We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear...We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series.展开更多
This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and ...This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise.展开更多
Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomp...Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm.展开更多
文摘We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series.
文摘This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise.
基金supported by National Natural Science Foundation of China(Nos.61662047 and 61462061).
文摘Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm.