... P-wave, centered around P-wave, and a 128- sample long window after the P-wave; (b) Raw data and spectra of noise segments that may be recognized as a pseudo-P-wave. 4 EURASIP Journal on Advances ... crucial patterns from the total AE data, as well as particular P-wave arrivals, may provide clues for distinguishing between real events and extraneous signals, thus improving the spatial acc...
Ngày tải lên: 21/06/2014, 08:20
... Publication Award from Academia Sinica in 1997. He has served as the Pro- gram Cochair of ACCV’00 and ICAT’00, as the Workshop Cochair of ICCV’03, and as a member in the editorial board of the Interna- tional ... images contain a wide range of contents, such as landscapes, ani- mals, plants, and buildings. These data categories are classi- fied according to human concepts such as “beautifu...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article A MAP Estimator for Simultaneous Superresolution and Detector Nonunifomity Correction" ppt
... Another approach is based on the assump- tion that the output of each detector should exhibit a con- stant range of values [14]. A Kalman filter-based approach 4 EURASIP Journal on Advances in Signal ... allow for qualitative analysis. 4.1. Simulated data The original true HR image is shown in Figure 2 (a) .Thisisa single 8-bit grayscale aerial image to which we apply random translational...
Ngày tải lên: 22/06/2014, 19:20
Báo cáo hóa học: " Research Article A Beale-Kato-Madja Criterion for " ppt
... Villamizar-Roa, and M. A. Rojas-Medar, “Micropolar fluids with vanishing viscosity,” Abstract and Applied Analysis, vol. 2010, Article ID 843692, 18 pages, 2010. 15 C. Cao and J. Wu, “Two regularity ... China Grant no. 10971190. References 1 S. Gala, “Regularity criteria for the 3D magneto-micropolar fluid equations in the Morrey-Campanato space,” Nonlinear Differential Equations and Ap...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: "Research Article A Fourth-Order Boundary Value Problem with One-Sided Nagumo Condition" ppt
... point boundary conditions,” Journal of Mathematical Analysis and Applications, vol. 285, no. 1, pp. 174–190, 2003. 5 A. Cabada and R. L. Pouso, “Extremal solutions of strongly nonlinear discontinuous ... M.R.Grossinho,F.M.Minh ´ os, and A. I. Santos, “Existence result for a third-order ODE with nonlinear boundary conditions in presence of a sign-type Nagumo control,” Journal of Mathem...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: "Research Article A Dependent Multilabel Classification Method Derived from the k-Nearest Neighbor Rule" ppt
... measures the average fraction of labels 14 EURASIP Journal on Advances in Signal Processing [20] Y. Yang, “An evaluation of statistical approaches to text categorization,” Journal of Information ... learning algorithms and making them able to manipulate multilabel data dir ectly [12]. Some multilabel classification methods are briefly described below. In [13], an adaptation of the traditional r...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: "Research Article A Modified Run-Length Coding towards the Realization of a RRO-NRDPWT-Based ECG Data Compression System" pdf
... three-dimensional organ, heart disease diagnosis usually requires the use of several ECG signals sensed at various positions around the heart. A typical requirement for heart disease diagnosis and health care ... of 7% and 9% were graded as “no diagnostic information lost” and “clinically acceptable”, respectively. A reproduced waveforms at a PRD of 13% was “notably degenerated in some...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: " Research Article A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets" pot
... 1.Moreover,for additional learning procedure and anomaly modeling, we generated a variety of anomaly attack data such as covert channels, malformed packets, and some DoS attacks. The simulated attacks were included in ... a Gaussian pdf with mean vector μ i and covariance i , evaluated at o t . M is the dimensionality of the observed data o. In order to make an appropriate G-HMM model...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: " Research Article A Salient Missing Link in RFID Security Protocols" potx
... attack model and will be a basis for many RFID authentication protocols that are vulnerable to the attack. 3. The Timing Attack Timing attacks provide an attacker with secrets maintained in a ... n, advantage of an adversary can be approximated as Adv Exp A, SBAP ( k ) ≈ 1 2 − n N . (10) In order to illustrate the realization of the presented attack, we consider a real life scenario in...
Ngày tải lên: 21/06/2014, 05:20