... Journal on Advances in Signal Processing
Volume 2009, Article ID 646975, 7 pages
doi:10.1155/2009/646975
Research Article
Cellular Neural Networks for NP-Hard Optimization
M
´
aria Ercsey-Ravasz,
1
Tam
´
as ... computing, for example,
is theoretically well suited for solving NP-hard problems,
but the technical realization of quantum computers seems
to be quite hard. Here...
... on Image and Video Processing
Volume 2008, Article ID 195743, 10 pages
doi:10.1155/2008/195743
Research Article
Anthropocentric Video Segmentation for Lecture Webcasts
Gerald Friedland
1
and ... metric for image retrieval,” International Journal
of Computer Vision, vol. 40, no. 2, pp. 99–121, 2000.
[50] Microsoft Research, “Microsoft Foreground Extraction
Benchmark Dataset,” 2004,...
... growing algorithm for designing
artificial neural networks, ” IEEE Transactions on Systems, Man,
and Cybernetics B, vol. 39, no. 3, pp. 705–722, 2009.
[14] T. Masters, PracticalNeuralNetworks,AcademicPress,New
York, ... Cichocki and R. Unbehauen, Neural Networks for Optimiza-
tion and Signal Processing, John Wiley & Sons, New York, NY,
USA, 1992.
[16] J. A. Freeman and D. M. Ska...
... Networking
Volume 2010, Article ID 435189, 11 pages
doi:10.1155/2010/435189
Research Article
A Fluid Model for Perfor mance Analysis in Cellular Networks
Jean-Marc Kelif,
1
Marceau Coupechoux,
2
and Philipp ... closed-form formula
is a very good approximation, even for the traditional
hexagonal network. The simplicity of the result allows a
spatial integration of the OCIF leadin...
... Processing
Volume 2009, Article ID 727196, 14 pages
doi:10.1155/2009/727196
Research Article
Downlink Resource Allocation for Autonomous
Infrastructure-based Multihop Cellular Networks
Mahdi Shabany
1
and ... the local need for the capacity
increase [11]. Therefore, in this paper, we focus on Type II
multihop cellular networks.
When it comes to the utilized spectrum, multiho...
... that we can perform using
the techniques proposed here.
We give here an upper bound for the bigger integer that
can be encrypted, that forces us to select an appropriate pa-
rameter s for the Damg
˚
ard-Jurik ... the final protocol for a mul-
tilayer feedforward neural network whose neurons use the
threshold as activation function. The privacy preserving per-
ceptron protocol presented...
... Processing
Volume 2007, Article ID 35641, 20 pages
doi:10.1155/2007/35641
Research Article
Lossless Compression Schemes for ECG Signals Using
Neural Network Predictors
R. Kannan and C. Eswaran
Center for Multimedia ... entropy encoders for com-
pressing the prediction residues in the second stage has not
been implemented yet. We propose for the first time, com-
pression schemes...
... improvement was considered for the original
EVESPA. As expected, the performance of the proposed
procedure is at its worse for low values of M and G where it is
slightly outperformed by the original ... column. Therefore, the
columns of E
−†
H
= QZ match those of Q to within scale and
permutation and a straightforward estimation of B becomes
B = E
s
Q = E
s
E
−†
H
.
(15)
4. Performanc...
... Corporation
Journal of Inequalities and Applications
Volume 2011, Article ID 434175, 7 pages
doi:10.1155/2011/434175
Research Article
Strong Converse Inequality for
a Spherical Operator
Shaobo Lin and Feilong ... p<∞.
1.3
In the following, L
p
d−1
will always be one of the spaces L
p
d−1
for 1 ≤ p<∞,orC
d−1
for p ∞.
For an arbitrary number θ,0<θ<π, we...
... Corporation
Fixed Point Theory and Applications
Volume 2011, Article ID 701519, 30 pages
doi:10.1155/2011/701519
Research Article
Solvability and Algorithms for
Functional Equations Originating
from Dynamic ... true for n 1. Therefore 3.64 holds for each n ≥ 0. Given k ∈ N,
note that lim
n →∞
ψϕ
n
k exists. It follows that there exist constants M>0andn
0
∈ N
satisfying...