The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Genetic-fuzzy mining (GFM) was proposed to train fuzzy membership functions, thus enhancing the final solution quality. However, it is quite time-consuming because of frequent database scans for fitness evaluation. In this paper, we propose a parallel algorithm with MapReduce architecture to further speed up the genetic-fuzzy mining process. In the proposed approach, the master processor randomly...
Falls have been a major health risk that diminishes the quality of life among the elderly. In this paper, we propose a new method using acceleration data and hidden Markov model (HMM) to detect fall events. A wearable device integrating a tri-axial accelerometer was used to collect acceleration data of human chest. Feature sequences (FSs) were extracted from the acceleration data and used as sequence...
With the advantages of being easy to understand and efficient to compute, the decision tree method has long been one of the most popular classifiers. Decision trees constructed with existing approaches, however, tend to be huge and complex, and consequently are difficult to use in practical applications. In this study, we deal with the problem of tree complexity by allowing users to specify the number...
In this paper, we present a high-capacity watermarking scheme for color images by using the idea of L2-Norm centroid. Based on spatial domain, the proposed scheme can effectively embed a secret watermark in a host image. Simulations demonstrate that the marked images generated by the proposed watermarking scheme are tolerant of versatile attacks such as color reduction, compression, cropping, blurring,...
This paper addresses the problem of lossy compression for hyperspectral images and presents an efficient compression algorithm based on FastICA. Firstly, an efficient algorithm for segmentation of hyperspectral images is proposed. Secondly, based on the targets, a lossy compression based on ROI (Region of Interest) is proposed for hyperspectral compression, which employs KLT(Karhunen-Loève transform)...
In this paper, we propose a lossless data hiding based on smart boundary adjustment approach. More specifically, by preserving either the minimum or the maximum pixel values of the blocks, data bits can be effectively embedded into the blocks without any occurrence of overflow and underflow. Experiments confirm that perceived quality is good and the payload is large while our peak signal-to-noise...
With the advance in the medical image from photographic ï¬lm (analogy) to digital ï¬le, how to avoid medical image modiï¬ed by malice and hide the patient's information into their medical image has become the promising research issue. It is difï¬cult to embed the information of patient to medical images because most pixels of this kind of images are close to black or white. In this paper, an effective...
In this paper, we propose a new loss less data hiding method by the adaptive coefficient-bias (ACB) algorithm. The proposed ACB algorithm involves two main steps: block-mean removal and pixel isolating. The block-mean removal first generates the difference blocks, which are obtained by subtracting each pixel of the host block from the predicted mean. Then, the pixel isolating minimizes distortion...
FP-growth is a classical algorithm in frequent pattern mining, which is often used in static data mining. Some researches have been done on using FP-growth algorithm to analyze streaming data. However, the double-scan-of-database manner in FP-tree creation is a serious bottleneck in streaming data analysis. Sliding window technique could solve this problem in certain degree, but it still can lead...
This work is focused on acoustic emission characteristics measurement based on monitoring systems of PCI-2 on a rotating test-bed. The AE signals parameters such as amplitude, rising time, energy, the average frequency and et al were measured when different AE signals spread in the various paths. The common used AE signals are created by metal impact, the pencil lead breaks and friction. The relationship...
In this paper, we present a graph-based approach to automatically detect defective zebrafish embryos. Here, the zebrafish is segmented from the background using a texture descriptor and morphological operations. In this way, we can represent the embryo shape as a graph, for which we propose a vectorisation method to recover clique histogram vectors for classification. The clique histogram represents...
Recently, interests in the notion of collaborative product innovation (CPI) from academia and industry have been significantly increased. Comprehensive requirements analysis along with a cogent framework, however, do not address the problem that how to support product innovation with the distributed knowledge resources. A knowledge decision support model is proposed including collaborative knowledge...
There is a growing interest in subspace discriminative feature extraction techniques based on tensor (multilinear) representation, which encodes an image object as a general tensor of second or even higher order. However, on one hand the computational convergence of its iterative algorithms is not guaranteed, on the other these methods are impractical for real-time applications for large training...
Test integration for heterogeneous cores under test has been a challenging problem in a system-on-chip (SoC) design. To integrate heterogeneous cores under test, the test wrapper should be capable of dealing with multiple-clock domain problems, at-speed testing problems, test power problems, etc. In this paper, we propose an alternative wrapper architecture that supports multiple clock domains, and...
AdaBoost has been the representation of ensemble learning algorithm because of its excellent performance. However, due to its longtime training, AdaBoost was complained about by people and this defect limits the practical application. Bagging is a rapid method of training and supports for parallel computing. One of important factors that can affect the performance of ensemble learning is the diversity...
A path planning algorithm of robot is proposed based on ensemble algorithm of the learning classifier system, which design fitness function in dynamic environment. The paper derived and proved that ensemble algorithm is convergence and provided a theoretical guarantee for the path planning algorithm. Simulation results also showed that genetic algorithms and learning classifier system combination...
The EMP conductive susceptibility of a measurement and control device used in automatic management system is studied by experimental test. Two EMP waveforms with different rise time are applied to the devices. Responses of the EUT are measured and compared. The sensitivity thresholds of EUT are analyzed by statistical method. Results show the EMP with fast leading edge tends to cause more serious...
A simple and effective lossless data hiding algorithm is presented. Based on integer wavelet transform (IWT), a secret message is embedded in the three high subbands of IWT domain by the proposed coefficient-bias algorithm. More specifically, to provide a higher hidden space without severe distortion, only the coefficients of each block that located in a predetermined interval are utilized to hide...
The 3GPP LTE system has been designed to offer significantly higher data rates, higher system throughput, and lower latency for delay critical services. This improved performance has to be provided and guaranteed under various mobility conditions. Hence, handover (HO) and its performance are of high importance. This paper investigates the performance of the handover procedure within 3GPP LTE in terms...
MIMO is the key technology in LTE system. The performance of MIMO technology is dependent on the antenna configuration and the environment. This paper has given the system level performance evaluation, and the application suggestion of MIMO configuration in outdoor environment is proposed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.