期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Linear Prolate Functions for Signal Extrapolation with Time Shift
1
作者 Daniela Valente Michael Cada Jacek Ilow 《Applied Mathematics》 2017年第4期417-427,共11页
We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear... We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series. 展开更多
关键词 real-valued BAND LIMITED EIGENVECTORS SIGNAL Decomposition SIGNAL EXTRAPOLATION
下载PDF
Hybrid Methodology for Structural Health Monitoring Based on Immune Algorithms and Symbolic Time Series Analysis
2
作者 Rongshuai Li Akira Mita Jin Zhou 《Journal of Intelligent Learning Systems and Applications》 2013年第1期48-56,共9页
This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and ... This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise. 展开更多
关键词 Structural Health Monitoring Adaptive IMMUNE CLONAL SELECTION Algorithm SYMBOLIC Time Series Analysis real-valued Negative SELECTION Building Structures
下载PDF
Image Encryption Algorithm Based on Compressive Sensing and Fractional DCT via Polynomial Interpolation
3
作者 Ya-Ru Liang Zhi-Yong Xiao 《International Journal of Automation and computing》 EI CSCD 2020年第2期292-304,共13页
Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomp... Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm. 展开更多
关键词 Compressive sensing FRACTIONAL discrete COSINE transform(DCT)via polynomial interpolation image encryption threedimensional PIECEWISE and nonlinear chaotic maps real-valued output
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部