Herein, a new identity recognition method of plantar pressure image (PPI) was investigated based on compressed sensing. During the process of identity recognition, the PPIs were collected with platform system in norma...
详细信息
ISBN:
(纸本)9781479925667
Herein, a new identity recognition method of plantar pressure image (PPI) was investigated based on compressed sensing. During the process of identity recognition, the PPIs were collected with platform system in normal walking speed. The sparse representation of PPI was then obtained according to the sparse basis (i.e., wavelet basis). Finally, measurement vectors were calculated by the Topelitz measurement matrix and the PPI was recognized by compressed sensing classifier. The results showed that the accuracy of identity recognition of PPI based on compressed sensing exceeded 97.76%, demonstrating the effectiveness and stability of the Topelitz-compressed sensing algorithm. Meanwhile, the method used in this study reduced the data storage amount and increased the real-time recognition during the PPI process.
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication ...
详细信息
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication (RSSI). The packet reception performance of a set of nodes transmitting simultaneously might be no better than that of any single node transmitting individually. In this paper, we redefine CI and propose TriggerCast, a practical wireless architecture which ensures concurrent transmissions of an identical packet to interfere constructively rather than to interfere non-destructively. CI potentially allows orders of magnitude reductions in energy consumption and improvements in link quality. Moreover, we for the first time present a theoretical sufficient condition for generating CI with IEEE 802.15.4 radio: concurrent transmissions with an identical packet should be synchronized at chip level. Meanwhile, co-senders participating in concurrent transmissions should be carefully selected, and the starting instants for the concurrent transmissions should be aligned. Based on the sufficient condition, we propose practical techniques to effectively compensate propagation and radio processing delays. TriggerCast has 95 th percentile synchronization errors of at most 250ns. Extensive experiments in practical testbeds reveal that TriggerCast significantly improves PRR (from 5% to 70% with 7 concurrent senders, from 50% to 98.3% with 6 senders) and RSSI (about 6dB with 5 senders).
Traditional classification algorithms often fail when the independent and identical distributed (i.i.d.) assumption does not hold, and the cross-domain learning emerges recently is to deal with this problem. Actually,...
详细信息
This paper presents a method for named entity recognition and disambiguation based on Wikipedia. First, we establish Wikipedia database using open source tools named JWPL. Second, we extract the definition term from t...
详细信息
A propositional family deontic logic is introduced, which is a combination of the propositional deontic logic, dynamic logic and ambient logic. A three-layered possible world semantics is given, where a possible world...
详细信息
ISBN:
(纸本)1601322178
A propositional family deontic logic is introduced, which is a combination of the propositional deontic logic, dynamic logic and ambient logic. A three-layered possible world semantics is given, where a possible world is a set of families which is used to define the semantics for action modality [a];a subpossible world is a family used to define the semantics for family modality [m], and a subsubpossible world is used to define the semantics for the deontic modality OB. An axiomatic system of the logic will be given, and the normal form theorem, the soundness theorem and completeness theorem of the axiomatic system will be proved.
With the powerful development of pedestrian detection technique based on sliding-window and machine-learning, detection-based tracking systems have become increasingly popular. Most of these systems rely on existing s...
详细信息
IBM Research and five leading universities are partnering to create computing systems that are expected to simulate and emulate the brain's abilities. Although this project has achieved some successes, it meets gr...
详细信息
The semantic mapping in Distributed Dynamic Description Logics (D3L) allows knowledge to propagate from one ontology to another. The current research for knowledge propagation in D3L is only for a simplified case when...
详细信息
Complex networks are extensively studied in various areas such as social networks, biological networks, Internet and WWW. Those networks have many characters such as small-diameter, higher cluster and power-law degree...
详细信息
Decision tree is a popular classification technique in many applications, such as retail target marketing, fraud detection and design of telecommunication service plans. With the information exploration, the existing ...
详细信息
暂无评论