... Corporation
EURASIP Journal on Advances in Signal Processing
Volume 2008, Article ID 935907, 10 pages
doi:10.1155/2008/935907
Research Article
Cardiac Arrhythmias Classification Method Based on MUSIC,
Morphological ... ECG
beat classification by a novel hybrid neural network (NHNN)
[9]; integration of independent component analysis and
neural networks for ECG bea...
... image
compression method based on classified energy and pattern
blocks: initial results,” in Proceedings of the 25th International
Symposium on Computer and Information Sciences, 2010.
[55] A. N. Akansu and ... novel image compression method based on generation of the so-called classified energy and pattern blocks (CEPB)
is introduced and evaluation results are presented...
... Computational complexity of crosstalk cancellation filter
estimation for the three methods: the least-squares method, the
single-filter structure method, and the CAPZ method.
Method Computation cost ... cancellation filter is designed based on the CAPZ
model. Since the CAPZ model has advantages in storage and
computation, the proposed method is more efficient than
conventional ones....
... need only one direction code for one crack
line. On the other hand, as a crack line is an 8-connection
component, we cannot use a 4-direction encoding strategy,
for example, the 4-direction Freeman ... severity information. Considering the spatial
connectivity and directional consistency, Javidi et al. [20]
approached the pavement crack detection and classification
by a combination use...
... Corporation
EURASIP Journal on Wireless Communications and Networking
Volume 2011, Article ID 259253, 16 pages
doi:10.1155/2011/259253
Research Article
QoS-Guaranteed Power Control Mechanism Based on
the Frame ... derived from [8, 20] for configuration with one
transmitting antenna and varies between 25.8% and 27.6%
depending on the selected bandwidth.
The system model cont...
... the optimal decomposition and reconstruction QMF pair for length M = 6andM = 8.
n
QMF of length
= 6QMFoflength= 8
Decomposition Reconstruction Decomposition Reconstruction
h[n]g[n] h
1
[n]g
1
[n] ... representation
of QMF bank [14, 15], the constrained optimization problem
(31) is converted into an unconstrained one. The use of
lattice QMF representation for converting the constrained
optim...
... Transactions
on Information Forensics and Security, vol. 4, no. 3, pp. 318–
329, 2009.
[7] D. Boneh and J. Shaw, “Collusion-secure fingerprinting for
digital data,” IEEE Tr ansactions on Information ... collusion attack and is further distorted by other
attacks such as addition of noise and lossy compression.
The addition of noise and lossy compression distort the
whole attacked...
... described in
Section 2. We examine the effect of these schemes on energy
consumption and network lifetime by incorporating a link
quality metric and the communication load distribution
based on the empirical ... in
Section 6. Finally, concluding remarks and future research
directions are presented in Section 7.
2. Localized Tree Construction Schemes
Data-gathering path can be sel...
... alloca-
tion schemes. For transmission power among nodes, we
employed the two power control schemes introduced in
Section 4, and also uniform power transmission among
relays, that is, P
1
= P/2andP
2,r
= ... command “fmincon” designed to find the minimum
of the given constrained nonlinear multivariable function.
Figure 6 demonstrates that using the power control schemes
of Section 5, about 1...
... multiplications are needed. Therefore 9.51
×10
6
real additions and 12.8 ×10
6
real multiplications are needed
totally. Computation burden is reduced to one fiftieth of
conventional method.
7. Conclusions
In ... acquisition system.
As contrast, conventional acquisition methods are used in
simulation. GPS signal is based on signal model (6). Data
length of conventional algorithm is 0.4...