136,183 research outputs found
A Novel Data Association Algorithm for Unequal Length Fluctuant Sequence
AbstractThere are quantities of such sensors as radar, ESM, navigator in aerospace areas and the sequence data is the most ordinary data in sensor domain. How to mine the information of these data has attracted a great interest in data mining. But sequence data is easily interfered and produces some fluctuant points. When dealing with these sequences, traditional sequence similarity measurement such as Euclidean distance arises large error, especially for unequal length fluctuant sequence. A novel average weight 1-norm unequal length fluctuant sequence similarity measurement algorithm based on dynamic time warping (DTW) is proposed to solve this problem. It constructs an absolute distance matrix based on DTW firstly, then weight average weight 1-norm and modify it with modifying factor to measure the distance of unequal length fluctuant sequence. It solves the fluctuation sensitivity of maximum distance measurement algorithm. Finally transform distance to similarity as the index of the association, associate the sequence data according to the maximum similarity association rule. Simulation results show the effectiveness of the proposed algorithm when associating unequal length fluctuant sequence, association rate is above 70% and simulate the effect of variation of the sequence length, fluctuant rate and processing time to the proposed algorithm
Simple Rate-1/3 Convolutional and Tail-Biting Quantum Error-Correcting Codes
Simple rate-1/3 single-error-correcting unrestricted and CSS-type quantum
convolutional codes are constructed from classical self-orthogonal
\F_4-linear and \F_2-linear convolutional codes, respectively. These
quantum convolutional codes have higher rate than comparable quantum block
codes or previous quantum convolutional codes, and are simple to decode. A
block single-error-correcting [9, 3, 3] tail-biting code is derived from the
unrestricted convolutional code, and similarly a [15, 5, 3] CSS-type block code
from the CSS-type convolutional code.Comment: 5 pages; to appear in Proceedings of 2005 IEEE International
Symposium on Information Theor
Gait recognition based on shape and motion analysis of silhouette contours
This paper presents a three-phase gait recognition method that analyses the spatio-temporal shape and dynamic motion (STS-DM) characteristics of a human subject’s silhouettes to identify the subject in the presence of most of the challenging factors that affect existing gait recognition systems. In phase 1, phase-weighted magnitude spectra of the Fourier descriptor of the silhouette contours at ten phases of a gait period are used to analyse the spatio-temporal changes of the subject’s shape. A component-based Fourier descriptor based on anatomical studies of human body is used to achieve robustness against shape variations caused by all common types of small carrying conditions with folded hands, at the subject’s back and in upright position. In phase 2, a full-body shape and motion analysis is performed by fitting ellipses to contour segments of ten phases of a gait period and using a histogram matching with Bhattacharyya distance of parameters of the ellipses as dissimilarity scores. In phase 3, dynamic time warping is used to analyse the angular rotation pattern of the subject’s leading knee with a consideration of arm-swing over a gait period to achieve identification that is invariant to walking speed, limited clothing variations, hair style changes and shadows under feet. The match scores generated in the three phases are fused using weight-based score-level fusion for robust identification in the presence of missing and distorted frames, and occlusion in the scene. Experimental analyses on various publicly available data sets show that STS-DM outperforms several state-of-the-art gait recognition methods
Code generator matrices as RNG conditioners
We quantify precisely the distribution of the output of a binary random
number generator (RNG) after conditioning with a binary linear code generator
matrix by showing the connection between the Walsh spectrum of the resulting
random variable and the weight distribution of the code. Previously known
bounds on the performance of linear binary codes as entropy extractors can be
derived by considering generator matrices as a selector of a subset of that
spectrum. We also extend this framework to the case of non-binary codes
A Fusion Framework for Camouflaged Moving Foreground Detection in the Wavelet Domain
Detecting camouflaged moving foreground objects has been known to be
difficult due to the similarity between the foreground objects and the
background. Conventional methods cannot distinguish the foreground from
background due to the small differences between them and thus suffer from
under-detection of the camouflaged foreground objects. In this paper, we
present a fusion framework to address this problem in the wavelet domain. We
first show that the small differences in the image domain can be highlighted in
certain wavelet bands. Then the likelihood of each wavelet coefficient being
foreground is estimated by formulating foreground and background models for
each wavelet band. The proposed framework effectively aggregates the
likelihoods from different wavelet bands based on the characteristics of the
wavelet transform. Experimental results demonstrated that the proposed method
significantly outperformed existing methods in detecting camouflaged foreground
objects. Specifically, the average F-measure for the proposed algorithm was
0.87, compared to 0.71 to 0.8 for the other state-of-the-art methods.Comment: 13 pages, accepted by IEEE TI
MacWilliams Identities for Terminated Convolutional Codes
Shearer and McEliece [1977] showed that there is no MacWilliams identity for
the free distance spectra of orthogonal linear convolutional codes. We show
that on the other hand there does exist a MacWilliams identity between the
generating functions of the weight distributions per unit time of a linear
convolutional code C and its orthogonal code C^\perp, and that this
distribution is as useful as the free distance spectrum for estimating code
performance. These observations are similar to those made recently by
Bocharova, Hug, Johannesson and Kudryashov; however, we focus on terminating by
tail-biting rather than by truncation.Comment: 5 pages; accepted for 2010 IEEE International Symposium on
Information Theory, Austin, TX, June 13-1
- …