期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Analysis and verification of network profile 被引量:3
1
作者 Weiwei Chen Ning Huang +2 位作者 Yuqing Liu Ye Wang Rui Kang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期784-790,共7页
The elements of network profile are proposed.Based on the network traffic distribution model,the network profile includes the application request rate,the branch transfer probability,the ratio of application requests,... The elements of network profile are proposed.Based on the network traffic distribution model,the network profile includes the application request rate,the branch transfer probability,the ratio of application requests,and the probability distribution of the requested objects.Based on the evaluation method of network performance reliability,four simulation cases are constructed in OPNET software,and the results show the four elements of profile have impacts on the network reliability. 展开更多
关键词 system engineering network profile performance reliability network simulation.
在线阅读 下载PDF
Smart phone-based context-aware augmentative and alternative communications system
2
作者 PARK DongGyu SONG Sejun LEE DoHoon 《Journal of Central South University》 SCIE EI CAS 2014年第9期3551-3558,共8页
A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential... A smartphone-based context-aware augmentative and alternative communication(AAC) was applied was in order to enhance the user's experience by providing simple, adaptive, and intuitive interfaces. Various potential context-aware technologies and AAC usage scenarios were studied, and an efficient communication system was developed by combining smartphone's multimedia functions and its optimized sensor technologies. The experimental results show that context-awareness accuracy is achieved up to 97%. 展开更多
关键词 augmentative alternative communication system context awareness mobile system location based services
在线阅读 下载PDF
An advanced segmentation using area and boundary tracing technique in extraction of lungs region
3
作者 Kiran THAPALIYA Sang-Woong LEE +2 位作者 Jae-Young PYU Heon JEONG Goo-Rak KWON 《Journal of Central South University》 SCIE EI CAS 2014年第10期3811-3820,共10页
A new method is presented for the segmentation of pulmonary parenchyma. The proposed method is based on the area calculation of different objects in the image. The main purpose of the proposed algorithm is the segment... A new method is presented for the segmentation of pulmonary parenchyma. The proposed method is based on the area calculation of different objects in the image. The main purpose of the proposed algorithm is the segment of the lungs images from the computer tomography(CT) images. The original image is binarized using the bit-plane slicing technique and among the different images the best binarized image is chosen. After binarization, the labeling is done and the area of each label is calculated from which the next level of binarized image is obtained. Then, the boundary tracing algorithm is applied to get another level of binarized image. The proposed method is able to extract lung region from the original images. The experimental results show the significance of the proposed method. 展开更多
关键词 bit-plane slicing technique connected component labeling area tracing boundary tracing
在线阅读 下载PDF
Performance of M-QAM, M-DPSK and M-PSK with MRC diversity in a Nakagami-m fading channel
4
作者 Alam S.M.Shamsul Alam Choi GoangSeog 《Journal of Central South University》 SCIE EI CAS 2014年第4期1347-1352,共6页
The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(A... The nature of a wireless communication channel is very unpredictable. To design a good communication link, it is required to know the statistical model of the channel accurately. The average symbol error probability(ASER) was analyzed for different modulation schemes. A unified analytical framework was presented to obtain closed-form solutions for calculating the ASER of M-ary differential phase-shift keying(M-DPSK), coherent M-ary phase-shift keying(M-PSK), and quadrature amplitude modulation(QAM) over single or multiple Nakagami-m fading channels. Moreover, the ASER was estimated and evaluated by using the maximal ratio-combining(MRC) diversity technique. Simulation results show that an error rate of the fading channel typically depends on Nakagami parameters(m), space diversity(N), and symbol rate(M). A comparison between M-PSK, M-DPSK, and M-QAM modulation schemes was shown, and the results prove that M-ary QAM(M-QAM) demonstrates better performance compared to M-DPSK and M-PSK under all fading and non-fading conditions. 展开更多
关键词 M-ary differential phase-shift keying(M-DPSK) M-ary phase shift keying(M-PSK) Nakagami-m fading channel probability density function(PDF) symbol error rate(SER) M-ary quadrature amplitude modulation(M-QAM)
在线阅读 下载PDF
Erratum to: An advanced segmentation using area and boundary tracing technique in extraction of lungs region
5
作者 Kiran THAPALIYA Sang-Woong LEE +2 位作者 Jae-Young PYU Heon JEONG Goo-Rak KWON 《Journal of Central South University》 SCIE EI CAS 2014年第12期4762-4762,共1页
Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of th... Erratum to:J.Cent.South Univ.(2014)21:3811-3820DOI:10.1007/s11771-014-2366-9The original version of this article unfortunately contained three mistakes.The mistakes are corrected as follows:1)The spelling of third author is incorrect.The correct name is Jae-Young PYUN.2)The information of corresponding author is incorrect.The correct information should be Goo-Rak KWON,Professor,PhD;Tel/Fax:+98-711-7264102;E-mail:grkwon@chosun.ac.kr 展开更多
关键词 segmentation corrected tracing contained lungs Heidelberg supervised Berlin updated incomplete
在线阅读 下载PDF
基于特征点矢量与纹理形变能量参数融合的人脸表情识别 被引量:23
6
作者 易积政 毛峡 +1 位作者 Ishizuka Mitsuru 薛雨丽 《电子与信息学报》 EI CSCD 北大核心 2013年第10期2403-2410,共8页
人脸表情识别是人机交互领域的研究热点和难点之一。为了有效去除由于个体差异而造成的表情特征的差异,该文首先基于特征点矢量提出特征点距离比例系数;其后,又给出纹理形变能量参数的概念;最后,将二者融合用于人脸表情识别。所提方法在... 人脸表情识别是人机交互领域的研究热点和难点之一。为了有效去除由于个体差异而造成的表情特征的差异,该文首先基于特征点矢量提出特征点距离比例系数;其后,又给出纹理形变能量参数的概念;最后,将二者融合用于人脸表情识别。所提方法在Cohn-Kanade数据库及BHU人脸表情数据库进行了测试,实验结果表明该方法较传统的方法在识别率上分别提高了4.5%与3.9%。 展开更多
关键词 人脸表情识别 特征点矢量 纹理形变能量参数 径向基神经网络
在线阅读 下载PDF
基于非线性流形学习的人脸面部运动估计 被引量:5
7
作者 王晓侃 毛峡 Ishizuka Mitsuru 《电子与信息学报》 EI CSCD 北大核心 2011年第10期2531-2535,共5页
由于人脸面部运动变化分布在一个低维非线性流形中,基于线性假设的主动外观模型采用主成分分析算法描述人脸形状的变化必然带来额外的估计误差。为降低或消除这一误差,该文提出一种改进的局部线性嵌入算法构建人脸形状-纹理空间,并将其... 由于人脸面部运动变化分布在一个低维非线性流形中,基于线性假设的主动外观模型采用主成分分析算法描述人脸形状的变化必然带来额外的估计误差。为降低或消除这一误差,该文提出一种改进的局部线性嵌入算法构建人脸形状-纹理空间,并将其应用于主动外观模型中。实验结果表明,不仅对于面部形变不大的人脸形状,局部线性嵌入-主动外观模型拥有更低的估计残差;而且对于一些变化较大的人脸形状,在主成分分析-主动外观模型跟踪失败的情况下,局部线性嵌入-主动外观模型依然可以取得很好的特征估计结果,弥补了主成分分析-主动外观模型的不足。 展开更多
关键词 人脸识别 主动外观模型 非线性流形学习 局部线性嵌入
在线阅读 下载PDF
Similarity measure design for high dimensional data 被引量:3
8
作者 LEE Sang-hyuk YAN Sun +1 位作者 JEONG Yoon-su SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2014年第9期3534-3540,共7页
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ... Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667. 展开更多
关键词 high dimensional data similarity measure DIFFERENCE neighborhood information financial fraud
在线阅读 下载PDF
Radar emitter signal recognition based on multi-scale wavelet entropy and feature weighting 被引量:16
9
作者 李一兵 葛娟 +1 位作者 林云 叶方 《Journal of Central South University》 SCIE EI CAS 2014年第11期4254-4260,共7页
In modern electromagnetic environment, radar emitter signal recognition is an important research topic. On the basis of multi-resolution wavelet analysis, an adaptive radar emitter signal recognition method based on m... In modern electromagnetic environment, radar emitter signal recognition is an important research topic. On the basis of multi-resolution wavelet analysis, an adaptive radar emitter signal recognition method based on multi-scale wavelet entropy feature extraction and feature weighting was proposed. With the only priori knowledge of signal to noise ratio(SNR), the method of extracting multi-scale wavelet entropy features of wavelet coefficients from different received signals were combined with calculating uneven weight factor and stability weight factor of the extracted multi-dimensional characteristics. Radar emitter signals of different modulation types and different parameters modulated were recognized through feature weighting and feature fusion. Theoretical analysis and simulation results show that the presented algorithm has a high recognition rate. Additionally, when the SNR is greater than-4 d B, the correct recognition rate is higher than 93%. Hence, the proposed algorithm has great application value. 展开更多
关键词 emitter recognition multi-scale wavelet entropy feature weighting uneven weight factor stability weight factor
在线阅读 下载PDF
Energy efficient mechanism using flexible medium access control protocol for hybrid wireless sensor networks 被引量:2
10
作者 SUN Ning JEONG Yoon-su LEE Sang-ho 《Journal of Central South University》 SCIE EI CAS 2013年第8期2165-2174,共10页
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is rega... Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is regarded suitable for WSNs due to its good performance in energy conservation. In this work, an adequately flexible mechanism for clustering WSNs is designed, in which some creative or promotional metrics are utilized, such as cluster head selection algorithm, cluster optional reconstruction, interested data transmission, multiple path routing protocol. All these strategies were cooperated to maximize energy saving of whole system. An appropriate MAC protocol for this mechanism is proposed, by flexibly switching the status of diverse sensor nodes in different strategies. The simulation results show that the proposed MAC protocol is suitable for clustering WSNs and performs well in aspects of energy efficiency, flexibility and scalability. 展开更多
关键词 MAC protocol energy conservation FLEXIBILITY re-clustering wireless sensor network
在线阅读 下载PDF
Efficient and secure source authentication scheme for multicast user authentication 被引量:1
11
作者 JEONG Yoon-su LEE Sang-hyuk SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2013年第10期2741-2746,共6页
Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video a... Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services. 展开更多
关键词 MULTICAST PACKET SOURCE AUTHENTICATION BROADBAND Internet
在线阅读 下载PDF
Dark channel prior based blurred image restoration method using total variation and morphology 被引量:1
12
作者 Yibing Li Qiang Fu +1 位作者 Fang Ye Hayaru Shouno 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期359-366,共8页
The blurred image restoration method can dramatically highlight the image details and enhance the global contrast, which is of benefit to improvement of the visual effect during practical ap- plications. This paper is... The blurred image restoration method can dramatically highlight the image details and enhance the global contrast, which is of benefit to improvement of the visual effect during practical ap- plications. This paper is based on the dark channel prior principle and aims at the prior information absent blurred image degradation situation. A lot of improvements have been made to estimate the transmission map of blurred images. Since the dark channel prior principle can effectively restore the blurred image at the cost of a large amount of computation, the total variation (TV) and image morphology transform (specifically top-hat transform and bottom- hat transform) have been introduced into the improved method. Compared with original transmission map estimation methods, the proposed method features both simplicity and accuracy. The es- timated transmission map together with the element can restore the image. Simulation results show that this method could inhibit the ill-posed problem during image restoration, meanwhile it can greatly improve the image quality and definition. 展开更多
关键词 image restoration dark channel prior total variation (TV) morphology transform
在线阅读 下载PDF
An optimized framework for degree distribution in LT codes based on power law
13
作者 Asim Muhammad Choi GoangSeog 《Journal of Central South University》 SCIE EI CAS 2013年第10期2693-2699,共7页
LT codes are practical realization of digital fountain codes, which provides the concept of rateless coding. In this scheme, encoded symbols are generated infinitely from k information symbols. Decoder uses only(1+α)... LT codes are practical realization of digital fountain codes, which provides the concept of rateless coding. In this scheme, encoded symbols are generated infinitely from k information symbols. Decoder uses only(1+α)k number of encoded symbols to recover the original information. The degree distribution function in the LT codes helps to generate a random graph also referred as tanner graph. The artifact of tanner graph is responsible for computational complexity and overhead in the LT codes. Intuitively, a well designed degree distribution can be used for an efficient implementation of LT codes. The degree distribution function is studied as a function of power law, and LT codes are classified into two different categories: SFLT and RLT codes. Also, two different degree distributions are proposed and analyzed for SFLT codes which guarantee optimal performance in terms of computational complexity and overhead. 展开更多
关键词 FOUNTAIN CODES DEGREE distribution OVERHEAD computational COMPLEXITY power LAW
在线阅读 下载PDF
Bistatic Sonar Localization Based on Best Linear Unbiased Estimation
14
作者 宋元 章新华 +1 位作者 郭徽东 王芳 《Defence Technology(防务技术)》 SCIE EI CAS 2007年第4期292-296,共5页
A best linear unbiased estimation(BLUE)algorithm for bistatic sonar localization is proposed.The Cramer-Rao bound for bistatic sonar and the geometrical dilution of precision(GDOP)in different conditions are given.The... A best linear unbiased estimation(BLUE)algorithm for bistatic sonar localization is proposed.The Cramer-Rao bound for bistatic sonar and the geometrical dilution of precision(GDOP)in different conditions are given.The simulation results show that the location accuracy of BLUE algorithm is higher than the weighted least square method. 展开更多
关键词 声学 收发分置声纳 局部化 Cramer-Rao跃进
在线阅读 下载PDF
Performance evaluations on inner vs. outer decomposition first parallel join algorithms for two nested loop joins
15
作者 Seo-Young NOH Heejun YOON +2 位作者 Il-Yeon YEO Yoon-su JEONG Hyungwoo PARK 《Journal of Central South University》 SCIE EI CAS 2014年第10期3873-3882,共10页
Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to sa... Two popular traditional join algorithms and their parallel versions are introduced. When designing join algorithms in serial computing environment, decomposing inner relation is considered as the right direction to save disk I/Os. However, two different decomposition algorithms are compared, such as inner vs. outer decomposition first algorithms for tuple-based and block-based nested loop joins, showing that the proposed approach is 20% better than general approach. Also lemmas are proved, when we have to use the outer decomposition first parallel join algorithms. 展开更多
关键词 parallel join performance inner decomposition outer decomposition
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部