A transactional system often has a steady distribution based on their decisions or responses on various transactions. If the system is changed, the distribution also often changes. It is a valuable work to detect anom...
详细信息
Algebraic Multi-grid (AMG) method is analyzed and is combined with the graph cut method to extract the texture feature of the image. AMG method can extract more information about the singularities in the image. The da...
详细信息
In this paper, we consider remote state estimation. A sensor locally processes its measurement data and sends its local estimate to a remote estimator for further processing. Due to the limited communication resources...
详细信息
ISBN:
(纸本)9781467320658
In this paper, we consider remote state estimation. A sensor locally processes its measurement data and sends its local estimate to a remote estimator for further processing. Due to the limited communication resources, the sensor can only communicate with the estimator for a pre-specified number within a given horizon. We propose a hybrid sensor data schedule which introduces an event-triggering mechanism on top of an optimal offline sensor schedule. This hybrid schedule, having a small implementation cost, leads to a smaller estimation error at the remote estimator when compared with the optimal offline sensor schedule.
An RFID system is data transmission technology to use radio ***,it has many problems like eavesdropping,location tracking,spoofing attack and replay *** research has being progress about cryptography and mutual authen...
详细信息
An RFID system is data transmission technology to use radio ***,it has many problems like eavesdropping,location tracking,spoofing attack and replay *** research has being progress about cryptography and mutual authentication to resolve these *** many studies,previously proposed protocols were vulnerable to *** this paper,we proposed RFID protocol using CRC code and variable certification *** protocol safely encrypts data on wireless and prevents various attacks by mutual authentication using CRC *** addition,our protocol is secure in various attacks than past protocol and is efficient in computation.
Polymer extrusion is one of the final forming stages in the production of many polymeric products in a variety of applications. It is also an intermediate processing step in injection moulded, blown film, thermo-forme...
详细信息
Polymer extrusion is one of the final forming stages in the production of many polymeric products in a variety of applications. It is also an intermediate processing step in injection moulded, blown film, thermo-formed, and blow moulded products. However, polymer extrusion is a complex process which is difficult to set up, monitor, and control. As a consequence, high levels of off- specification products and long down-times are the problems facing the plastics industry. This paper proposes a new method for fault detection of the polymer extrusion processes, where the nonlinear finite impulse response (NFIR) model and principal component analysis (PCA) are integrated to form a nonlinear dynamic model-based PCA monitoring scheme. Here the NFIR model is used to capture the nonlinearity and dynamics of the extrusion process. The residuals resulting from the difference between the model predicted outputs and process outputs are then analyzed by PCA to detect process faults. The experimental results confirm the efficacy of the proposed model-based PCA approach for fault detection of polymer extrusion processes.
This paper proposes static task mapping techniques for embedded many-core SoCs. The proposed techniques take into account both task and data parallelisms of the tasks in order to efficiently utilize the potential para...
详细信息
This paper proposes static task mapping techniques for embedded many-core SoCs. The proposed techniques take into account both task and data parallelisms of the tasks in order to efficiently utilize the potential parallelism of the many-core architecture. Two approaches are proposed for static mapping: one approach is based on integer linear programming and the other is based on a greedy algorithm. In addition, a static mapping technique considering dynamic task switching is proposed. Experimental results show the effectiveness of the proposed techniques.
A concept hierarchy created from a document collection can be used for query recommendation on Intranets by ranking terms according to the strength of their links to the query within the hierarchy. A major limitation ...
详细信息
Mining frequent itemsets from uncertain datasets is an emerging research in the field of data mining;it differs from traditional frequent itemset mining in that each item in an uncertain dataset has a probability valu...
详细信息
Mining frequent itemsets from uncertain datasets is an emerging research in the field of data mining;it differs from traditional frequent itemset mining in that each item in an uncertain dataset has a probability value associated with it. Existing algorithms in this field uses candidate generating and processing approaches to discover the frequent itemsets iteratively, but the number of candidates might be enormously huge and hence it is the bottleneck of the mining process. To reduce the number of candidates, we propose a strategy by adopting a weight value to decrease the estimated expected support of an itemset. We apply our strategy to the state of the art algorithm MBP to get a revised algorithm we call RMBP. The performance of RMBP was evaluated in comparison with MBP on sparse and dense datasets. Experimental results show that the algorithm RMBP outperforms the algorithm MBP in terms of running time and memory.
The advance of the Internet in the past decade has radically changed the way people communicate and collaborate with each other. Physical distance is no more a barrier in online social networks, but cultural differenc...
详细信息
The advance of the Internet in the past decade has radically changed the way people communicate and collaborate with each other. Physical distance is no more a barrier in online social networks, but cultural differences (at the individual, community, as well as societal levels) still govern human-human interactions and must be considered and leveraged in the online world. The rapid deployment of high-speed Internet allows humans to interact using a rich set of multimedia data such as texts, pictures, and videos. This position paper proposes to define a new research area called ‘connected multimedia’, which is the study of a collection of research issues of the super-area social media that receive little attention in the literature. By connected multimedia, we mean the study of the social and technical interactions among users, multimedia data, and devices across cultures and explicitly exploiting the cultural differences. We justify why it is necessary to bring attention to this new research area and what benefits of this new research area may bring to the broader scientific research community and the humanity.
This paper presents a LTE eNodeB signal processing prototype on commodity PC architectures. LTE is one of the major B3G wireless communication systems with large throughput. Meanwhile, general purpose processor (GPP) ...
详细信息
暂无评论