A novel approach combining a time-frequency representation of brain activity in the form of recorded EEG signals together with nonnegative matrix factorization (NMF) post-processing section in brain computer interface...
详细信息
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ...
详细信息
A method based on the fast adaptive chirplet transform is presented for bearing vibration signal analysis. Based on parameters coarse estimation, it converts multi-dimension optimization process to a traditional curve...
详细信息
The paper presents an effective algorithm to analyze MR-images in order to recognize Alzheimer's disease (AD) which appeared in patient's brain. The features of interest are categorized in features of the spat...
详细信息
The paper presents an effective algorithm to analyze MR-images in order to recognize Alzheimer's disease (AD) which appeared in patient's brain. The features of interest are categorized in features of the spatial domain (FSD's) and Features of the frequency domain (FFD's) which are based on the first four statistic moments of the wavelet transform. Extracted features have been classified by a multi-layer perceptron artificial neural network (ANN). Before ANN, the number of features is reduced from 44 to 12 to optimize and eliminate any correlation between them. The contribution of this paper is to demonstrate that by using the wavelet transform number of features needed for AD diagnosis has been reduced in comparison with the previous work. We achieved 79% and 100% accuracy among test set and training set respectively, including 93 MR-images.
In this paper, a wavelet-based speckle-removing algorithm is represented and tested on synthetic aperture radar (SAR) images. The SAR image is first transformed using a dyadic wavelet transform. The noise in the wavel...
详细信息
The DS-CDMA signal model and the noisy linear independent component analysis (ICA) model are analyzed in this paper. Comparing these models shows that they have the same form. The adaptive minimum mean-square error (M...
The DS-CDMA signal model and the noisy linear independent component analysis (ICA) model are analyzed in this paper. Comparing these models shows that they have the same form. The adaptive minimum mean-square error (MMSE) multiuse detection based on ICA is proposed. It uses the output of adaptive MMSE multi-user detection to initialize the ICA iterations, not only the known spread information of interesting user is used to overcome the uncertainness of ICA, but also the character of statistical independence is used. The simulation results show that the performance is improved obviously.
Concept hierarchies are important in many generalized data mining applications, such as multiple-level fuzzy association rule mining. Usually concept hierarchies are given by domain experts. However, it is extremely d...
详细信息
Concept hierarchies are important in many generalized data mining applications, such as multiple-level fuzzy association rule mining. Usually concept hierarchies are given by domain experts. However, it is extremely difficult and time-consuming for human experts to discover concepts and construct concept hierarchies from the domain. In literature, several representations of concept hierarchy are possible, for example tree, lattice, table, linked list, arbitrary graph etc. In this paper, we apply quotient space model to representing concept hierarchies. In contrast to others, the representation model is much more extensible and compatible. The results indicate that this technique can improve the efficiency of performing the generalization and specialization operation in concept hierarchies.
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ...
详细信息
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as Yang's scheme [8] in the secret reconstruction and requires less public values than Chien's [7] and Yang's schemes. Furthermore, the shares in our scheme can be verified their validity with t public values based on ECDLP, and there are two verified forms: one is computationally secure as Feldman 's scheme [12] and other is unconditionally secure as Pedersen's scheme [13]. In addition, for the main computation: a i,1 P 1 + a i,2 P 2 + hellip + a i,t P t in our scheme, we present a new method based on the signed factorial expansion and implement it, the results show that it is more efficient than the current public methods. Thus our scheme is a secure and efficient (t,n) threshold verified multi-secret sharing scheme.
It is widely recognized that clustering ensemble is fit for any shape and any distribution dataset and that the boosting method provides superior results for classification problems. In the paper, a dual boosting is p...
详细信息
It is widely recognized that clustering ensemble is fit for any shape and any distribution dataset and that the boosting method provides superior results for classification problems. In the paper, a dual boosting is proposed for fuzzy clustering ensemble . At each boosting iteration, a new training set is created based on the original datasets' probability which is associated with the previous clustering. According to the dual boosting method, the new training subset contains not only the instances which is hard to cluster in previous stages , but also the instances which is easy to cluster. The final clustering solution is produced by using the clustering based on the co-association matrix. Experiments on both artificial and realworld datasets demonstrate the efficiency of the fuzzy clustering ensemble based on dual boosting in stability and accuracy.
暂无评论