Search results for "computer.file_format"
showing 10 items of 214 documents
Binarization of a super-resolving graytone pupil filter by digital halftoning
1995
— Six digital-halftoning procedures, including one algorithm proposed by us, are compared to determine which one is best suited to binarization of a parabolic super-resolving pupil filter. The procedures we deal with include iterative, error-diffusion, error-convergence, and 1-pixel algorithms. We carry out a numerically simulated experiment in which an object that consists of either one point source or two coherent point sources is imaged in a 4f imaging system with either a continuous super-resolving parabolic filter or one of its six different binary versions. The performance of binary filters is examined in terms of two parameters: the resemblance of their amplitude impulse response (AI…
On Unstructured File Sharing Networks
2007
We study the interaction among users of unstructured file sharing applications, who compete for available network resources (link bandwidth or capacity) by opening multiple connections on multiple paths so as to accelerate data transfer. We model this interaction with an unstructured file sharing game. Users are players and their strategies are the numbers of sessions on available paths. We consider a general bandwidth sharing framework proposed by Kelly [1] and Mo and Walrand [2], with TCP as a special case. Furthermore, we incorporate the Tit-for-Tat strategy (adopted by BitTorrent [3] networks) into the unstructured file sharing game to model the competition in which a connection can be …
A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning
2019
Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…
Analysis of the Effect of Human Presence on a Wireless Sensor Network
2011
Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…
Multi-dimensional pattern matching with dimensional wildcards
1995
We introduce a new multi-dimensional pattern matching problem, which is a natural generalization of the on-line search in string matching. We are given a text matrix A[1: n1, ..., 1:n d ] of size N= n1×n2×...×n d , which we may preprocess. Then, we are given, online, an r-dimensional pattern matrix B[1:m1,...,1:m r ] of size M= m1×m2×...×m r , with 1≤r≤d. We would like to know whether B*=B*[*, 1:m1,*, ...,1: mr, *] occurs in A, where * is a dimensional wildcard such that B* is any d-dimensional matrix having size 1 × ... × m1×...1×m r ×...1 and containing the same elements as B. Notice that there might be (d/r)≤2d occurrences of B* for each position of A. We give CRCW-PRAM algorithms for pr…
Terrain data compression using wavelet-tiled pyramids for online 3D terrain visualization
2013
Last years have witnessed the widespread use of online terrain visualization applications. However, the significant improvements achieved in sensing technologies have allowed an increasing size of the terrain databases. These increasing sizes represent a serious drawback when terrain data must be transmitted and rendered at interactive rates. In this paper, we propose a novel wavelet-tiled pyramid for compressing terrain data that replaces the traditional multiresolution pyramid usually used in wavelet compression schemes. The new wavelet-tiled pyramid modifies the wavelet analysis and synthesis processes, allowing an efficient transmission and reconstruction of terrain data in those applic…
Modified morphological correlation based on bit-map representations.
1999
Pattern recognition with high discrimination can be achieved with a morphological correlator. A modification of this correlator is carried out by use of a binary slicing process instead of linear thresholding. Although the obtained correlation result is not identical to the conventional morphological correlation, it requires fewer calculations and provides even higher discrimination. Two optical experimental implementations of this modified morphological correlator as well as some experimental results are shown.
Perceptually weighted optical flow for motion-based segmentation in MPEG-4 paradigm
2000
In the MPEG-4 paradigm, the sequence must be described in terms of meaningful objects. This meaningful, high-level representation should emerge from low-level primitives such as optical flow and prediction error which are the basic elements of previous-generation video coders. The accuracy of the high-level models strongly depends on the robustness of the primitives used. It is shown how perceptual weighting in optical flow computation gives rise to better motion estimates which consistently improve motion-based segmentation compared to equivalent unweighted motion estimates.
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
RDF-Based Web Information Integration System: A Travel System Use Case
2018
Enterprises are continually faced with the challenge of integrating heterogeneous systems with incompatible interfaces, data structures (Source structured relational databases, semi-structured sources, XML, or unstructured documents: texts), access mode and technologies. When companies adopt SOA (Service Oriented Architecture), that provides an alternative to traditional design of applications by allowing a designer to assemble and compose existing services that implement the functions of a given application domain, they realize that there is a significant risk that Web services only do not solve the problem of compatibility in the data. Our paper gives a solution to these issues by setting…