In this paper, An approach for generating multidirectional grid chaotic attractors from a third-order Jerk system is proposed via constructing a series of staircase functions, including two-directional and three-direc...
详细信息
In this paper, An approach for generating multidirectional grid chaotic attractors from a third-order Jerk system is proposed via constructing a series of staircase functions, including two-directional and three-directional multi-scroll chaotic attractors. Its dynamical behaviors are investigated by means of theoretical analysis as well as numerical simulation.
In this paper the response of printed thick-film of WO3 doped by Y2O3 to organic solvent was studied. Different ratio of doping was prepared and changes of film resistance at different temperature in present of vapori...
详细信息
Software technology enables computerized analysis to offer second opinion in various screening and diagnostic tasks to assist the clinicians. Yet, the performance of these computerized methods for medical images is qu...
Software technology enables computerized analysis to offer second opinion in various screening and diagnostic tasks to assist the clinicians. Yet, the performance of these computerized methods for medical images is questioned by experts in CAD research, owing to the use of different databases and criteria for evaluating the computer results for comparison. This paper intends to substantiate this statement by illustrating the effects of such issues with the use of 1D physiologic data and multiple databases. For this purpose, the detection of desaturation events in Sp02 and spike events in EEG are used. This is the first time that comparison between different algorithms on a common basis is carried out on an individual effort. The appraisal for all the algorithms is made on the same databases and criteria. It is surprising to find that issues for 2/3D images concur with those found in 1D data here. In evaluating the accuracy of a new algorithm, a single independent database gives results fast. This paper reveals weaknesses of such an approach. It is hoped that the supportive evidence shown here is enough for researchers to innovate a better platform for credibility in reporting performance comparison of computerized analysis algorithms.
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to crypt...
详细信息
ISBN:
(纸本)9780769533247
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to cryptographically generate the mobile node's home address and the associated private key to sign the mobile node's authentication requests. In addition, the proposed protocol performs reachability tests for both the home address and the care-of address. The proposed protocol offloads all expensive cryptographic operations from a mobile node to its home agent. The security of the protocol is informally analysed and an initially evaluation of its performance given.
In this paper, we propose a novel method for edge detection based on difference images. In order to increase the ability of difference images in direction detection, we propose a maximum modulus technique, whose singu...
详细信息
In this paper, we propose a novel method for edge detection based on difference images. In order to increase the ability of difference images in direction detection, we propose a maximum modulus technique, whose singularities are located both by the gray differences and maximum gradient directions. That is, the singularities are located along the gradient directions with maximum difference modulus. The whole framework both on theory and application is given in this paper. Experiments show that the new technique has very good visual behaves.
In this paper, we propose a novel skeletonize method for multi width ribbon-like shapes. The two difference images with vertical and horizontal directions respectively are computed to locate the singularities of the o...
详细信息
In this paper, we propose a novel skeletonize method for multi width ribbon-like shapes. The two difference images with vertical and horizontal directions respectively are computed to locate the singularities of the original image. Then the gradient directions of these singularity points are computed. The skeletonization can be obtained by finding the centers of via pair wise singularity points using their gradient directions. The most attracting nature of this method is that it can handle multi width shapes, which is very difficult in conventional methods. The experimental results show that our method is a ldquogoodrdquo method closing to human conception.
This article presents a merged three terminals magnetotransistor based on the carrier recombination - deflection effect. This particular magnetotransistor structure relies on the combination of difference of base curr...
详细信息
This article presents a merged three terminals magnetotransistor based on the carrier recombination - deflection effect. This particular magnetotransistor structure relies on the combination of difference of base current and collector current in +x and -x directions. As a result, the output voltage and absolute sensitivity to magnetic field will be double. The structure of magnetotransistor consists of one emitter, two collector and two base contacts. The devices can detect magnetic field in vertical direction (B Z ) by relying on the difference between base current and collector current (DeltaI CB ). From the experiment, with emitter current at 5, 8, and 10 mA, the magnetotransistor had the highest sensitivity of 1.125 mV/mT when emitter current was at 10 mA.
In contrast to conventional methods operating in the wavelet domain, a new robust watermarking algorithm using non-redundant contourlet transform is presented in this paper. We explore the high degree of directionalit...
In contrast to conventional methods operating in the wavelet domain, a new robust watermarking algorithm using non-redundant contourlet transform is presented in this paper. We explore the high degree of directionality and anisotropy of this transform to obtain a sparser image representation. Through experiments, we find that most of the energy relations between parent and children non-redundant contourlet coefficients maintain invariant before and after JPEG compression. Performance improvement is obtained by means of embedding a watermark exploiting the modulation of the energy relations. Test results based on 16 set of attacks using 6 images are obtained. The results show that our non-redundant contourlet method is highly robust to different kinds of attacks including non-geometrical and geometrical attacks. These include JPEG 2000 compression (as low as QF=10), 400 pixels circular shifting, and contrast stretching, (as low as 20%). Comparisons with two other wavelet methods further demonstrate the potential of the non-redundant contourlet in digital watermarking applications.
The short-range and near ground measurements of signal attenuation in the UHF band are performed to study radio wave propagation in a car park for a wireless sensor network application. The measurement setup is based ...
详细信息
The short-range and near ground measurements of signal attenuation in the UHF band are performed to study radio wave propagation in a car park for a wireless sensor network application. The measurement setup is based on the radio wave propagation along the row of a parking lot (full of cars) by varying heights of server antenna. In the application, a small antenna and a compact antenna are employed at the server antenna and the sensor antenna respectively, by radiating horizontal polarization. The test points are located under cars and above ground. The transmitter is radiated at 433 MHz with 120 cm, 180 cm and 240 cm of antenna height. The propagation models, such as the two-ray model and the free-space model, are compared with measurement results. These results can be used to approximate the signal level in practical planning of wireless sensor network systems in car parks.
Nowadays, the demand of using wireless sensor network (WSN) has increased [1]. An interesting application of WSN includes Intelligent Transport System (ITS) [2-3]. Efficient traffic management and control requires tha...
详细信息
ISBN:
(纸本)9781424420414
Nowadays, the demand of using wireless sensor network (WSN) has increased [1]. An interesting application of WSN includes Intelligent Transport System (ITS) [2-3]. Efficient traffic management and control requires that real-time traffic data are collected. Traditionally, traffic data are manually obtained with officials or automatically with bulky wired devices that are difficult to install and maintenance. ITS has changed data collecting process with the use of the computers, communications and sensor technology [1]. Much attempt has focused on replacing conventional devices with WSNs to obtain real-time traffic data is of interest. For example, an unsophisticated practical WSN was proposed to monitor vehicular traffic [4]. This system consists of a number of sensor nodes placed at various locations where traffic data are to be monitored. These sensor nodes communicate to the server node installed nearby via RF frequency. The operating frequency is chosen at 433 MHz (ISM band) in order to avoid much higher demanding traffic in 2.4 GHz and to cover a larger area. As the sensor node can be placed on the road surface to monitor real-time traffic, the sensor node must be small. The operating frequency of 433 MHz is very useful with low data rate applications. Additionally, the available equipments at this frequency are now smaller and cheaper. However, the antenna at this frequency is relatively large (35 cm at half-wavelength in free space) due to low operating frequency. Many research works focus on reducing the antenna size and cost. However, the small antenna [5-11] has low resistance with high reactance, which results in high quality factor (Q). Hence, the total radiated power is lower than the stored power in the near field region. We therefore suffer with low total efficiency, bandwidth and gain. The investigations of small antennas with acceptable performance are necessary. There are several miniaturization techniques are applied to reduce the antenna size and
暂无评论