A new spike detection method is proposed in order to detect the overlapped spikesIn order to avoid missing overlapped spikes, the method adds threshold detection based on window detection methodMoreover, nonlinear ene...
详细信息
A new spike detection method is proposed in order to detect the overlapped spikesIn order to avoid missing overlapped spikes, the method adds threshold detection based on window detection methodMoreover, nonlinear energy operator is introduced to make the method strong even under low signal-to-noise ratio situationIn addition, the method solves the repeated detection problem by estimating slopesExperiments show that the method is good for any occasion whatever the low signal-to-noise ratio or baseline wanderEspecially for the overlapped spikes detection, it has much lower false-negative-rate than other traditional detection methods.
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i...
详细信息
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-52 and spin-32 systems. It is, of course, desirable to have a natural resource state in a spin-12, that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-12 frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.
A kind of SND-based algorithm for self-adapting network congestion control has been presented in this paper, which is for the complicated and integrated network environment that the Internet of Things (IOT) to face in...
详细信息
It's well known machine learning from examples is an effective method to solve non-linear classification problem. A new dynamic method of machine learning from transition example is given in this paper. This metho...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping strategy in real time, so as to reduce the probability of the system stepping into the attackers' target area. With the experiments proving the anti-attack ability of the prototype system, the feasibility and effectiveness of adaptive strategy were demonstrated for EH system.
Multi-source heterogeneous information fusion is an extremely challenging problem because of the complex and highly irregular nature of environment. We consider decision fusion problem in the presence of m-dependent e...
详细信息
Association rules mining is a popular and well researched method in data mining research field , its purpose is to mine interesting relations between attributes in transaction database. Classic Apriori algorithm is on...
详细信息
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. ...
详细信息
Face detection and recognition is a hot research subject in the fields of image processing, pattern recognition and computer vision, which emphasize on the enhancement of the precision of detection in as short a time ...
详细信息
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in...
详细信息
暂无评论