In this paper, global synchronization is discussed for chaotic neural networks time-varying *** effective synchronization law in matrix inequality form has been derived for time-varying delayed chaotic neural networks...
详细信息
In this paper, global synchronization is discussed for chaotic neural networks time-varying *** effective synchronization law in matrix inequality form has been derived for time-varying delayed chaotic neural networks based on Lyapunov method and LMI *** advantage of the proposed approach can be performed efficiently via numerical algorithms such as the interior-point algorithms for solving ***, one can get two less conservative controller gain matrixes simultaneous by solving a *** simulations are carried out to demonstrate the effectiveness of the established synchronization laws.
A method based on the fast adaptive chirplet transform is presented for bearing vibration signal analysis. Based on parameters coarse estimation, it converts multi-dimension optimization process to a traditional curve...
详细信息
One of the major problems in continuous wave bistatic radar based on FM radio transmitter is direct path interference(DPI). This is the signal received directly from a transmitter by the receive channel antenna. The D...
详细信息
ISBN:
(纸本)9780863418488
One of the major problems in continuous wave bistatic radar based on FM radio transmitter is direct path interference(DPI). This is the signal received directly from a transmitter by the receive channel antenna. The DPI and the reflected signal are coherent, have similar structure except for the mutual delay and Doppler frequency shift. To detect targets it is necessary to suppress or remove the DPI signal. First of all, the DPI signal based on FM radio transmitter is analyzed. Secondly, the approach based on adaptive nulling array processing is introduced in detail to solve this problem. Finally, associated signalprocessing schemes of the FM-radio-based passive radar is discussed. Simulation results by applying real collected data show the proposed method is effective.
The novel adaptive filtering algorithm based on the analysis of the detail images obtained from the wavelet decomposition of the original noisy image is proposed in the paper. The base idea is to compute the wavelet d...
详细信息
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper pres...
详细信息
ISBN:
(纸本)9780972147903
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper presents a new method of high accuracy retrieval of document,which is based on quotient *** describes the problem space from different granularity:sentence,paragraph and document,and studies the relations among different granularities.
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ...
详细信息
The different approaches used for target decomposition (TD) theory in radar polarimetry are reviewed and three main types of theorems are introduced: those based on Mueller matrix, those using an eigenvector analysis ...
详细信息
The different approaches used for target decomposition (TD) theory in radar polarimetry are reviewed and three main types of theorems are introduced: those based on Mueller matrix, those using an eigenvector analysis of the coherency matrix, and those employing coherent decomposition of the scattering matrix. Support vector machine (SVM), as a novel approach in pattern recognition, has demonstrated success in many fields. A new algorithm of target classification, by combining target decomposition and the support vector machine, is *** conduct the experiment, the polarimetric synthetic aperture radar (SAR) data are used. Experimental results show that it is feasible and efficient to target classification by applying target decomposition to extract scattering mechanisms, and the effects of kernel function and its parameters on the classification efficiency are significant.
This paper presents a novel algorithm for point correspondences using graph spectral analysis. Firstly, the correspondence probabilities are computed by using the eigenvectors and eigenvalues of the proximity matrix a...
详细信息
This paper presents a novel algorithm for point correspondences using graph spectral analysis. Firstly, the correspondence probabilities are computed by using the eigenvectors and eigenvalues of the proximity matrix as well as the method of alternated row and column normalizations. Secondly, local similarity evaluated by shape context is incorporated into our spectral method to refine the results of spectral correspondence via a probabilistic relaxation approach. Experiments on both real-world and synthetic data show that our method possesses comparatively high accuracy.
In this paper, a parallel genetic algorithm for finding all roots of complex functional equation based on Parallel Virtual Machine (PVM) is present, research are made in some technical problems for realizing. We descr...
详细信息
In this paper, a parallel genetic algorithm for finding all roots of complex functional equation based on Parallel Virtual Machine (PVM) is present, research are made in some technical problems for realizing. We describe the design and implement of parallel genetic algorithm for finding roots complex functional equation.
A novel image content authentication algorithm based on Laplace spectra was proposed. Outstanding feature points are extracted from the original image and a cipher point is inserted. A relational graph is then built, ...
详细信息
A novel image content authentication algorithm based on Laplace spectra was proposed. Outstanding feature points are extracted from the original image and a cipher point is inserted. A relational graph is then built, and the Laplace spectra of the graph are calculated to serve as image features. The Laplace spectra are quantized then embedded into the original image as a watermark. In the authentication step, the Laplace spectra of the authenticating image are calculated and compared with that of the watermark embedded in the authenticating image. If both of the spectra are identical, the image passes the authentication test. Otherwise, the tamper is found. The experimental results show that the proposed authentication algorithm can effectively detect the event and the location when the original image content is tampered viciously.
暂无评论