Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is...
详细信息
Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is used to detect the EOG pulses generated by blinking, and then transmit them wirelessly via Bluetooth to PC. Three modules are contained in the system, which are the wireless communication module, EOG recognition module and the multimedia control module, respectively. The system can be used as an assistant for the disable persons, also can be used for amusement among normal people. It is feasible to put the system into practical use due to its security and convenience.
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propo...
详细信息
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propose a novel framework to deal with this obstacle. The proposed framework consists of four major components: feature pool construction, pre-filtering, modeling, and classification. First, a large low-level feature pool is constructed, from which a specific set of features are selected for the latter steps automatically or semi-automatically. Then, to deal with the unbalance problem in training set, a pre-filtering classifier is generated, which aim at achieving a high recall rate and a certain precision rate nearly 50% for a certain concept. Thereafter, from the pre-filtered training samples, a SVM classifier is built based on the selected features in the feature pool. After that, the SVM classifier is applied to classification of semantic concept. This framework is flexible and extensible in terms of adding new features into the feature pool, introducing human interactions on selecting features, building models for new concepts and adopting active learning.
Aim to solve the poor dynamic performance and the low disturbance resistance of PI power decoupling controller for DFIG power generator system based on matrix converter, this paper propose a nonlinear control algorith...
详细信息
Aim to solve the poor dynamic performance and the low disturbance resistance of PI power decoupling controller for DFIG power generator system based on matrix converter, this paper propose a nonlinear control algorithm for the AC-excitation DFIG system. First, we establish the mathematical model of the DFIG, based on the model, use the inverse system theory and deduce the inverse model, add the inverse model in series to the front of the original system model, develop the whole system to a pseudo linear system. Consider the system performance influenced by the parameters of the linearized model, we use the predictive control to improve the robustness. The simulation results show that the control strategy has fast response and good dynamic performance. The off-grid and cut-grid experimental data validate that under sub-synchronous or super-synchronous state, the stator voltage and frequency can maintain stability and achieve variable speed constant frequency operation.
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, ...
详细信息
ISBN:
(纸本)9781849195058
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, mm-wave generation is a key technique to realize the convergence network. In this paper, existing optical mm-wave generation technologies are introduced, including direct modulation, optical heterodyning and external modulation. Associated with Shanghai University, a scheme based on Optical Frequency Multiplication employing a dual drive Mach-Zehnder Modulator (DD-MZM) is presented. The novel efficient technique does not require expensive high-frequency electrical equipment. Moreover, no optical filtering is used, which significantly reduces the cost.
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel...
详细信息
Support vector machines (SVMs) and related kernel-based algorithms have become one of the most popular approaches for many machine learning problems. but little is known about the structure of their reproducing kernel Hilbert spaces (RKHS). In this work, based on Mercer's Theorem, the relation among reproducing kernel (RK) and Mercer kernel, and their roles in SVMs are discussed, corresponding to some important theorems and consequences are given. Furthermore, a novel framework of reproducing kernel support vector machines (RKSVM) is proposed. The simulation results are presented to illustrate the feasibility of the proposed method. Choosing a proper Mercer kernel for different tasks is an important factor for studying the result of the SVMs.
暂无评论