The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The notion of universally utility-maximizing privacy mechanism was recently introduced by Ghosh, Rough garden, and Sundararajan [STOC 2009]. These are mechanisms that guarantee optimal utility to a large class of information consumers, simultaneously, while preserving Differential Privacy [Dwork, McSherry, Nissim, and Smith, TCC 2006]. Ghosh, Rough garden and Sundararajan have demonstrated, quite...
This paper presents the results from a neural network rule extraction algorithm applied to the LED display recognition problem. We show that pruned neural networks with small number of hidden nodes and connections are able to recognize all the 10 digits from 0 to 9. Earlier work by other researchers demonstrated how symbolic fuzzy rules can be extracted from trained neural networks to solve this problem...
Tracking of a ballistic target in its reentry phase by considering the radar measurements is a highly complex problem in nonlinear filtering. Kalman Filter (KF) is used to estimate the positions of the target when the measurements are corrupted with noise. If the measurements (range and bearing) are nonlinear then Unscented Kalman filter (UKF) can be used. For obtaining reliable estimate of the target...
We present a Fourier-analytic approach to list-decoding Reed-Muller codes over arbitrary finite fields. We use this to show that quadratic forms over any field are locally list-decodeable up to their minimum distance. The analogous statement for linear polynomials was proved in the celebrated works of Goldreich-Levin and Goldreich-Rubinfeld-Sudan. Previously, tight bounds for quadratic polynomials...
Strong cryptographic security, short encryption time, and robustness against noise are three goals of cryptosystem. However, most existing chaotic cryptosystems only focus on the research of enhancing cryptographic security and shortening encryption time. To overcome drawbacks and weaknesses of the existing algorithms, the paper analyzes the pseudo-chaotic characteristics of irrational numbers and...
This research gives a new improvement scheme of Lorenz signal based on chaotic masking secure communication, which improves the notable features of Lorenz signal and the confidentiality of transmission signal in channel. The scheme here mainly changes the properties of chaotic signal in both time and frequency domains, which makes the masking signal in channel more like noise. This paper also does...
Recently, road detection technique is a very important part of vision navigation, which is the key technique of intelligent vehicle guidance. The detection result is seriously affected by the quality of noise and image. Road edge detection is help to analyze the direction of the road extension and the specific location of obstacles, size and speed of obstacles in the road. In this paper, several typical...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
Tow ship noise is a typical multi-path directional interference, and the receiving response of which on towed line array is worthy of in-depth study. Firstly, the sea trial data was analyzed to summarize the tow ship noise characteristics. Then the underwater acoustic field of tow ship noise was modeled to achieve the power distribution of the noise. Finally an important result was obtained, that...
Ultrasound images are very noisy. Along with system noise, a significant noise source is the speckle phenomenon caused by interference in the viewed object. The noise of ultrasound image was always deemed as multiplicative noise, but the present multiplicative noise models are not fitting for it very well, because the noise is more complex than the simple multiplicative one. So we should consider...
Tow ship noise is a typical directional interference for towed line array sonar, nonstationary process with several characteristic properties, such as multi-path and angle dispersion, which greatly add the difficulty to cancel or suppress the noise. Empirical Mode Decomposition (EMD) is a novel method used for processing nonlinear and nonstationary signals. Finite Intrinsic Mode Functions (IMFs) are...
Multiscale Geometry Analysis consistent with the best features of the image representation, is effective for high dimensional function approximation and can use the image of the geometric regularity. In this article, we will mainly discuss the transformation of the Beam let based on Multiscale Geometry Analysis, formulate its theoretical basis, and by Matlab simulation results show the advantages...
In this paper we present a novel method for high quality real-time video enhancement; it improves the sharpness and the contrast of video streams, and simultaneously suppresses noise. The method is comprised of three main modules: (1) noise analysis, (2) spatial processing, based on a new multi-scale pseudo-bilateral filter, and (3) temporal processing that includes robust motion detection and recursive...
Networks are very important in many fields of machine learning research. Within networks research, inferring the structure of unknown networks is often a key problem; e.g. of genetic regulatory networks. However, there are very few well-known biological networks, and good simulation is essential for validating and evaluating novel structural inference techniques. Further, the importance of large,...
We generalize algorithms from computational learning theory that are successful under the uniform distribution on the Boolean hypercube {0,1}n to algorithms successful on permutation invariant distributions. A permutation invariant distribution is a distribution where the probability mass remains constant upon permutations in the instances. While the tools in our generalization mimic those used for...
There will be different stable states or attractors in ecosystem under the same external conditions. In this paper, one stochastic logistic model under external fluctuations was established. The existence of the alternative attractors and regime shift are investigated. Also, the mean first passage time is studied using stochastic dynamics theory. Results showed that there are different stable attractors...
The motion of an over damped Brownian particle in a bistable potential is analyzed from the perspective of stochastic energetics. Without noise and with the increase of the input amplitude, the work done by the periodic force increases first and reach the maximum, then decreases sharply, and finally increases. Only when the work is more than the height of the barrier and equal to the barrier height...
The rapid development of networks such as internet, intranet, wireless communication etc., and multimedia techniques has emphasized on the need for copyright protection, authentication and identification and secret sharing of information. Visual cryptography is a secret sharing scheme where a secret binary image (SI) is encoded into n shares of random binary patterns. If the shares are xeroxed onto...
In this paper we propose a new algorithm for the least square fitting of ellipses from scattered data. Originally based on the one proposed by Fitzgibbon et Al in 1999, our procedure is able to overcome the numerical instability of that algorithm. We test our approach versus the latter and another approach with different ellipses. Then, we present and discuss our results.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.