Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
Content-aware music adaption, i.e. music resizing, in temporal constraints starts drawing attention from multimedia communities because of the need of real-world scenarios, e.g. animation production and radio advertis...
详细信息
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, ...
详细信息
ISBN:
(纸本)9781849195058
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, mm-wave generation is a key technique to realize the convergence network. In this paper, existing optical mm-wave generation technologies are introduced, including direct modulation, optical heterodyning and external modulation. Associated with Shanghai University, a scheme based on Optical Frequency Multiplication employing a dual drive Mach-Zehnder Modulator (DD-MZM) is presented. The novel efficient technique does not require expensive high-frequency electrical equipment. Moreover, no optical filtering is used, which significantly reduces the cost.
This papa- reports the optical signal transmission characteristic in the G.652 fiber based on the software *** simulation results are in agreement with theoretical analysis. Without taking into account the non-lin...
详细信息
This papa- reports the optical signal transmission characteristic in the G.652 fiber based on the software *** simulation results are in agreement with theoretical analysis. Without taking into account the non-linear effect and in the same condition, the longer the transmission distance, the signal distortion caused by the group velocity dispersion is clearer while the bit rate increasing,. Through reducing the initial chirp of optical signal, the distortion can be reduced at fiber-optic transmission, and the transmission quality is improved.
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel...
详细信息
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel Hilbert spaces (RKHS). In this work, based on Mercer's Theorem, the relation among reproducing kernel (RK) and Mercer kernel, and their roles in SVMs are discussed, corresponding to some important theorems and consequences are given. Furthermore, a novel framework of reproducing kernel support vector machines (RKSVM) is proposed. The simulation results are presented to illustrate the feasibility of the proposed method. Choosing a proper Mercer kernel for different tasks is an important factor for studying the result of the SVMs.
暂无评论