This paper investigates the peak-to-average power ratio (PAPR) theory in all-optical orthogonal frequency division multiplexing (OFDM) optical fibre communication systems. We find out that phase pre-emphasis could eff...
This paper investigates the peak-to-average power ratio (PAPR) theory in all-optical orthogonal frequency division multiplexing (OFDM) optical fibre communication systems. We find out that phase pre-emphasis could effectively reduce PAPR in all-optical OFDM communication systems which employ intensity modulation-direct detection (IM-DD) method. An equation is developed and proposed to calculate suitable phasing values for pre-emphasis. Furthermore, we find out that phase pre-emphasis cannot reduce PAPR effectively in all-optical OFDM systems that employ Phase Shift keying (PSK) or Quadracture Amplitude Modulation (QAM) method.
This paper investigates the security of the projected C* - cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weak...
详细信息
This paper investigates the security of the projected C* - cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakness caused by the structure of the private key to find a number of linear equations. The attack can recover the private keys efficiently when the parameters are q ≤ 2 3 , n≤10 and s=1.
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record database. By this technology the useful knowledge is extracted and the scientific and aux...
详细信息
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record database. By this technology the useful knowledge is extracted and the scientific and auxiliary decision-making is proved for the diagnosis and treatment of disease. In this paper, a rough knowledge mining algorithm (named RKMA) based on extension decision rule lattice is presented. Firstly the electronic patient records are converted into different recordings in order to be further reduced and classified in the medical database. Secondly both variable rough thresholding and concept lattice are related. A novel extension decision rule lattice is constructed. This extension lattice can rough reduce the mutative knowledge attributions and well mine all disease diagnosis rules without more redundancy by avoiding finding frequent item sets. The experimental results show this RKMA algorithm well can mine consistent decision rules, and it is better robustness than other algorithms on the capability of attribution reduction and rule mining for electronic patient records.
According to the static protocols for wireless sensor networks, sensor nodes near the sink node consume more energy for sending more information than the other nodes, so the lifetime of the network is shorten. To solv...
详细信息
According to the static protocols for wireless sensor networks, sensor nodes near the sink node consume more energy for sending more information than the other nodes, so the lifetime of the network is shorten. To solve the above problem, a novel dynamic routing algorithm based on the mobility of sink node was proposed. In this algorithm, the covering area of sensor network is divided into multiple sub-areas, and the sink node collects the information along a determined path periodically. Finally, the extensive simulation results proved that the energy consumption of WSNs is balanced and the lifetime of WSNs is prolonged.
In this paper, we study the low jitter scheduling problem for the Combined-Input-Crosspoint-queued (CICQ) switches. Considering the existing low jitter scheduling schemes for Input-Queued Switches and the features of ...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
In this paper, we study the low jitter scheduling problem for the Combined-Input-Crosspoint-queued (CICQ) switches. Considering the existing low jitter scheduling schemes for Input-Queued Switches and the features of CICQ switch structure, we proposed our low jitter scheduling scheme based on traffic decomposition and low jitter remove and insert operation for CICQ switch architectures. Simulation results show that our scheme can perform better than existing scheduling schemes.
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then...
详细信息
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then a simple comparison was made for the scope and merits of these models, finally this paper points out the Web Services security research.
Camera calibration using patterns is widely used in computer vision and industry. The accuracy of calibration depends on the accuracy of the pattern. A high accuracy pattern is usually difficult to manufacture in labs...
详细信息
Camera calibration using patterns is widely used in computer vision and industry. The accuracy of calibration depends on the accuracy of the pattern. A high accuracy pattern is usually difficult to manufacture in labs. In this paper, we propose to use two images of two identical industrial objects as natural calibration patterns. The corresponding line segments on the objects are used for a nonlinear calibration method, and only five intrinsic parameters of the camera are optimized in the procedure. The experiments show that the proposed method is both effective and practical.
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because...
详细信息
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because there are multi-phased, multi-sized and interrelated complex chemical and physical reactions during cement hydration. In this paper, a feedforward neural network model is built for predicting the evolution of degree of hydration. In order to reduce the computing time, GPUs are used for acceleration in parallel. Studies have shown that according to the established model, simulation curve of hydration is in good accordance with the observed experimental data.
We present a novel method for 3D face recognition, in which the 3D facial surface is first mapped into a 2D domain with specified resolution through a global optimization by constrained conformal geometric maps. The I...
详细信息
ISBN:
(纸本)9781424442959
We present a novel method for 3D face recognition, in which the 3D facial surface is first mapped into a 2D domain with specified resolution through a global optimization by constrained conformal geometric maps. The Intrinsic Shape Description Map (ISDM) is then constructed through a modeling technique capable to express geometric and appearance information of the 3D face. Hence the 3D surface matching problem can be simplified to a 2D image matching problem, which greatly reduces the computational complexity. Finally, the Intrinsic Shape Description Feature (ISDF) of ISDM and the discrimination analysis can be calculated. Experimental results implemented on GavabDB demonstrate that our proposed method significantly outperforms the existing methods with respect to pose variation.
暂无评论