首页 > 最新文献

Third International Conference on Information Technology and Applications (ICITA'05)最新文献

英文 中文
Multimedia Multicast Using SPLIT and Layered FEC 使用SPLIT和分层FEC的多媒体组播
N. Chilamkurti, B. Soh
In this paper, we propose the use of layered forward error correction (FEC) as an error control mechanism in a layered video protocol known as "SPLIT". By organizing FEC into multiple layers, a receiver can obtain different level of protection with respect to the channel capacity. By effectively dropping data layers, overall effective bandwidth can also be achieved. In our work, we integrated Reed-Solomon based FEC error control into SPLIT protocol, which is a priority based protocol. We used NS-2 simulator to evaluate FEC on SPLIT protocol and the results show that the video quality can be significantly improved at the same communication rate when layered FEC is used
在本文中,我们提出在分层视频协议“SPLIT”中使用分层前向纠错(FEC)作为错误控制机制。通过将FEC组织成多层,接收器可以根据信道容量获得不同级别的保护。通过有效地减少数据层,还可以实现总体有效带宽。在我们的工作中,我们将基于Reed-Solomon的FEC错误控制集成到SPLIT协议中,这是一个基于优先级的协议。利用NS-2仿真器对SPLIT协议下的FEC进行了仿真,结果表明,在相同的通信速率下,分层FEC可以显著提高视频质量
{"title":"Multimedia Multicast Using SPLIT and Layered FEC","authors":"N. Chilamkurti, B. Soh","doi":"10.1109/ICITA.2005.185","DOIUrl":"https://doi.org/10.1109/ICITA.2005.185","url":null,"abstract":"In this paper, we propose the use of layered forward error correction (FEC) as an error control mechanism in a layered video protocol known as \"SPLIT\". By organizing FEC into multiple layers, a receiver can obtain different level of protection with respect to the channel capacity. By effectively dropping data layers, overall effective bandwidth can also be achieved. In our work, we integrated Reed-Solomon based FEC error control into SPLIT protocol, which is a priority based protocol. We used NS-2 simulator to evaluate FEC on SPLIT protocol and the results show that the video quality can be significantly improved at the same communication rate when layered FEC is used","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127196708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting Customer’s Privacy in Querying Valuable Information Combined with E-Payment Scheme 结合电子支付方案,在查询有价值资讯时保障顾客的私隐
Chun-Hua Chen, Chi-Min Lan, G. Horng
In the online retrieving valuable information in special databases, it is important to protect the privacy of users preventing the server from knowing the information what the users retrieve. The problem was not solved until the privacy information retrieval (PIR) schemes were presented. A PIR scheme allows a user to retrieve a date item from online database while hiding the index of the data item from the database server. However, retrieving valuable information is another problem needs to be solved. Most transactions are completed by credit card through delivering its number and membership in the Internet to the server. Then the server knows the privacy of users. It becomes a challenge to private information retrieval (PIR) schemes considering the e-payment need. In this paper, we propose a new PIR scheme, which use a secure coprocessor (SC), with e-payment scheme for protecting the privacy of customers in querying valuable information. The scheme does not reveal personal information or buying information of customers in the Internet environment, it can really protect the customers' privacy. Comparing with previous PIR schemes, the scheme, combined with e-payment scheme in retrieving valuable information in special database, is more practical than previous PIR schemes in the Internet applications because of considering e-payment need
在在线检索特殊数据库中有价值的信息时,保护用户的隐私,防止服务器知道用户检索的信息是很重要的。直到隐私信息检索(PIR)方案的提出,这一问题才得以解决。PIR方案允许用户从在线数据库检索日期项,同时对数据库服务器隐藏数据项的索引。然而,检索有价值的信息是另一个需要解决的问题。大多数交易都是通过将信用卡号码和在因特网上的会员资格传递给服务器来完成的。这样服务器就知道用户的隐私。考虑到电子支付的需求,这对私人信息检索(PIR)方案提出了挑战。在本文中,我们提出了一种新的PIR方案,该方案使用安全协处理器(SC)和电子支付方案来保护客户在查询有价值信息时的隐私。本方案不会泄露客户在互联网环境下的个人信息或购买信息,真正保护了客户的隐私。与以往的PIR方案相比,该方案结合电子支付方案在特殊数据库中检索有价值的信息,由于考虑了电子支付的需求,在Internet应用中比以往的PIR方案更加实用
{"title":"Protecting Customer’s Privacy in Querying Valuable Information Combined with E-Payment Scheme","authors":"Chun-Hua Chen, Chi-Min Lan, G. Horng","doi":"10.1109/ICITA.2005.222","DOIUrl":"https://doi.org/10.1109/ICITA.2005.222","url":null,"abstract":"In the online retrieving valuable information in special databases, it is important to protect the privacy of users preventing the server from knowing the information what the users retrieve. The problem was not solved until the privacy information retrieval (PIR) schemes were presented. A PIR scheme allows a user to retrieve a date item from online database while hiding the index of the data item from the database server. However, retrieving valuable information is another problem needs to be solved. Most transactions are completed by credit card through delivering its number and membership in the Internet to the server. Then the server knows the privacy of users. It becomes a challenge to private information retrieval (PIR) schemes considering the e-payment need. In this paper, we propose a new PIR scheme, which use a secure coprocessor (SC), with e-payment scheme for protecting the privacy of customers in querying valuable information. The scheme does not reveal personal information or buying information of customers in the Internet environment, it can really protect the customers' privacy. Comparing with previous PIR schemes, the scheme, combined with e-payment scheme in retrieving valuable information in special database, is more practical than previous PIR schemes in the Internet applications because of considering e-payment need","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"52 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113990528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Web search results with profile comparisons 个性化的Web搜索结果与个人资料比较
J. Lai, B. Soh
The information explosion on the Internet makes it hard for users to obtain required information from the Web searched results in a more personalized way. For the same input word, most search engines return the same result to each user without taking into consideration user preference. For many users, it is no longer sufficient to get non-customized results. It is crucial to analyze users' search and browsing behaviors based on searching keywords entered by users, the clicking rate of each link in the result and the time they spend on each site. To this end, we have proposed a method to derive user searching profiles. We have also proposed a mechanism to derive document profiles, based on similarity score of documents. In this paper, we discuss how to use our model to combine the user searching profiles and the document profile, with a view to presenting customized search results to the users.
互联网上的信息爆炸使得用户很难以更加个性化的方式从网络搜索结果中获取所需的信息。对于相同的输入词,大多数搜索引擎返回相同的结果给每个用户,而不考虑用户的偏好。对于许多用户来说,获得非定制的结果已经不够了。根据用户输入的搜索关键词、结果中每个链接的点击率以及用户在每个网站上花费的时间来分析用户的搜索和浏览行为是至关重要的。为此,我们提出了一种导出用户搜索配置文件的方法。我们还提出了一种基于文档相似度评分的导出文档概要的机制。在本文中,我们讨论了如何使用我们的模型将用户搜索概要和文档概要结合起来,从而向用户呈现自定义的搜索结果。
{"title":"Personalized Web search results with profile comparisons","authors":"J. Lai, B. Soh","doi":"10.1109/ICITA.2005.217","DOIUrl":"https://doi.org/10.1109/ICITA.2005.217","url":null,"abstract":"The information explosion on the Internet makes it hard for users to obtain required information from the Web searched results in a more personalized way. For the same input word, most search engines return the same result to each user without taking into consideration user preference. For many users, it is no longer sufficient to get non-customized results. It is crucial to analyze users' search and browsing behaviors based on searching keywords entered by users, the clicking rate of each link in the result and the time they spend on each site. To this end, we have proposed a method to derive user searching profiles. We have also proposed a mechanism to derive document profiles, based on similarity score of documents. In this paper, we discuss how to use our model to combine the user searching profiles and the document profile, with a view to presenting customized search results to the users.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes 用DFT扩频码降低MC/DS CDMA系统的PAPR
Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, H. Ryu
Multi-carrier direct sequence code division multiple access (MC/DS CDMA) technique is one of the optimum technique for the reverse link mobile transmission. However, because of multi-carrier property, large PAPR (peak to average ratio) may be generated in MC/DS CDMA system. In this paper, DFT spreading code is applied to reduce high PAPR efficiently. As results, about 6 dB PAPR can be achieved at CCDF of 10 -3 in the MC/DS CDMA system with 12 data carriers. SER performance can be improved significantly compared with conventional MC/DS CDMA system with nonlinear HPA
多载波直接序列码分多址(MC/DS CDMA)技术是实现反向链路移动传输的最佳技术之一。然而,由于MC/DS CDMA系统的多载波特性,可能会产生较大的峰值平均比。本文采用离散傅立叶变换扩频码有效地降低了高PAPR。结果表明,在12个数据载波的MC/DS CDMA系统中,在CCDF为10 -3的情况下,可以实现约6 dB的PAPR。与传统的MC/DS CDMA系统相比,采用非线性HPA可以显著提高系统的SER性能
{"title":"PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes","authors":"Yingshan Li, Ju-Hyun Kyung, Jong-Won Son, H. Ryu","doi":"10.1109/ICITA.2005.205","DOIUrl":"https://doi.org/10.1109/ICITA.2005.205","url":null,"abstract":"Multi-carrier direct sequence code division multiple access (MC/DS CDMA) technique is one of the optimum technique for the reverse link mobile transmission. However, because of multi-carrier property, large PAPR (peak to average ratio) may be generated in MC/DS CDMA system. In this paper, DFT spreading code is applied to reduce high PAPR efficiently. As results, about 6 dB PAPR can be achieved at CCDF of 10 -3 in the MC/DS CDMA system with 12 data carriers. SER performance can be improved significantly compared with conventional MC/DS CDMA system with nonlinear HPA","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks 基于透明缓存的移动自组织网络机制
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the relay among all mobile nodes. However, a MANET is a self-organizing and adaptive wireless network formed by the dynamic gathering of mobile nodes, and the topology of a MANET frequently changes. To cope with the intrinsic properties of MANETs, a transparent cache-based mechanism is proposed in this paper. With the aid of the mechanism, the repetition of data and data path occurring in a MANET could be cached in some special mobile nodes. Routes and time span to access data are therefore shortened, and the data reusable rate is enhanced to reduce the use of bandwidth and the power consumption of battery
移动自组织网络(manet)使所有移动节点在没有基站或接入点的情况下相互通信,数据包的传输通过所有移动节点之间的中继完成。然而,MANET是由移动节点动态聚集而形成的自组织自适应无线网络,其拓扑结构经常发生变化。为了解决manet的固有特性,本文提出了一种基于透明缓存的机制。利用该机制,可以将移动网络中出现的重复数据和数据路径缓存在特定的移动节点中。从而缩短了访问数据的路径和时间跨度,提高了数据的重复利用率,减少了带宽的使用和电池的功耗
{"title":"A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks","authors":"Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee","doi":"10.1109/ICITA.2005.47","DOIUrl":"https://doi.org/10.1109/ICITA.2005.47","url":null,"abstract":"Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the relay among all mobile nodes. However, a MANET is a self-organizing and adaptive wireless network formed by the dynamic gathering of mobile nodes, and the topology of a MANET frequently changes. To cope with the intrinsic properties of MANETs, a transparent cache-based mechanism is proposed in this paper. With the aid of the mechanism, the repetition of data and data path occurring in a MANET could be cached in some special mobile nodes. Routes and time span to access data are therefore shortened, and the data reusable rate is enhanced to reduce the use of bandwidth and the power consumption of battery","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Iris Feature Extraction Using 2D Phase Congruency 基于二维相位一致性的虹膜特征提取
Xiaoyan Yuan, P. Shi
Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. A brief survey is made firstly in this paper on the methods that feasibly implemented in iris feature extraction. Because the iris capture devices in use are mostly exposed to the natural scene, so the natural illumination or other variant conditions sometimes can greatly influence the iris images captured and further impact the recognition result. Out of this consideration, we made some experimental try to extract the iris feature using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems
虹膜特征提取是整个虹膜识别过程中进行个人身份识别的关键阶段。本文首先对虹膜特征提取中可行的方法进行了简要综述。由于使用中的虹膜捕获设备大多暴露在自然场景中,因此自然光照或其他可变条件有时会极大地影响捕获的虹膜图像,进而影响识别结果。出于这个考虑,我们做了一些实验尝试,使用二维相位一致性提取虹膜特征,它不受强度或对比度变化的影响,试图避免这些问题
{"title":"Iris Feature Extraction Using 2D Phase Congruency","authors":"Xiaoyan Yuan, P. Shi","doi":"10.1109/ICITA.2005.166","DOIUrl":"https://doi.org/10.1109/ICITA.2005.166","url":null,"abstract":"Iris feature extraction is the crucial stage of the whole iris recognition process for personal identification. A brief survey is made firstly in this paper on the methods that feasibly implemented in iris feature extraction. Because the iris capture devices in use are mostly exposed to the natural scene, so the natural illumination or other variant conditions sometimes can greatly influence the iris images captured and further impact the recognition result. Out of this consideration, we made some experimental try to extract the iris feature using the 2D phase congruency, which invariant to changes in intensity or contrast, to try to avoid those problems","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channel 一种新的流量无关的NNC,用于动态缓冲调整以缩短TCP通道的RTT
Wilfred W. K. Lin, Allan K. Y. Wong, T. Dillon
The proposed neural network controller (NNC) is for user/server level dynamic buffer tuning. It eliminates overflow by making the buffer length always cover the queue length adaptively on the fly. The NNC and the AQM (active queue management) mechanism(s) at the system/router level together form a unified buffer overflow prevention solution for the TCP channels. The NNC provides the following advantages: a) it prevents the AQM resources dished out already at the system level from being wasted, b) it shortens the service roundtrip time (RTT) by eliminating the chance of retransmission due to user-level overflow, and c) it alleviates network congestion. The NNC operates by the {0,/spl Delta/}/sup 2/ objective function and the principle is to maintain the given /spl Delta/ safety margin about the reference point symbolically represented by the "0" in {0,/spl Delta/}/sup 2/. The NNC stability and precision are traffic pattern independent for its statistical nature. This independence makes the NNC immensely suitable for Internet applications because Internet traffic can be LRD (long-range dependence), SRD (short-range dependence) or multifractal, and switch suddenly.
所提出的神经网络控制器(NNC)用于用户/服务器级动态缓冲调谐。它通过使缓冲区长度始终自适应地覆盖动态队列长度来消除溢出。系统/路由器级别的NNC和AQM(主动队列管理)机制共同构成了TCP通道的统一缓冲区溢出预防解决方案。NNC提供了以下优点:a)它防止了已经在系统级分发的AQM资源被浪费,b)它通过消除由于用户级溢出而导致的重传机会缩短了服务往返时间(RTT), c)它缓解了网络拥塞。NNC通过{0,/spl Delta/}/sup 2/目标函数运行,其原理是保持参考点的给定/spl Delta/安全余量,参考点由{0,/spl Delta/}/sup 2/中的“0”符号表示。由于NNC的统计性质,其稳定性和精度与交通模式无关。这种独立性使得NNC非常适合互联网应用,因为互联网流量可以是LRD(远程依赖)、SRD(短程依赖)或多重分形的,并且可以突然切换。
{"title":"A novel traffic independent NNC for dynamic buffer tuning to shorten the RTT of a TCP channel","authors":"Wilfred W. K. Lin, Allan K. Y. Wong, T. Dillon","doi":"10.1109/ICITA.2005.39","DOIUrl":"https://doi.org/10.1109/ICITA.2005.39","url":null,"abstract":"The proposed neural network controller (NNC) is for user/server level dynamic buffer tuning. It eliminates overflow by making the buffer length always cover the queue length adaptively on the fly. The NNC and the AQM (active queue management) mechanism(s) at the system/router level together form a unified buffer overflow prevention solution for the TCP channels. The NNC provides the following advantages: a) it prevents the AQM resources dished out already at the system level from being wasted, b) it shortens the service roundtrip time (RTT) by eliminating the chance of retransmission due to user-level overflow, and c) it alleviates network congestion. The NNC operates by the {0,/spl Delta/}/sup 2/ objective function and the principle is to maintain the given /spl Delta/ safety margin about the reference point symbolically represented by the \"0\" in {0,/spl Delta/}/sup 2/. The NNC stability and precision are traffic pattern independent for its statistical nature. This independence makes the NNC immensely suitable for Internet applications because Internet traffic can be LRD (long-range dependence), SRD (short-range dependence) or multifractal, and switch suddenly.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PURPLE: a reflective middleware for pervasive computing PURPLE:用于普适计算的反射中间件
Zhang Kuo, Wang Xiaoge, Wu Yanni, Zheng Zhenkun
Pervasive computing is one of the hottest research areas in development of information technology. Among the identified key requirements for the software infrastructure of pervasive computing, such as adaptability, configurability, context and environment awareness, we focus the effort of study on the technology of reflection. In this paper, we introduce PURPLE, a reflective middleware platform which is designed and implemented to fit the very requirement of pervasive computing. And a performance analysis is given to evaluate the work.
普适计算是信息技术发展的热点研究领域之一。在已确定的普适计算软件基础设施的关键需求中,如适应性、可配置性、上下文和环境感知,我们重点研究了反射技术。本文介绍了一个为适应普适计算的需要而设计和实现的反射中间件平台PURPLE。并对所做的工作进行了性能分析。
{"title":"PURPLE: a reflective middleware for pervasive computing","authors":"Zhang Kuo, Wang Xiaoge, Wu Yanni, Zheng Zhenkun","doi":"10.1109/ICITA.2005.225","DOIUrl":"https://doi.org/10.1109/ICITA.2005.225","url":null,"abstract":"Pervasive computing is one of the hottest research areas in development of information technology. Among the identified key requirements for the software infrastructure of pervasive computing, such as adaptability, configurability, context and environment awareness, we focus the effort of study on the technology of reflection. In this paper, we introduce PURPLE, a reflective middleware platform which is designed and implemented to fit the very requirement of pervasive computing. And a performance analysis is given to evaluate the work.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"121 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of Two Synaptic Weight Neural Networks for Nonlinear Control 双突触权神经网络在非线性控制中的应用
Wenming Cao, Shoujue Wang
In this paper, adaptive identification and control of nonlinear dynamical systems are investigated using two synaptic weight neural networks (TSWNN). Firstly, a novel approach to train the TWSWNN is introduced, which employs an adaptive fuzzy generalized learning vector quantization (AFGLVQ) technique and recursive least squares algorithm with variable forgetting factor (VRLS). The AFGLVQ adjusts the kernels of the TSWNN while the VRLS updates the connection weights of the network. The identification algorithm has the properties of rapid convergence and persistent adaptability that make it suitable for real-time control. Secondly, on the basis of the one-step ahead TSWNN predictor, the control law is optimized iteratively through a numerical stable Davidon's least squares-based (SDLS) minimization approach. A nonlinear example is simulated to demonstrate the effectiveness of the identification and control algorithms
本文研究了基于双突触权神经网络(TSWNN)的非线性动态系统的自适应辨识与控制问题。首先,介绍了一种新的训练TWSWNN的方法,该方法采用自适应模糊广义学习向量量化(AFGLVQ)技术和可变遗忘因子递归最小二乘(VRLS)算法。AFGLVQ调整TSWNN的核,VRLS更新网络的连接权值。该辨识算法具有快速收敛和持续自适应的特点,适合于实时控制。其次,在提前一步的TSWNN预测器的基础上,通过基于数值稳定的Davidon最小二乘(SDLS)最小化方法对控制律进行迭代优化。通过一个非线性算例的仿真,验证了识别和控制算法的有效性
{"title":"Application of Two Synaptic Weight Neural Networks for Nonlinear Control","authors":"Wenming Cao, Shoujue Wang","doi":"10.1109/ICITA.2005.72","DOIUrl":"https://doi.org/10.1109/ICITA.2005.72","url":null,"abstract":"In this paper, adaptive identification and control of nonlinear dynamical systems are investigated using two synaptic weight neural networks (TSWNN). Firstly, a novel approach to train the TWSWNN is introduced, which employs an adaptive fuzzy generalized learning vector quantization (AFGLVQ) technique and recursive least squares algorithm with variable forgetting factor (VRLS). The AFGLVQ adjusts the kernels of the TSWNN while the VRLS updates the connection weights of the network. The identification algorithm has the properties of rapid convergence and persistent adaptability that make it suitable for real-time control. Secondly, on the basis of the one-step ahead TSWNN predictor, the control law is optimized iteratively through a numerical stable Davidon's least squares-based (SDLS) minimization approach. A nonlinear example is simulated to demonstrate the effectiveness of the identification and control algorithms","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122856889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quad-tree-based image shape coding with block compensation 基于四叉树的图像形状块补偿编码
Lih-Yang Wang, Ching-Hui Lai, Kuan-Ren Pan
Image shape coding is a core technique in MPEG-4. In the paper, we present a quad-tree-based technique for image object shape coding. Quad tree has been used to represent the image content since long time ago, it describes the hierarchy of various sizes of rectangular blocks that collectively constitute the image object area. Quad tree structure can be quite complicate to describe an image object with unsmooth boundary. We propose a block compensation and a run-length scheme to effectively attack the problem. Experimental results show that the algorithm is quite efficient in comparison with other methods.
图像形状编码是MPEG-4的核心技术。本文提出了一种基于四叉树的图像对象形状编码技术。四叉树很早以前就被用来表示图像内容,它描述了不同大小的矩形块的层次结构,这些矩形块共同构成了图像对象区域。用四叉树结构描述具有非光滑边界的图像对象比较复杂。我们提出了一个块补偿和一个运行长度方案来有效地解决这个问题。实验结果表明,与其他方法相比,该算法具有较高的效率。
{"title":"Quad-tree-based image shape coding with block compensation","authors":"Lih-Yang Wang, Ching-Hui Lai, Kuan-Ren Pan","doi":"10.1109/ICITA.2005.227","DOIUrl":"https://doi.org/10.1109/ICITA.2005.227","url":null,"abstract":"Image shape coding is a core technique in MPEG-4. In the paper, we present a quad-tree-based technique for image object shape coding. Quad tree has been used to represent the image content since long time ago, it describes the hierarchy of various sizes of rectangular blocks that collectively constitute the image object area. Quad tree structure can be quite complicate to describe an image object with unsmooth boundary. We propose a block compensation and a run-length scheme to effectively attack the problem. Experimental results show that the algorithm is quite efficient in comparison with other methods.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122993470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Third International Conference on Information Technology and Applications (ICITA'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1