In order to reduce the complexity of hologram generation and holographic display, for the first time the paper combines Gerchberg-Saxton iterative algorithm with Lohmann coding to make phase-only hologram and designs ...
详细信息
In order to reduce the complexity of hologram generation and holographic display, for the first time the paper combines Gerchberg-Saxton iterative algorithm with Lohmann coding to make phase-only hologram and designs a digital micromirror device (DMD) display system. Thus we not only solve the problem that the amplitude of the frequency spectrum of object function fluctuates very greatly but also avoid the complicated process for producing hologram produced by the plotter, which is controlled by computer. And by this method we can further avoid the complicated technology by etching silicon crystal and improve the quality of imaging.
An efficient discrimination method of different brain states is important in order to implement a suitable system. This paper applies the One Versus the Rest CSP to the EEG data recorded during motor imagery tasks con...
详细信息
An efficient discrimination method of different brain states is important in order to implement a suitable system. This paper applies the One Versus the Rest CSP to the EEG data recorded during motor imagery tasks consisting of four different classes, namely the imagination of right hand, left hand, foot and tongue movements. The best correct classification results for the three subjects are73.3%, 81.7%, and 76.7%.
A novel watermarking sharing scheme for gray-level images is proposed, which has the ability of sharing secret (the gray-level image) with multi-users. Multiple-based number system is used to split the secret into n m...
详细信息
A novel watermarking sharing scheme for gray-level images is proposed, which has the ability of sharing secret (the gray-level image) with multi-users. Multiple-based number system is used to split the secret into n meaningless shares, each share is embedded into cover image with controlled distortion and to be assigned to each user afterwards. The main feature of the proposed scheme is sharing a secret of gray-level image among multi-users; another application of such scheme is ownership verification. To reveal the secret, the necessary amount of shares has to be presented. That is, the secret can be recovered even if some shares are lost. Simulation results show that the recovered secret has robustness against a wide range of imaging processing operations.
Granular computing which imitates the manner of human thinking is a mathematical tool to deal with incomplete, uncertain, imprecise and inconsistent knowledge. Just as a great umbrella, it may be regarded as a lab.l o...
详细信息
ISBN:
(纸本)9781615677207
Granular computing which imitates the manner of human thinking is a mathematical tool to deal with incomplete, uncertain, imprecise and inconsistent knowledge. Just as a great umbrella, it may be regarded as a lab.l of theories, methodologies, techniques and tools about granules, mainly including fuzzy set theory, rough set theory and quotient space theory. In this paper we discuss the relationship of three theories. Then we introduce a general model of granular computing and present a macrocosmic (microcosmic) hierarchical representation of granules.
An atom-centered protocol based method for surface sampling in grid space is proposed. Van der Waals, solvent-accessible and solvent-excluded surface can be generated in a unified framework. A spherical hash function ...
详细信息
An atom-centered protocol based method for surface sampling in grid space is proposed. Van der Waals, solvent-accessible and solvent-excluded surface can be generated in a unified framework. A spherical hash function is used to mark whether the points are inside a sphere, and the hash tables are used to record which spheres the surface points locate on. The proposed method can be modified to apply in the parallel computation directly, which is useful for molecular dynamics simulation, docking and surface comparison and so on. Our tests indicate that the proposed method is efficient and the generated surfaces are suitable for quantitative analysis and visualization.
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, d...
详细信息
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, distributed, lightweight and self-organizing, can also quicken the process of affinity maturation of detector population and improve the efficiency of anomaly detection. The algorithms of adaptive extracting vaccines and vaccine operator are given in detail. And then, on the basis of Kimpsilas conceptual model for network intrusion detection, a novel artificial immune model and relevant algorithm for real-time network intrusion detection is proposed, which integrates vaccine operator with negative selection algorithm and clonal selection algorithm.
We try to evaluate the sequential and non-sequential and flexible structural alignment methods on SCOP 1.71. Firstly, we compare the flexible method with rigid methods and compare the sequence order dependent methods ...
详细信息
We try to evaluate the sequential and non-sequential and flexible structural alignment methods on SCOP 1.71. Firstly, we compare the flexible method with rigid methods and compare the sequence order dependent methods with sequence order independent methods by two typical cases. Secondly, the performances of the above methods are evaluated using ten protein pairs which are considered as "hard to detect" similarities. Thirdly, we evaluate the methods by comparing the ROC curves based on their native score and geometric measure Qscore. Then we compare the methods directly using geometric match measure Qscore, which also allows the creation of a 'Best- of-All' method. The main conclusions are: (1) we find that the best alignments found by sequential methods are more consistent with the SCOP classification; (2) we show that ROC curves are of limited value and that their ranking of the methods is not consistent with the ranking implied by the quality of the alignments the methods find; (3) we also find that the alignments of flexible method and non-sequential methods are better than the corresponding alignments of rigid sequential method from the viewpoint of geometric superposition, and flexible method and non-sequential methods can find more cross-fold similarities.
Controller synthesis uses hardware description language and synthesis optimization tools from a higher abstract level. State transition graph of completely specified finite state machine is adopted to describe the beh...
详细信息
Controller synthesis uses hardware description language and synthesis optimization tools from a higher abstract level. State transition graph of completely specified finite state machine is adopted to describe the behavior of controller. State transition graph STG_org was generated before synthesized and state transition graph STG_ext was reversely extracted from structure realization of controller synthesis. If STG_org and STG_ext were equivalent then corresponding process of controller synthesis was correct. The paper gives a formal verification algorithm of controller synthesis with time complexity O(B 2 /Aldrt 1 (n)+A ldr t 2 (m,n)) .In order to further improve time complexity of algorithm, a verifying algorithm with synthetic information guidance was proposed. The algorithm is proved efficient in theory for its time complexity is decreased to O(Bldrt 1 (n) + Aldrt 2 (m,n)).
Liquid State Machine (LSM) is a newly developed computational model with many interesting properties. It has great advantages of dealing with biologic computing when compared to the traditional computational model. In...
Liquid State Machine (LSM) is a newly developed computational model with many interesting properties. It has great advantages of dealing with biologic computing when compared to the traditional computational model. In this paper, the LSM was used to deal with the direction classification problem of the spike series which were distilled from the neurons in motor cortex of a monkey. In the output layer, a linear regression and back-propagation are employed as the training algorithms. Compare to outcomes of the two algorithms, it is showed that ideal classification results were derived when using BP as the training algorithm.
暂无评论