Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
Abstract-Brain-computer interface (BCI) which transforms signals from the brain into control signals can help people with disabilities communicate with others. In this paper, posteriori probability support vector mach...
详细信息
Abstract-Brain-computer interface (BCI) which transforms signals from the brain into control signals can help people with disabilities communicate with others. In this paper, posteriori probability support vector machine (PPSVM) for patterns recognition was developed. For the classification of the left or right hand motor imagery, this method was used to expend the training set by adding samples with great probability output. For the dataset from 2003 BCI Competition, AR model was adopted to extract feature vectors and SVM with posteriori probabilistic output was used to classify the dataset. The results proved that, by adding samples with big probability, the performance of BCI was improved and higher accuracy was achieved.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations b...
详细信息
In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations between propagation attenuation and roughness and frequency were *** results show that the influence of propagation attenuation in lower frequency is more obvious,and roughness attenuation is increased rapidly as roughness of coal mine tunnels *** tilted attenuation is stronger than roughness attenuation as propagation frequency increasing.
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher p...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher pulse energy and shorter pulse width in 40Gbit/s systems, self-phase modulation(SPM) is significant. The combined effect of GVD and SPM on the propagation pulses are analyzed through Nonlinear Schrödinger Equation(NLSE).
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis...
详细信息
暂无评论