Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization sp...
详细信息
The spatial and temporal correlation is investigated at both transmitter and receiver. A cluster-based double bounce MIMO channel model is presented. The model can be used for nonselective Rice fading MIMO channels, a...
详细信息
The spatial and temporal correlation is investigated at both transmitter and receiver. A cluster-based double bounce MIMO channel model is presented. The model can be used for nonselective Rice fading MIMO channels, and the expressions for correlation coefficient and channel capacity are derived. The correlation coefficient is the function of antennas spacing, angular spread, power angular spectrum, mean angle-of-arrival, Doppler spread and delay spread. In space domain, the capacity increases with antenna spacing and angular spread. For multiple clusters incidence wave, the correlation coefficient and capacity will oscillate with increasing antenna spacing. The capacity will decrease with increasing Rician factor. In time domain, the capacity gets higher with increasing Doppler and delay spread. When the frame length is larger than coherent time, the capacity will get to the independent capacity asymptotically. Two typical scenarios are simulated for indoor and outdoor environments.
Extracting fuzzy rules automatically from data is a research direction of fuzzy system and data mining. The WM method is the one of the earliest algorithms. However, it only selects the rules which have the maximal de...
详细信息
ISBN:
(纸本)9780784409329
Extracting fuzzy rules automatically from data is a research direction of fuzzy system and data mining. The WM method is the one of the earliest algorithms. However, it only selects the rules which have the maximal degree, so it does not consider other conflicting rules. Two other methods are presented in this paper to select fuzzy rules, and one simulation data and one field traffic flow data are used to compare all three methods. The comparative results show that the weighted mean method has the best robustness and error-tolerance, which is more suitable for extracting rules from the real data with noise. Copyright ASCE 2007.
While null space based linear discriminant analysis (NLDA) obtains a good discriminant performance, the ability easily suffers from an implicit assumption of Gaussian model with same covariance each class. Meanwhile, ...
详细信息
We demonstrate a new algorithm named FlexStem to predict RNA secondary structures with pseudoknots. Our approach is based on the free energy minimization criterion, and utilizes a sophisticated energy model that is mo...
详细信息
Resource Space Model (RSM) is a semantic model to manage resources in the future interconnection environment. The query capability is an important aspect of RSM as a semantic resource management model. This paper repo...
详细信息
Resource Space Model (RSM) is a semantic model to manage resources in the future interconnection environment. The query capability is an important aspect of RSM as a semantic resource management model. This paper reports the research result on the query capability of RSM from two perspectives: resource space algebra and resource space calculus. The equivalence of the resource space algebra and the resource space calculus has been discussed.
Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization sp...
详细信息
Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization space permits both positive and negative authorizations and supports exceptions and strong enforcement as well as the temporal constraints on the authorizations. For the sake of efficiency and convenience we extend the representation of object in GRANT command.
Panchromatic (Pan)-sharpening of multispectral (MS) bands is an important technique in various applications of satellite remote *** this paper, we apply the support value transform (SVT) to Ikonos image *** fused sali...
详细信息
Panchromatic (Pan)-sharpening of multispectral (MS) bands is an important technique in various applications of satellite remote *** this paper, we apply the support value transform (SVT) to Ikonos image *** fused saliency features are represented by support values and extracted by *** low-resolution MS bands are resampled to the fine scale of the Pan image and sharpened by injecting the detailed features extracted from the high-resolution Pan *** fusing results on Ikonos MS + Pan data demonstrate that the proposed image fusion method is effective and efficient.
Omnidirectional mobile manipulator, which is composed by a three DOF omnidirectional mobile platform and a mounted manipulator, can move in any direction at any time. By reason of the redundantly actuated mechanism, t...
详细信息
Omnidirectional mobile manipulator, which is composed by a three DOF omnidirectional mobile platform and a mounted manipulator, can move in any direction at any time. By reason of the redundantly actuated mechanism, the omnidirectional motion property of the mobile platform is similar to the parallel manipulator cooperatively manipulating objects, which admits internal force doing none contribution to the motion of the platform. Thus, the internal force should be controlled to reduce energy waste. Therefore, a stable PD controller is developed first for motion control of the integrated mobile manipulator system. Then, by treating the motion induced force as disturbance, a feed forward plus PI type force controller is addressed to regulate the internal force to zero. Finally, simulation results demonstrate the validity of the proposed approach.
An innovative edge detection algorithm using the support value transform is presented in this *** on the support value transform, the multi scale support value images are extracted from the *** resolution of an image ...
详细信息
An innovative edge detection algorithm using the support value transform is presented in this *** on the support value transform, the multi scale support value images are extracted from the *** resolution of an image is directly related to the proper scale for edge detection, and the second level support value image is used to locate the edge positions by their zero *** experiments are carried out and sharp image edges are obtained from a variety of sample *** with many other existing methods, including LoG and Canny detectors, the proposed algorithm is superior to the LOG and Roberts approach.
暂无评论