized dictionary learning and fuzzy *** regularized sparse reconstructio...
详细信息
In this paper,we propose and present a novel unsupervised change detection(CD) algorithm for synthetic aperture radar(SAR) images based on regularized dictionary learning and fuzzy *** regularized sparse reconstruction technique is introduced to generate a de-noised,low time consuming reconstructed image by using K-SVD dictionary *** order to obtain proper difference image,minus and ratio maps are discussed with the comparison of the other state-of-the-art ***,to transfer the difference map into change map,we employ the optimized FCM called FLICM algorithm to undertake the task which aims to segment the difference map into two classes:changed and *** results clearly show that the proposed approach consistently yields superior performance(accuracy,efficiency and robustness) compared to several well-known change detection techniques on both noise-free and noisy satellite images,further optimization methods are discusses in the end.
PCA is a useful statistical technique that has found application in fields such as face recognition,image compression,dimensionality reduction,computer System performance analysis *** is a common technique for finding...
详细信息
PCA is a useful statistical technique that has found application in fields such as face recognition,image compression,dimensionality reduction,computer System performance analysis *** is a common technique for finding patterns in data of high *** this paper,we present the basic idea of principal component analysis as a general approach that extends to various popular data analysis *** state the mathematical theory behind PCA and focus on monitoring system performance using the PCA ***,an Eigen value-Eigenvector dynamics is elaborated which aims to reduce the computational cost of the *** Mathematical theory is explored and *** the purpose of illustration we present the algorithmic implementation details and numerical examples over real time and synthetic datasets.
This works focuses on the High Efficiency Video Coding (HEVC) standard as a compression method to be potentially adopted by the Digital Imaging and Communications in Medicine (DICOM) standard. We are particularly inte...
详细信息
ISBN:
(纸本)9781479934188
This works focuses on the High Efficiency Video Coding (HEVC) standard as a compression method to be potentially adopted by the Digital Imaging and Communications in Medicine (DICOM) standard. We are particularly interested in improving the lossless compression efficiency of the intra coding process for grayscale anatomical medical images. We focus on intra coding due to its low complexity and outstanding compression results, as well as the fact that it allows coding high-dimensional medical images on a slice-by-slice basis. This is especially advantageous for cases when only a small set of slices needs to be accessed without the need to decode the entire data set.
As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact durati...
详细信息
As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.
The evolution of web has changed the way of interaction with the user. Web 2.0 encouraged more contribution from the user of varying level of mapping experience and is called Crowd Sourcing. Open Street Map is also th...
详细信息
ISBN:
(纸本)9781479931897
The evolution of web has changed the way of interaction with the user. Web 2.0 encouraged more contribution from the user of varying level of mapping experience and is called Crowd Sourcing. Open Street Map is also the outcome of Crowd Sourcing. It is collecting huge data with help of general public, researchers have started analysing the data rather than collecting it. The aim of this study is to review the research work for assessment of Open Street Map Data. It is concluded that the most of research work on assessment of Open Street map data has been done for countries like Germany, UK & USA. But the authenticity and accuracy of reference data still unanswered. Another issue that is concluded by this review, in context to Indian subcontinent, is the requirement of through analysis of Open Street Map data.
The problem of variable selection in system identification of a high dimensional nonlinear non-parametric system is *** inherent difficulty,the curse of dimensionality,is *** connections to various topics and research...
详细信息
The problem of variable selection in system identification of a high dimensional nonlinear non-parametric system is *** inherent difficulty,the curse of dimensionality,is *** connections to various topics and research areas are briefly discussed including order determination,pattern recognition,data mining,machine learning,statistical regression and manifold ***,two methods,top down and bottom up approaches are described in some details.
A geometric technique based on wedge-shaped constraints is described to detect physical inconsistencies of reflection in an ***,we discuss the reflection vanishing point,and propose to employ wedge-shaped constraints ...
详细信息
A geometric technique based on wedge-shaped constraints is described to detect physical inconsistencies of reflection in an ***,we discuss the reflection vanishing point,and propose to employ wedge-shaped constraints to expose image forgery.A set of linear inequalities are proposed to constrain the location of the reflection vanishing point.A feasible solution indicates the truth of the image,while a failure to find a solution provide evidence of photo *** experimental results indicate that the proposed method can detect image forgery with very high success rates and it is extremely robust to compression,filtering,and other image processing operations.
To describe the approach of real-world activities we have proposed an idea of SLNA algorithm and its diagram. In this paper we are using supervised learning to train the network. In supervised learning desire response...
详细信息
To describe the approach of real-world activities we have proposed an idea of SLNA algorithm and its diagram. In this paper we are using supervised learning to train the network. In supervised learning desire response is provided by the teacher in correspondence to the particular input. To explain the concept of SLNNA algorithm we have used a real-world example of travel agency (make my trip agency). To optimize the path in the search space, we have used ATSP algorithm.
暂无评论