Recently, Gutiérrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices - spiking neural P systems (for short, SN P systems). However, the binary...
详细信息
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applica...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a...
详细信息
In conventional single-antenna systems, differential modulation is useful when the knowledge of channel state information (CSI) is not available. Some time division multiple access (TDMA) wireless cooperative relay pr...
详细信息
Based on the Retinex method and the SIFT feature analysis, this paper presents a novel algorithm for hand vein recognition. First of all, the principle of the near-infrared hand vein image acquisition is introduced. S...
详细信息
Based on the Retinex method and the SIFT feature analysis, this paper presents a novel algorithm for hand vein recognition. First of all, the principle of the near-infrared hand vein image acquisition is introduced. Secondly, the Retinex method is used to normalize hand vein images, and the adaptive smoothing method is selected to estimate the illumination. Then gray cosine transform is used to enhance the discrimination of the skin and the vein in hand vein images. Thirdly, the SIFT feature analysis algorithm is used to extract the feature of hand vein. Finally, the match method of two hand vein images based on SIFT is given. A hand vein recognition system in Microsoft VC6.0 is also developed and the experimental results demonstrate the high efficiency of the proposed algorithm in runtime and correct recognition rate.
Some time division multiple access (TDMA) wireless cooperative relay protocols have recently been developed. The works about their symbol error rate (SER) performance, however, are limited to SER upper bounds or SER f...
详细信息
Some Time Division Multiple Access (TDMA) wireless cooperative relay protocols and their Symbol Error Rate (SER) performance have recently been developed. These works, however, are limited to SER upper bounds or SER f...
详细信息
Abstract-Brain-computer interface (BCI) which transforms signals from the brain into control signals can help people with disabilities communicate with others. In this paper, posteriori probability support vector mach...
详细信息
Abstract-Brain-computer interface (BCI) which transforms signals from the brain into control signals can help people with disabilities communicate with others. In this paper, posteriori probability support vector machine (PPSVM) for patterns recognition was developed. For the classification of the left or right hand motor imagery, this method was used to expend the training set by adding samples with great probability output. For the dataset from 2003 BCI Competition, AR model was adopted to extract feature vectors and SVM with posteriori probabilistic output was used to classify the dataset. The results proved that, by adding samples with big probability, the performance of BCI was improved and higher accuracy was achieved.
A hybrid strategy has been proposed to reduce the wrong clustering on Ambulatory ECG (electrocardiogram). Since Ambulatory ECG is usually composed by 24 hours data, the number of individual ECG waveform can reach to 1...
详细信息
暂无评论