Search results for "Algorithm"

showing 10 items of 4887 documents

Splines Computation by Subdivision

2015

In this chapter, fast stable algorithms are presented, which compute splines’ values at dyadic and triadic rational points starting from their samples at integer grid points. The algorithms are implemented by the causal-anticausal recursive filtering of initial data samples, which is followed by iterated application of FIR filters. Extension of the algorithms to the multidimensional case is straightforward. A natural application of the presented subdivision algorithms is for upsampling of signals and images. A few upsampling examples are provided.

UpsamplingBox splineFinite impulse responseComputer scienceIterated functionbusiness.industryComputationExtension (predicate logic)businessAlgorithmInteger gridSubdivision
researchProduct

Non-periodic Discrete-Spline Wavelets

2015

This chapter describes wavelet analysis in the spaces of discrete splines whose spans are powers of 2. This wavelet analysis is similar to wavelet analysis in the polynomial-spline spaces. The transforms are based on relations between exponential discrete splines from different resolution scales. Generators of discrete-spline wavelet spaces are described. The discrete-spline wavelet transforms generate wavelet transforms in signal space. Practically, wavelet transforms of signals are implemented by multirate filtering of signals by two-channel filter banks with the downsampling factor 2 (critically sampled filter banks). The filtering implementation is accelerated by switching to the polyph…

UpsamplingSpline (mathematics)WaveletComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMathematicsofComputing_NUMERICALANALYSISWavelet transformPolyphase systemData_CODINGANDINFORMATIONTHEORYFilter (signal processing)AlgorithmComputingMethodologies_COMPUTERGRAPHICSExponential function
researchProduct

A new tool for evaluating and/or selecting analytical methods: Summarizing the information in a hexagon

2019

Abstract A quantitative evaluation tool is proposed, which aims to assess optimal selection or/and testing of analytical methods. Objective criteria related to analytical performance, sustainability, environmental impact and economic cost are evaluated through the definition of penalty points divided into five different blocks, namely, figures of merit, toxicity and safety, residues, carbon footprint and economic cost. For each block, the overall qualification is scaled from 0 to 4 and it is depicted on a regular hexagonal pictogram that allows a user friendly comparison of analytical procedures. The present evaluation tool aims to be a guideline for evaluating and/or selecting analytical p…

User FriendlyComputer scienceHexagonal crystal system010401 analytical chemistry01 natural sciencesPictogramIndustrial engineering0104 chemical sciencesAnalytical ChemistryEconomic costLine (geometry)Carbon footprintSpectroscopySelection (genetic algorithm)Block (data storage)TrAC Trends in Analytical Chemistry
researchProduct

Peptide classification using optimal and information theoretic syntactic modeling

2010

Accepted version of an article published in the journal: Pattern Recognition. Published version available on Sciverse: http://dx.doi.org/10.1016/j.patcog.2010.05.022 We consider the problem of classifying peptides using the information residing in their syntactic representations. This problem, which has been studied for more than a decade, has typically been investigated using distance-based metrics that involve the edit operations required in the peptide comparisons. In this paper, we shall demonstrate that the Optimal and Information Theoretic (OIT) model of Oommen and Kashyap [22] applicable for syntactic pattern recognition can be used to tackle peptide classification problem. We advoca…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 4220206 medical engineeringSequence alignment02 engineering and technologySyntactic pattern recognitionInformation theorySubstitution matrix03 medical and health sciencesArtificial IntelligenceVDP::Medical disciplines: 700::Basic medical dental and veterinary science disciplines: 710::Medical molecular biology: 711030304 developmental biologyMathematicsProbability measure0303 health sciencesbusiness.industryPattern recognitionSimilitudeSupport vector machineSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessClassifier (UML)Algorithm020602 bioinformaticsSoftware
researchProduct

Imposing tree-based topologies onto self organizing maps

2011

Accepted version of an article from the journal Information Sciences. Definitive published version available on Elsevier Science Direct: http://dx.doi.org/10.1016/j.ins.2011.04.038 The beauty of the Kohonen map is that it has the property of organizing the codebook vectors, which represent the data points, both with respect to the underlying distribution and topologically. This topology is traditionally linear, even though the underlying lattice could be a grid, and this has been used in a variety of applications [23,35,40]. The most prominent efforts to render the topology to be structured involves the Evolving Tree (ET) due to Pakkanen et al. [36], and the Self-Organizing Tree Maps (SOTM)…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422VDP::Mathematics and natural science: 400::Mathematics: 410::Topology/geometry: 415
researchProduct

Generalized Bayesian pursuit: A novel scheme for multi-armed Bernoulli bandit problems

2011

Published version of a chapter in the book: IFIP Advances in Information and Communication Technology. Also available from the publisher at: http;//dx.doi.org/10.1007/978-3-642-23960-1_16 In the last decades, a myriad of approaches to the multi-armed bandit problem have appeared in several different fields. The current top performing algorithms from the field of Learning Automata reside in the Pursuit family, while UCB-Tuned and the ε -greedy class of algorithms can be seen as state-of-the-art regret minimizing algorithms. Recently, however, the Bayesian Learning Automaton (BLA) outperformed all of these, and other schemes, in a wide range of experiments. Although seemingly incompatible, in…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422VDP::Technology: 500::Information and communication technology: 550Bandit problems estimator algorithms general Bayesian pursuit algorithm Beta distribution conjugate priors
researchProduct

Statistical Modeling and Analysis of Mobile-to-Mobile Fading Channels in Cooperative Networks Under Line-of-Sight Conditions

2009

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Springerlink. http://dx.doi.org/10.1007/s11277-009-9721-4 Recently, mobile-to-mobile (M2M) cooperative network technology has gained considerable attention for its promise of enhanced system performance with increased mobility support. As this is a new research field, little is known about the statistical properties of M2M fading channels in cooperative networks. So far, M2M fading channels have mainly been modeled under the assumption of non-line-of-sight (NLOS) conditions. In this paper, we propose a new model for M2M fading channels in amplify-and-forward relay lin…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Computer sciencebusiness.industryStatistical modelData_CODINGANDINFORMATIONTHEORYComputer Science Applicationslaw.inventionsymbols.namesakeFading distributionRelaylawChannel state informationMobile stationVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552symbolsComputer Science::Networking and Internet ArchitectureFadingElectrical and Electronic EngineeringRayleigh scatteringTelecommunicationsbusinessAlgorithmCommunication channelComputer Science::Information Theory
researchProduct

Performance Analysis of Alamouti Coded OFDM Systems over Rayleigh Fading Channels Correlated in Space and Time

2010

Paper presented at the 2010 IEEE 71st Vehicular Technology Conference, Taipei.(c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/VETECS.2010.5493855 This paper deals with the performance analysis of Alamouti coded orthogonal frequency division multiplexing (OFDM) systems over time-varying multipath Rayleigh fading channels. I…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Multipath rayleigh fading channelComputer scienceOrthogonal frequency-division multiplexingData_CODINGANDINFORMATIONTHEORYSpace (mathematics)Expression (mathematics)Signal-to-noise ratioVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Computer Science::Networking and Internet ArchitectureElectronic engineeringFadingAlgorithmComputer Science::Information TheoryRayleigh fadingCommunication channel
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

Fuzzy Investment Portfolio Selection Models Based on Interval Analysis Approach

2012

Published version of an article from the journal: Mathematical Problems in Engineering. Also available from the publisher:http://dx.doi.org/10.1155/2012/628295 This paper employs fuzzy set theory to solve the unintuitive problem of the Markowitz mean-variance (MV) portfolio model and extend it to a fuzzy investment portfolio selection model. Our model establishes intervals for expected returns and risk preference, which can take into account investors' different investment appetite and thus can find the optimal resolution for each interval. In the empirical part, we test this model in Chinese stocks investment and find that this model can fulfill different kinds of investors' objectives. Fi…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Actuarial scienceArticle SubjectComputer scienceInvestment strategyApplication portfolio managementGeneral Mathematicslcsh:MathematicsGeneral EngineeringBlack–Litterman modellcsh:QA1-939VDP::Social science: 200::Economics: 210::Econometrics: 214lcsh:TA1-2040Return on investmentEconometricsPost-modern portfolio theoryPortfolio optimizationlcsh:Engineering (General). Civil engineering (General)Investment performanceSelection (genetic algorithm)Mathematical Problems in Engineering
researchProduct