In the wireless sensor network monitoring activities, the sensor node location information is very important. To achieve node location information localization algorithm is adopted to estimate the better method. This ...
详细信息
ISBN:
(纸本)9781467371445
In the wireless sensor network monitoring activities, the sensor node location information is very important. To achieve node location information localization algorithm is adopted to estimate the better method. This article will mainly study the wireless sensor network localization algorithm based on multidimensional scaling, is proposed based on the Hop - Euclidean MDS - MAP (D) localization algorithm. It is not only improve the location accuracy, and it is conducive to the expansion of the network.
A new algorithm is proposed for robust principal component analysis with predefined sparsity patterns. The algorithm is then applied to separate the singing voice from the instrumental accompaniment using vocal activi...
详细信息
A new algorithm is proposed for robust principal component analysis with predefined sparsity patterns. The algorithm is then applied to separate the singing voice from the instrumental accompaniment using vocal activity information. To evaluate its performance, we construct a new publicly available iKala dataset that features longer durations and higher quality than the existing MIR-1K dataset for singing voice separation. Part of it will be used in the MIREX Singing Voice Separation task. Experimental results on both the MIR-1K dataset and the new iKala dataset confirmed that the more informed the algorithm is, the better the separation results are.
In this paper, we present a new data hiding scheme (1,7,4) for grayscale images, where 7 is the number of pixels in each block of the image, 4 is the number of secret bits which can be hidden in each block with restri...
In this paper, we present a new data hiding scheme (1,7,4) for grayscale images, where 7 is the number of pixels in each block of the image, 4 is the number of secret bits which can be hidden in each block with restriction that at most one pixel is changed, and the gray value is changed at most 3 from the original one. As shown in the paper, this reaches the theoretical limit MSDR1 of hidden bits in each 7-block of images. A hiding scheme (2,14,8) is obtained as a direct consequence, and one application of this scheme is given to solve the problem of searching in hidden texts in stego-images. To solve this problem, finite automata technique with fuzzy approach is introduced.
Server-less RFID systems are used more and more widespread recently, which allow RFID readers authenticating a specific tag without the help of on-line backend servers, it brings higher design requirements for RFID se...
详细信息
This paper reports the results of the SHREC'15 track: 3D Object Retrieval with Multimodal Views, which goal is to evaluate the performance of retrieval algorithms when multimodal views are employed for 3D object r...
详细信息
The advancing automation of the industrial production requires faster and more efficient programmable logic controllers. Today's controller architectures based on specialized processors to execute the STL applicat...
详细信息
The advancing automation of the industrial production requires faster and more efficient programmable logic controllers. Today's controller architectures based on specialized processors to execute the STL application are at their limits. For any further improvement the architecture of these processors needs to evolve from single core in order execution to a multicore out of order architecture. This step can not occur without additions to the PLC's instruction set. Therefore a PLC processor instruction set simulation is required that allows a quick evaluation of the effectiveness and efficiency of instruction set changes as well as changes to the processor's architecture. Current architecture description languages (ADL) allow the fast modeling of these changes with enough flexibility for the planned improvements and provide fast simulation speed. This work presents for the first time an instruction set simulation environment for STL compatible PLC processors using the ADL ArchC as a base for further research.
computer-aided pronunciation training(CAPT) technologies enable the use of automatic speech recognition to detect mispronunciations in second language(L2) learners' speech. In order to further facilitate learning...
详细信息
computer-aided pronunciation training(CAPT) technologies enable the use of automatic speech recognition to detect mispronunciations in second language(L2) learners' speech. In order to further facilitate learning, we aim to develop a principle-based method for generating a gradation of the severity of mispronunciations. This paper presents an approach towards gradation that is motivated by auditory perception. We have developed a computational method for generating a perceptual distance(PD) between two spoken phonemes. This is used to compute the auditory confusion of native language(L1). PD is found to correlate well with the mispronunciations detected in CAPT system for Chinese learners of English,i.e., L1 being Chinese(Mandarin and Cantonese) and L2 being US English. The results show that auditory confusion is indicative of pronunciation confusions in L2 learning. PD can also be used to help us grade the severity of errors(i.e.,mispronunciations that confuse more distant phonemes are more severe) and accordingly prioritize the order of corrective feedback generated for the learners.
In an increasingly instrumented and inter-connected digital world, citizens generate vast amounts of data, much of it personal, and nearly all of it valuable. However, controlling who can collect it, limiting what the...
详细信息
In an increasingly instrumented and inter-connected digital world, citizens generate vast amounts of data, much of it personal, and nearly all of it valuable. However, controlling who can collect it, limiting what they can do with it, and determining how best to protect it, remain deeply undecided issues. This position paper proposes a socio-technical solution based on collective awareness and informed consent, whereby data collection and data protection norms are configured by the users themselves, using a collaborative participatory process of argumentation. This refers to the ability of users to understand privacy-related documents and their implications via participatory processes, wisdom-of-the-crowds approaches and visual cues. By strengthening the trust bond between service developers and users, the transformative impact of this solution, called Privacy-by-Norms (Pb Norms), will be to encourage innovation and to ensure that (big) data's (tiny) generators are also its beneficiaries. Pb Norms will aim to complement existing top-down solutions to data protection that rely on technical or legal provisions. The goal is to enable citizens to express their privacy expectations through the use of mature ICT technologies from the fields of Computational Argumentation and the Semantic Web.
Privacy protecting is a direct manifestation of information confidentiality, such as the perception of the terminal location information. Data collection is an important information resource of things, and it is also ...
详细信息
It is difficult for humans to behave randomly. Over the past decades, psychological research shows that we cannot randomize our responses, even if we specially try. Therefore, predicting a player's actions through...
详细信息
It is difficult for humans to behave randomly. Over the past decades, psychological research shows that we cannot randomize our responses, even if we specially try. Therefore, predicting a player's actions through opponent modelling is essential in design of game AI. For Online games, learning to anticipate one player's actions also is a great benefit to play against a completely different player. In this paper, we propose a novel N-Gram based algorithm and use a suffix matching tree to model opponent behaviours. By the model, we can predict the player's next style efficiently using the last few actions seen. Compared with our previous data stream mining approaches, naming MSSBE and MSSMB, an approximate 40% improvement is achieved in accuracy of prediction. The proposed method is simple in its implementation and has the potential for parallel processing in GPU.
暂无评论