Brain CT images are very useful in diagnosis of cerebrovascular accidents (CVA). These images contain too many information. But most of the times, provided information is contaminated by noise and suffer from poor con...
详细信息
Criterion, standard and policy of Korean language have played a very important role as Autonomy regulations in many aspects, especially input standards of computer using Korean language. So it is very necessary to inv...
详细信息
In rough set theory, the uncertainty of granulation and efficient feature selection algorithms have attracted much attention in recent years. We focus on the review of several common uncertainty measures and the relat...
详细信息
Recently, Gutiérrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices - spiking neural P systems (for short, SN P systems). However, the binary...
详细信息
The goal of this paper is to evaluate the wavelet/frequency-based voice activity detection (VAD) algorithms under harsh conditions. A new frequency-based speech classifier has been developed based on a single subband ...
详细信息
In a proxy signature scheme, an original signer delegates his/her signing capability to a proxy signer and then the proxy signer can sign messages on behalf of the original signer. The security of many proxy signature...
详细信息
ISBN:
(纸本)9781467311496
In a proxy signature scheme, an original signer delegates his/her signing capability to a proxy signer and then the proxy signer can sign messages on behalf of the original signer. The security of many proxy signature schemes that have been proposed depends, either directly or indirectly, on either the difficulty of big integers factoring problem or the difficulty of finding discrete logarithm in a finite group. These types of schemes cannot resist quantum attacks. In this paper, we propose a new lattice-based proxy signature scheme which can resist quantum attacks. The proposed scheme is based on the GGH-signature scheme and also satisfies all the security requirements of proxy signature schemes.
In SAR image, the different scattering mechanisms of target, background clutter and target shadow are different, thus resulting in their different statistical characteristics. By analyzing their respective imaging cha...
详细信息
In SAR image, the different scattering mechanisms of target, background clutter and target shadow are different, thus resulting in their different statistical characteristics. By analyzing their respective imaging characteristics, different statistical models are developed to describe the three components. Then a multi-mode distribution SAR image segmentation algorithm based on a combination of the three models is proposed. For the target and shadow segmentation, different pre-processing methods are adopted. A fast one-dimensional Otsu algorithm is proposed to segment target from background clutter;and a SAR image enhancement algorithm based on the background mean-preserving shock filter is proposed to segment shadow from background clutter. Experimental results show that, compared with traditional segmentation algorithms based on the single-mode distributions, this multi-mode distribution segmentation algorithm can make better use of the statistical characteristic differences of the three components, thus obtaining higher segmentation accuracy and better practicability.
Neural networks can easily fall into a local extremum and have slow convergence rate. Quantum Genetic Algorithm (QGA) has features of small population size and fast convergence. Based on the investigation of QGA, we p...
详细信息
There are various methods to measure the value of synchronization of signals. These methods usually do not consider the sources of the signals. Therefore, these methods usually underestimate the coupling phenomena of ...
详细信息
ISBN:
(纸本)9780889868892
There are various methods to measure the value of synchronization of signals. These methods usually do not consider the sources of the signals. Therefore, these methods usually underestimate the coupling phenomena of the sources of the system that generate the signals. The efficiency of these methods depends mainly on the signals, e.g. whether narrow or broad band. But, according to the system equations or at least equations of an appropriate model of the signals, which also consider the sources and the coupling between them, the estimation of the synchronization values would be more accurate. In this paper we represent an approach to obtain the values of synchronization of some synthetic depth-EEG signals according to their relevant state-space equations. The signals under study are produced by a multi-channel model of epileptic EEG signals. The approach is based on identification of the underlying physiological parameters relevant to each channel of EEG signals. Accordingly, the values of coupling of each two signals then are computed through an optimization process and are used as a measure of synchronization. Results show that the proposed algorithm outperforms the nonlinear correlation coefficient (h2), Pearson correlation coefficient (R2) and mean phase coherence methods that up to now are found to be the most efficient algorithms. Since the implied model can be taken as a model of real depth-EEG signals, the proposed algorithm will be useful in obtaining the synchronization of different areas of the hippocampus.
Seizure genesis is usually attributed to imbalance of the excitation and inhibition activities of neurons. It is claimed that slow inhibition mechanism is responsible for controlling the variations of the excitation m...
详细信息
暂无评论