Search results for "Algorithm"
showing 10 items of 4887 documents
Splines Computation by Subdivision
2015
In this chapter, fast stable algorithms are presented, which compute splines’ values at dyadic and triadic rational points starting from their samples at integer grid points. The algorithms are implemented by the causal-anticausal recursive filtering of initial data samples, which is followed by iterated application of FIR filters. Extension of the algorithms to the multidimensional case is straightforward. A natural application of the presented subdivision algorithms is for upsampling of signals and images. A few upsampling examples are provided.
Non-periodic Discrete-Spline Wavelets
2015
This chapter describes wavelet analysis in the spaces of discrete splines whose spans are powers of 2. This wavelet analysis is similar to wavelet analysis in the polynomial-spline spaces. The transforms are based on relations between exponential discrete splines from different resolution scales. Generators of discrete-spline wavelet spaces are described. The discrete-spline wavelet transforms generate wavelet transforms in signal space. Practically, wavelet transforms of signals are implemented by multirate filtering of signals by two-channel filter banks with the downsampling factor 2 (critically sampled filter banks). The filtering implementation is accelerated by switching to the polyph…
A new tool for evaluating and/or selecting analytical methods: Summarizing the information in a hexagon
2019
Abstract A quantitative evaluation tool is proposed, which aims to assess optimal selection or/and testing of analytical methods. Objective criteria related to analytical performance, sustainability, environmental impact and economic cost are evaluated through the definition of penalty points divided into five different blocks, namely, figures of merit, toxicity and safety, residues, carbon footprint and economic cost. For each block, the overall qualification is scaled from 0 to 4 and it is depicted on a regular hexagonal pictogram that allows a user friendly comparison of analytical procedures. The present evaluation tool aims to be a guideline for evaluating and/or selecting analytical p…
Peptide classification using optimal and information theoretic syntactic modeling
2010
Accepted version of an article published in the journal: Pattern Recognition. Published version available on Sciverse: http://dx.doi.org/10.1016/j.patcog.2010.05.022 We consider the problem of classifying peptides using the information residing in their syntactic representations. This problem, which has been studied for more than a decade, has typically been investigated using distance-based metrics that involve the edit operations required in the peptide comparisons. In this paper, we shall demonstrate that the Optimal and Information Theoretic (OIT) model of Oommen and Kashyap [22] applicable for syntactic pattern recognition can be used to tackle peptide classification problem. We advoca…
Imposing tree-based topologies onto self organizing maps
2011
Accepted version of an article from the journal Information Sciences. Definitive published version available on Elsevier Science Direct: http://dx.doi.org/10.1016/j.ins.2011.04.038 The beauty of the Kohonen map is that it has the property of organizing the codebook vectors, which represent the data points, both with respect to the underlying distribution and topologically. This topology is traditionally linear, even though the underlying lattice could be a grid, and this has been used in a variety of applications [23,35,40]. The most prominent efforts to render the topology to be structured involves the Evolving Tree (ET) due to Pakkanen et al. [36], and the Self-Organizing Tree Maps (SOTM)…
Generalized Bayesian pursuit: A novel scheme for multi-armed Bernoulli bandit problems
2011
Published version of a chapter in the book: IFIP Advances in Information and Communication Technology. Also available from the publisher at: http;//dx.doi.org/10.1007/978-3-642-23960-1_16 In the last decades, a myriad of approaches to the multi-armed bandit problem have appeared in several different fields. The current top performing algorithms from the field of Learning Automata reside in the Pursuit family, while UCB-Tuned and the ε -greedy class of algorithms can be seen as state-of-the-art regret minimizing algorithms. Recently, however, the Bayesian Learning Automaton (BLA) outperformed all of these, and other schemes, in a wide range of experiments. Although seemingly incompatible, in…
Statistical Modeling and Analysis of Mobile-to-Mobile Fading Channels in Cooperative Networks Under Line-of-Sight Conditions
2009
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Springerlink. http://dx.doi.org/10.1007/s11277-009-9721-4 Recently, mobile-to-mobile (M2M) cooperative network technology has gained considerable attention for its promise of enhanced system performance with increased mobility support. As this is a new research field, little is known about the statistical properties of M2M fading channels in cooperative networks. So far, M2M fading channels have mainly been modeled under the assumption of non-line-of-sight (NLOS) conditions. In this paper, we propose a new model for M2M fading channels in amplify-and-forward relay lin…
Performance Analysis of Alamouti Coded OFDM Systems over Rayleigh Fading Channels Correlated in Space and Time
2010
Paper presented at the 2010 IEEE 71st Vehicular Technology Conference, Taipei.(c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/VETECS.2010.5493855 This paper deals with the performance analysis of Alamouti coded orthogonal frequency division multiplexing (OFDM) systems over time-varying multipath Rayleigh fading channels. I…
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
Fuzzy Investment Portfolio Selection Models Based on Interval Analysis Approach
2012
Published version of an article from the journal: Mathematical Problems in Engineering. Also available from the publisher:http://dx.doi.org/10.1155/2012/628295 This paper employs fuzzy set theory to solve the unintuitive problem of the Markowitz mean-variance (MV) portfolio model and extend it to a fuzzy investment portfolio selection model. Our model establishes intervals for expected returns and risk preference, which can take into account investors' different investment appetite and thus can find the optimal resolution for each interval. In the empirical part, we test this model in Chinese stocks investment and find that this model can fulfill different kinds of investors' objectives. Fi…