期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Construction of protograph LDPC codes with circular generator matrices 被引量:5
1
作者 Kaiyao Wang Yang Xiao Kiseon Kim 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第5期840-847,共8页
The application of protograph low density parity check (LDPC) codes involves the encoding complexity problem. Since the generator matrices are dense, and if the positions of "1" s are irregularity, the encoder nee... The application of protograph low density parity check (LDPC) codes involves the encoding complexity problem. Since the generator matrices are dense, and if the positions of "1" s are irregularity, the encoder needs to store every "1" of the generator matrices by using huge chip area. In order to solve this problem, we need to design the protograph LDPC codes with circular generator matrices. A theorem concerning the circulating property of generator matrices of nonsingular protograph LDPC codes is proposed. The circulating property of generator matrix of nonsingular protograph LDPC codes can be obtained from the corresponding quasi-cyclic parity check matrix. This paper gives a scheme of constructing protograph LDPC codes with circulating generator matrices, and it reveals that the fast encoding algorithm of protograph LDPC codes has lower encoding complexity under the condition of the proposed theorem. Simulation results in ad- ditive white Gaussian noise (AWGN) channels show that the bit error rate (BER) performance of the designed codes based on the proposed theorem is much better than that of GB20600 LDPC codes and Tanner LDPC codes. 展开更多
关键词 protograph low density parity check (LDPC) codes cyclic matrices fast encoding algorithm bit error rate (BER) performance.
在线阅读 下载PDF
Analysis and verification of network profile 被引量:3
2
作者 Weiwei Chen Ning Huang +2 位作者 Yuqing Liu Ye Wang Rui Kang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期784-790,共7页
The elements of network profile are proposed.Based on the network traffic distribution model,the network profile includes the application request rate,the branch transfer probability,the ratio of application requests,... The elements of network profile are proposed.Based on the network traffic distribution model,the network profile includes the application request rate,the branch transfer probability,the ratio of application requests,and the probability distribution of the requested objects.Based on the evaluation method of network performance reliability,four simulation cases are constructed in OPNET software,and the results show the four elements of profile have impacts on the network reliability. 展开更多
关键词 system engineering network profile performance reliability network simulation.
在线阅读 下载PDF
Performance analysis of QoS routing protocol for WiMedia networks
3
作者 JUNG Jin-uk JIN Kyo-hong +1 位作者 HWANG Min-tae JEON Young-ae 《Journal of Central South University》 SCIE EI CAS 2012年第12期3468-3474,共7页
Though the WiMedia supports higher data rates than other WPAN technologies,a WiMedia device cannot reach other devices that are separated from it by more than 10 m,which is the typical limited transmission range of th... Though the WiMedia supports higher data rates than other WPAN technologies,a WiMedia device cannot reach other devices that are separated from it by more than 10 m,which is the typical limited transmission range of the WiMedia protocol.In this work,we propose a multi-hop QoS routing protocol to enable WiMedia devices to transmit real-time data to devices that are located out of the transmission range.The proposed routing protocol is a hybrid algorithm,which mixes the table-driven and on-demand routing algorithms,searching one or more routes according to the number of hops to a destination device.WiMedia MAC is potentially capable of learning the existence of neighbor devices by using a beacon frame.By utilizing the neighbors' information,all devices can create routing entries for devices within 2-hops periodically.For devices beyond the 2-hop range,the newly designed on-demand routing algorithm is applied to multi-hop routing.If a routing entry for a destination device is not listed in the routing table,the source device sends a request packet to 2-hop range devices which could be found in the routing table.Since every device maintains routing entries for 2-hop range devices in the routing table,the request packet is replied in advance before its arrival at the destination device.Also,to decide the optimal route for a destination device,the number of medium access slots(MASs),received signal strength indicator(RSSI)and hop count are utilized to establish a QoS-enabled routing table.We perform ns-2 simulation to investigate the performance of the proposed routing protocol with AODV and DSDV.The simulation results show that the proposed protocol has better throughput and lower overhead than other protocols. 展开更多
关键词 WIMEDIA WPAN multi-hop routing protocol QOS hybrid routing protocol
在线阅读 下载PDF
Smart phone-based context-aware augmentative and alternative communications system
4
作者 PARK DongGyu SONG Sejun LEE DoHoon 《Journal of Central South University》 SCIE EI CAS 2014年第9期3551-3558,共8页
A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential... A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential context-aware technologies and AAC usage scenarios were studied, and an efficient communication system was developed by combining smartphone's multimedia functions and its optimized sensor technologies. The experimental results show that context-awareness accuracy is achieved up to 97%. 展开更多
关键词 augmentative alternative communication system context awareness mobile system location based services
在线阅读 下载PDF
An advanced segmentation using area and boundary tracing technique in extraction of lungs region
5
作者 Kiran THAPALIYA Sang-Woong LEE +2 位作者 Jae-Young PYU Heon JEONG Goo-Rak KWON 《Journal of Central South University》 SCIE EI CAS 2014年第10期3811-3820,共10页
A new method is presented for the segmentation of pulmonary parenchyma. The proposed method is based on the area calculation of different objects in the image. The main purpose of the proposed algorithm is the segment... A new method is presented for the segmentation of pulmonary parenchyma. The proposed method is based on the area calculation of different objects in the image. The main purpose of the proposed algorithm is the segment of the lungs images from the computer tomography(CT) images. The original image is binarized using the bit-plane slicing technique and among the different images the best binarized image is chosen. After binarization, the labeling is done and the area of each label is calculated from which the next level of binarized image is obtained. Then, the boundary tracing algorithm is applied to get another level of binarized image. The proposed method is able to extract lung region from the original images. The experimental results show the significance of the proposed method. 展开更多
关键词 bit-plane slicing technique connected component labeling area tracing boundary tracing
在线阅读 下载PDF
Performance of M-QAM, M-DPSK and M-PSK with MRC diversity in a Nakagami-m fading channel
6
作者 Alam S.M.Shamsul Alam Choi GoangSeog 《Journal of Central South University》 SCIE EI CAS 2014年第4期1347-1352,共6页
The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(A... The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(ASER) was analyzed for different modulation schemes. A unified analytical framework was presented to obtain closed-form solutions for calculating the ASER of M-ary differential phase-shift keying(M-DPSK), coherent M-ary phase-shift keying(M-PSK), and quadrature amplitude modulation(QAM) over single or multiple Nakagami-m fading channels. Moreover, the ASER was estimated and evaluated by using the maximal ratio-combining(MRC) diversity technique. Simulation results show that an error rate of the fading channel typically depends on Nakagami parameters(m), space diversity(N), and symbol rate(M). A comparison between M-PSK, M-DPSK, and M-QAM modulation schemes was shown, and the results prove that M-ary QAM(M-QAM) demonstrates better performance compared to M-DPSK and M-PSK under all fading and non-fading conditions. 展开更多
关键词 M-ary differential phase-shift keying(M-DPSK) M-ary phase shift keying(M-PSK) Nakagami-m fading channel probability density function(PDF) symbol error rate(SER) M-ary quadrature amplitude modulation(M-QAM)
在线阅读 下载PDF
Erratum to: An advanced segmentation using area and boundary tracing technique in extraction of lungs region
7
作者 Kiran THAPALIYA Sang-Woong LEE +2 位作者 Jae-Young PYU Heon JEONG Goo-Rak KWON 《Journal of Central South University》 SCIE EI CAS 2014年第12期4762-4762,共1页
Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of th... Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of third author is incorrect.The correct name is Jae-Young PYUN.2)The information of corresponding author is incorrect.The correct information should be Goo-Rak KWON,Professor,PhD;Tel/Fax:+98-711-7264102;E-mail:grkwon@chosun.ac.kr 展开更多
关键词 segmentation corrected tracing contained lungs Heidelberg supervised Berlin updated incomplete
在线阅读 下载PDF
基于特征点矢量与纹理形变能量参数融合的人脸表情识别 被引量:23
8
作者 易积政 毛峡 +1 位作者 Ishizuka Mitsuru 薛雨丽 《电子与信息学报》 EI CSCD 北大核心 2013年第10期2403-2410,共8页
人脸表情识别是人机交互领域的研究热点和难点之一。为了有效去除由于个体差异而造成的表情特征的差异,该文首先基于特征点矢量提出特征点距离比例系数;其后,又给出纹理形变能量参数的概念;最后,将二者融合用于人脸表情识别。所提方法在... 人脸表情识别是人机交互领域的研究热点和难点之一。为了有效去除由于个体差异而造成的表情特征的差异,该文首先基于特征点矢量提出特征点距离比例系数;其后,又给出纹理形变能量参数的概念;最后,将二者融合用于人脸表情识别。所提方法在Cohn-Kanade数据库及BHU人脸表情数据库进行了测试,实验结果表明该方法较传统的方法在识别率上分别提高了4.5%与3.9%。 展开更多
关键词 人脸表情识别 特征点矢量 纹理形变能量参数 径向基神经网络
在线阅读 下载PDF
基于非线性流形学习的人脸面部运动估计 被引量:5
9
作者 王晓侃 毛峡 Ishizuka Mitsuru 《电子与信息学报》 EI CSCD 北大核心 2011年第10期2531-2535,共5页
由于人脸面部运动变化分布在一个低维非线性流形中,基于线性假设的主动外观模型采用主成分分析算法描述人脸形状的变化必然带来额外的估计误差。为降低或消除这一误差,该文提出一种改进的局部线性嵌入算法构建人脸形状-纹理空间,并将其... 由于人脸面部运动变化分布在一个低维非线性流形中,基于线性假设的主动外观模型采用主成分分析算法描述人脸形状的变化必然带来额外的估计误差。为降低或消除这一误差,该文提出一种改进的局部线性嵌入算法构建人脸形状-纹理空间,并将其应用于主动外观模型中。实验结果表明,不仅对于面部形变不大的人脸形状,局部线性嵌入-主动外观模型拥有更低的估计残差;而且对于一些变化较大的人脸形状,在主成分分析-主动外观模型跟踪失败的情况下,局部线性嵌入-主动外观模型依然可以取得很好的特征估计结果,弥补了主成分分析-主动外观模型的不足。 展开更多
关键词 人脸识别 主动外观模型 非线性流形学习 局部线性嵌入
在线阅读 下载PDF
Similarity measure design for high dimensional data 被引量:3
10
作者 LEE Sang-hyuk YAN Sun +1 位作者 JEONG Yoon-su SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2014年第9期3534-3540,共7页
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ... Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667. 展开更多
关键词 high dimensional data similarity measure DIFFERENCE neighborhood information financial fraud
在线阅读 下载PDF
Radar emitter signal recognition based on multi-scale wavelet entropy and feature weighting 被引量:16
11
作者 李一兵 葛娟 +1 位作者 林云 叶方 《Journal of Central South University》 SCIE EI CAS 2014年第11期4254-4260,共7页
In modern electromagnetic environment, radar emitter signal recognition is an important research topic. On the basis of multi-resolution wavelet analysis, an adaptive radar emitter signal recognition method based on m... In modern electromagnetic environment, radar emitter signal recognition is an important research topic. On the basis of multi-resolution wavelet analysis, an adaptive radar emitter signal recognition method based on multi-scale wavelet entropy feature extraction and feature weighting was proposed. With the only priori knowledge of signal to noise ratio(SNR), the method of extracting multi-scale wavelet entropy features of wavelet coefficients from different received signals were combined with calculating uneven weight factor and stability weight factor of the extracted multi-dimensional characteristics. Radar emitter signals of different modulation types and different parameters modulated were recognized through feature weighting and feature fusion. Theoretical analysis and simulation results show that the presented algorithm has a high recognition rate. Additionally, when the SNR is greater than-4 d B, the correct recognition rate is higher than 93%. Hence, the proposed algorithm has great application value. 展开更多
关键词 emitter recognition multi-scale wavelet entropy feature weighting uneven weight factor stability weight factor
在线阅读 下载PDF
Energy efficient mechanism using flexible medium access control protocol for hybrid wireless sensor networks 被引量:2
12
作者 SUN Ning JEONG Yoon-su LEE Sang-ho 《Journal of Central South University》 SCIE EI CAS 2013年第8期2165-2174,共10页
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is rega... Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is regarded suitable for WSNs due to its good performance in energy conservation. In this work, an adequately flexible mechanism for clustering WSNs is designed, in which some creative or promotional metrics are utilized, such as cluster head selection algorithm, cluster optional reconstruction, interested data transmission, multiple path routing protocol. All these strategies were cooperated to maximize energy saving of whole system. An appropriate MAC protocol for this mechanism is proposed, by flexibly switching the status of diverse sensor nodes in different strategies. The simulation results show that the proposed MAC protocol is suitable for clustering WSNs and performs well in aspects of energy efficiency, flexibility and scalability. 展开更多
关键词 MAC protocol energy conservation FLEXIBILITY re-clustering wireless sensor network
在线阅读 下载PDF
Efficient and secure source authentication scheme for multicast user authentication 被引量:1
13
作者 JEONG Yoon-su LEE Sang-hyuk SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2013年第10期2741-2746,共6页
Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video a... Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services. 展开更多
关键词 MULTICAST PACKET SOURCE AUTHENTICATION BROADBAND Internet
在线阅读 下载PDF
Diffserv AQM algorithm for edge and core routers 被引量:2
14
作者 Yang Xiao Lingyun Lu Kiseon Kim 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期1033-1040,共8页
The existing active queue management (AQM) algorithm acts on subscribers and edge routers only, it does not support differentiate-serve (Diffserv) quality of service (QoS), while the existing diffserv QoS has no... The existing active queue management (AQM) algorithm acts on subscribers and edge routers only, it does not support differentiate-serve (Diffserv) quality of service (QoS), while the existing diffserv QoS has not considered the link capacities between edge routers and connected core routers. When a core router in a two layers’ network experiences congestion, the connected edge routers have no ability to adjust their access data rates. Thus, it is difficult to achieve the congestion control for the large scale network with many edge routers and core routers. To solve these problems, two difffserve AQM algorithms are proposed for the congestion control of multilayer network. One diffserv AQM algorithm implements fair link capacities of edge routers, and the other one implements unequal link capacities of edge routers, but it requires the core routers to have multi-queues buffers and Diffserv AQM to support. The proposed algorithms achieve the network congestion control by operating AQM parameters on the conditions of proposed three theorems for core and edge routers. The dynamic simulation results demonstrate the proposed control algorithms for core and edge routers to be valid. 展开更多
关键词 active queue management (AQM) core router control multilayer network.
在线阅读 下载PDF
Bayesian track-before-detect algorithm for nonstationary sea clutter 被引量:2
15
作者 XU Cong HE Zishu +1 位作者 LIU Haicheng LI Yadan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1338-1344,共7页
Radar detection of small targets in sea clutter is a particularly demanding task because of the nonstationary characteristic of sea clutter.The track-before-detect(TBD)filter is an effective way to increase the signal... Radar detection of small targets in sea clutter is a particularly demanding task because of the nonstationary characteristic of sea clutter.The track-before-detect(TBD)filter is an effective way to increase the signal-to-clutter ratio(SCR),thus improving the detection performance of small targets in sea clutter.To cope with the nonstationary characteristic of sea clutter,an easily-implemented Bayesian TBD filter with adaptive detection threshold is proposed and a new parameter estimation method is devised which is integrated into the detection process.The detection threshold is set according to the parameter estimation result under the framework of information theory.For detection of closely spaced targets,those within the same range cell as the one under test are treated as contribution to sea clutter,and a successive elimination method is adopted to detect them.Simulation results prove the effectiveness of the proposed algorithm in detecting small targets in nonstationary sea clutter,especially closely spaced ones. 展开更多
关键词 small target track-before-detect(TBD) nonstationary sea clutter closely spaced target
在线阅读 下载PDF
Dark channel prior based blurred image restoration method using total variation and morphology 被引量:1
16
作者 Yibing Li Qiang Fu +1 位作者 Fang Ye Hayaru Shouno 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期359-366,共8页
The blurred image restoration method can dramatically highlight the image details and enhance the global contrast, which is of benefit to improvement of the visual effect during practical ap- plications. This paper is... The blurred image restoration method can dramatically highlight the image details and enhance the global contrast, which is of benefit to improvement of the visual effect during practical ap- plications. This paper is based on the dark channel prior principle and aims at the prior information absent blurred image degradation situation. A lot of improvements have been made to estimate the transmission map of blurred images. Since the dark channel prior principle can effectively restore the blurred image at the cost of a large amount of computation, the total variation (TV) and image morphology transform (specifically top-hat transform and bottom- hat transform) have been introduced into the improved method. Compared with original transmission map estimation methods, the proposed method features both simplicity and accuracy. The es- timated transmission map together with the element can restore the image. Simulation results show that this method could inhibit the ill-posed problem during image restoration, meanwhile it can greatly improve the image quality and definition. 展开更多
关键词 image restoration dark channel prior total variation (TV) morphology transform
在线阅读 下载PDF
An optimized framework for degree distribution in LT codes based on power law
17
作者 Asim Muhammad Choi GoangSeog 《Journal of Central South University》 SCIE EI CAS 2013年第10期2693-2699,共7页
LT codes are practical realization of digital fountain codes, which provides the concept of rateless coding. In this scheme, encoded symbols are generated infinitely from k information symbols. Decoder uses only(1+α)... LT codes are practical realization of digital fountain codes, which provides the concept of rateless coding. In this scheme, encoded symbols are generated infinitely from k information symbols. Decoder uses only(1+α)k number of encoded symbols to recover the original information. The degree distribution function in the LT codes helps to generate a random graph also referred as tanner graph. The artifact of tanner graph is responsible for computational complexity and overhead in the LT codes. Intuitively, a well designed degree distribution can be used for an efficient implementation of LT codes. The degree distribution function is studied as a function of power law, and LT codes are classified into two different categories: SFLT and RLT codes. Also, two different degree distributions are proposed and analyzed for SFLT codes which guarantee optimal performance in terms of computational complexity and overhead. 展开更多
关键词 FOUNTAIN CODES DEGREE distribution OVERHEAD computational COMPLEXITY power LAW
在线阅读 下载PDF
Bistatic Sonar Localization Based on Best Linear Unbiased Estimation
18
作者 宋元 章新华 +1 位作者 郭徽东 王芳 《Defence Technology(防务技术)》 SCIE EI CAS 2007年第4期292-296,共5页
A best linear unbiased estimation(BLUE)algorithm for bistatic sonar localization is proposed.The Cramer-Rao bound for bistatic sonar and the geometrical dilution of precision(GDOP)in different conditions are given.The... A best linear unbiased estimation(BLUE)algorithm for bistatic sonar localization is proposed.The Cramer-Rao bound for bistatic sonar and the geometrical dilution of precision(GDOP)in different conditions are given.The simulation results show that the location accuracy of BLUE algorithm is higher than the weighted least square method. 展开更多
关键词 声学 收发分置声纳 局部化 Cramer-Rao跃进
在线阅读 下载PDF
Performance evaluations on inner vs. outer decomposition first parallel join algorithms for two nested loop joins
19
作者 Seo-Young NOH Heejun YOON +2 位作者 Il-Yeon YEO Yoon-su JEONG Hyungwoo PARK 《Journal of Central South University》 SCIE EI CAS 2014年第10期3873-3882,共10页
Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to sa... Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to save disk I/Os. However, two different decomposition algorithms are compared, such as inner vs. outer decomposition first algorithms for tuple-based and block-based nested loop joins, showing that the proposed approach is 20% better than general approach. Also lemmas are proved, when we have to use the outer decomposition first parallel join algorithms. 展开更多
关键词 parallel join performance inner decomposition outer decomposition
在线阅读 下载PDF
MCHOKeM algorithm with assured bandwidth allocation in DiffServ networks
20
作者 Haifeng Du Yang Xiao Kiseon Kim 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期531-536,共6页
An active queue management(AQM) algorithm called MCHOKeM is presented,which is borrowed from CHOKeW that draws multi-packets at random from the buffer,the multi-packets are compared with an arriving packet and aband... An active queue management(AQM) algorithm called MCHOKeM is presented,which is borrowed from CHOKeW that draws multi-packets at random from the buffer,the multi-packets are compared with an arriving packet and abandoned if they are from the same flow.But MCHOKeM uses multiple virtual queues for different priority packets and enhances the drawing function by adjusting the maximum number of draws based on the current status of virtual queue length.The number of parameters that MCHOKeM needs to maintain is determined by the number of priority levels being supported by the router,which usually has a small limited value.In order to explain the features of MCHOKeM,an analytical model is used.A series of simulation tests to evaluate the performance are given. 展开更多
关键词 congestion control theory differentiated services(DiffServ) transaction control protocol(TCP) protection fairness analysis.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部