In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe...
详细信息
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD...
详细信息
Recently, double-negative meta-materials are widely studied in scientific research. The double-negative (DNG) mediums are characterized by simultaneous negative permittivity and permeability. In order to make the FDTD method analyze the electromagnetic scattering and propagation for double-negative (DNG) medium, z-transform is applied to the FDTD method in the double-negative (DNG) medium. For the simulations, extremely large computer memory space and a long computational time b required. A parallel algorithm for the FDTD method on the state of the art graphics hardware is presented. The parallel computing techniques can be used to reduce the computation time significantly and have been widely applied in various complex FDTD applications. In this paper, we simulate the interaction between electromagnetic wave and DNG medium, and describe an impact of new GPU features on development process of an efficient Finite Difference Time Domain (FDTD) implementation.
A variety of wavelet transform methods have been introduced to remove noise from images. However, many of these algorithms remove the fine details and smooth the structures of the image when removing noise. The wavele...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo...
详细信息
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of moments (MOM). The asymptotic waveform evaluation (AWE) technique for dispersive dielectric medium is deduced and apllied to electromagnetic scattering analysis of double-negative medium within a given frequency band.
This study presents an efficient multi-resolution method to detect binary object directly. Both intensity and geometry differences are used to measure the similarity between the source object template and target objec...
详细信息
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiv...
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equivalent relationship between induced current and the measured CS-current was build, while the CS-current can be computed directly under the new incident source. Finally, we can reconstruct the induce current by utilizing the theory of compressive sensing (CS). Compared with traditional MOM, the computational complexity can be greatly reduced.
Although many methods of refining initialization have appeared, the sensitivity of K-Means to initial centers is still an obstacle in applications. In this paper, we investigate a new class of clustering algorithm, K-...
详细信息
The PMCHWT equation of the double negative media (DNG) is obtained based on its constitutive relationship. And the surface currents and radar cross section (RCS) at a single frequency point is computed by Method of mo...
详细信息
Recently the mu rhythm by motor imagination has been used as a reliable EEG pattern for brain-computer interface (BCI) system. To motor-imagery-based BCI, feature extraction and classification are two critical stages....
详细信息
Recently the mu rhythm by motor imagination has been used as a reliable EEG pattern for brain-computer interface (BCI) system. To motor-imagery-based BCI, feature extraction and classification are two critical stages. This paper explores a dynamic ICA base on sliding window Infomax algorithm to analyze motor imagery EEG. The method can get a dynamic mixing matrix with the new data inputting, which is unlike the static mixing matrix in traditional ICA algorithm. And by using the feature patterns based on total energy of dynamic mixing matrix coefficients in a certain time window, the classification accuracy without training can be achieved beyond 85% for BCI competition 2003 data set Ⅲ. The results demonstrate that the method can be used for the extraction and classification of motor imagery EEG. In the present study, it suggests that the proposed algorithm may provide a valuable alternative to study motor imagery EEG for BCI applications.
暂无评论