Bio-based human computer interface(HCI) has attracted more and more attention of researches all over the world in recent years. In this paper, an EOG-based HCI system is introduced. It is composed of three parts: EOG ...
详细信息
Bio-based human computer interface(HCI) has attracted more and more attention of researches all over the world in recent years. In this paper, an EOG-based HCI system is introduced. It is composed of three parts: EOG amplifying and acquisition, EOG pattern recognition and control command output. Three plane electrodes are employed to detects the EOG signals, which contains the information related to the eye blinking and vertical( or horizontal ) eye movements referred to pre-designed command table. An online signalprocessing algorithm is designated to get the command information contained in EOG signals, and these commands could be used to control the computer or other instruments. Based on this HCI system, the remote control experiments driven by EOG are realized.
A novel watermarking sharing scheme for gray-level images is proposed, which has the ability of sharing secret (the gray-level image) with multi-users. Multiple-based number system is used to split the secret into n m...
详细信息
A novel watermarking sharing scheme for gray-level images is proposed, which has the ability of sharing secret (the gray-level image) with multi-users. Multiple-based number system is used to split the secret into n meaningless shares, each share is embedded into cover image with controlled distortion and to be assigned to each user afterwards. The main feature of the proposed scheme is sharing a secret of gray-level image among multi-users; another application of such scheme is ownership verification. To reveal the secret, the necessary amount of shares has to be presented. That is, the secret can be recovered even if some shares are lost. Simulation results show that the recovered secret has robustness against a wide range of imaging processing operations.
Granular computing which imitates the manner of human thinking is a mathematical tool to deal with incomplete, uncertain, imprecise and inconsistent knowledge. Just as a great umbrella, it may be regarded as a label o...
详细信息
ISBN:
(纸本)9781615677207
Granular computing which imitates the manner of human thinking is a mathematical tool to deal with incomplete, uncertain, imprecise and inconsistent knowledge. Just as a great umbrella, it may be regarded as a label of theories, methodologies, techniques and tools about granules, mainly including fuzzy set theory, rough set theory and quotient space theory. In this paper we discuss the relationship of three theories. Then we introduce a general model of granular computing and present a macrocosmic (microcosmic) hierarchical representation of granules.
Bio-based human computer interface(HCI) has attracted more and more attention of researches all over the world in recent years. In this paper, an EOG-based HCI system is introduced. It is composed of three parts: EOG ...
详细信息
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, d...
详细信息
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, distributed, lightweight and self-organizing, can also quicken the process of affinity maturation of detector population and improve the efficiency of anomaly detection. The algorithms of adaptive extracting vaccines and vaccine operator are given in detail. And then, on the basis of Kimpsilas conceptual model for network intrusion detection, a novel artificial immune model and relevant algorithm for real-time network intrusion detection is proposed, which integrates vaccine operator with negative selection algorithm and clonal selection algorithm.
Scheduling is one of the most well-known problems in both modern service science and service operational management. On the basis of quantum swarm evolutionary method, a new technique, immune quantum swarm optimizatio...
详细信息
Scheduling is one of the most well-known problems in both modern service science and service operational management. On the basis of quantum swarm evolutionary method, a new technique, immune quantum swarm optimization (IQSO) approach is proposed by redefining the immune operators, vaccinating operator and immune selecting operator, which has a powerful global exploration capability and its applications with permutation flowshop scheduling. The experimental results obtained from the proposed method on some benchmark instances show that it is very promising, compared to genetic algorithms and swarm intelligence methods.
An atom-centered protocol based method for surface sampling in grid space is proposed. Van der Waals, solvent-accessible and solvent-excluded surface can be generated in a unified framework. A spherical hash function ...
详细信息
An atom-centered protocol based method for surface sampling in grid space is proposed. Van der Waals, solvent-accessible and solvent-excluded surface can be generated in a unified framework. A spherical hash function is used to mark whether the points are inside a sphere, and the hash tables are used to record which spheres the surface points locate on. The proposed method can be modified to apply in the parallel computation directly, which is useful for molecular dynamics simulation, docking and surface comparison and so on. Our tests indicate that the proposed method is efficient and the generated surfaces are suitable for quantitative analysis and visualization.
Bracketing Transduction Grammar (BTG) has been well studied and used in statistical machine translation (SMT) with promising results. However, there are two major issues for BTG-based SMT. First, there is no effective...
详细信息
In this paper, we describe a new reranking strategy named word lattice reranking, for the task of joint Chinese word segmentation and part-of-speech (POS) tagging. As a derivation of the forest reranking for parsing (...
详细信息
暂无评论