卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.
上传时间: 2017-08-29
上传用户:thinode
Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.
标签: investigated Abstract-In autonomous resistors
上传时间: 2014-06-09
上传用户:h886166
Behavioral models are used in games and computer graphics for realistic simulation of massive crowds. In this paper, we present a GPU based implementation of Reynolds [1987] algorithm for simulating flocks of birds and propose an extension to consider environment self occlusion. We performed several experiments and the results showed that the proposed approach runs up to three times faster than the original algorithm when simulating high density crowds, without compromising significantly the original crowd behavior.
标签: Behavioral simulation realistic computer
上传时间: 2017-09-08
上传用户:hanli8870
Commercially available active noise control headphones rely on fixed analog controllers to drive "anti-noise" loudspeakers. Our design uses an adaptive controller to optimally cancel unwanted acoustic noise. This headphone would be particularly useful for workers who operate or work near heavy machinery and engines because the noise is selectively eliminated. Desired sounds, such as speech and warning signals, are left to be heard clearly. The adaptive control algorithm is implemented on a Texas Instruments (TI™ ) 1 TMS320C30GEL digital signal processor (DSP), which drives a Sony CD550 headphone/microphone system. Our experiments indicate that adaptive noise control results in a dramatic improvement in performance over fixed noise control. This improvement is due to the availability of high-performance programmable DSPs and the self-optimizing and tracking capabilities of the adaptive controller in response to the surrounding noise.
标签: Commercially controllers headphones available
上传时间: 2013-12-04
上传用户:dyctj
Here an embedded System-on-Chip is build, in an Xilinx Spartan-3 FPGA with Microblaze as the processor.A PLB core System is made with the VGA IP core attached to it. The software written for the MicroBlaze processor specifies the object, the color and the movement of the display. The functionality of the module is verified by implementation on Spartan 3.
标签: System-on-Chip Microblaze embedded Spartan
上传时间: 2013-12-20
上传用户:上善若水
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but computational capability as well. The self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. Because of this characteristic, smart cards are often used in different applications which require strong security protection and authentication.
标签: card intelligent Overview Security
上传时间: 2017-09-25
上传用户:busterman
as a message came into prominence with the publication in 1948 of an influential paper by Claude Shannon, "A Mathematical Theory of Communication." This paper provides the foundations of information theory and endows the word information not only with a technical meaning but also a measure. If the sending device is equally likely to send any one of a set of N messages, then the preferred measure of "the information produced when one message is chosen from the set" is the base two logarithm of N (This measure is called self-information). In this paper, Shannon cont
标签: influential publication prominence message
上传时间: 2014-01-21
上传用户:2404
Among the many features built into Microchip’sEnhanced FLASH Microcontroller devices is the capability of the program memory to self-program. This very useful feature has been deliberately included to give the user the ability to perform bootloading operations.Devices like the PIC18F452 are designed with a designated“boot block”, a small section of protectable program memory allocated specifically for bootload firmware.
上传时间: 2015-03-05
上传用户:rfvrfv
Among the many features built into Microchip’sEnhanced FLASH Microcontroller devices is the capability of the program memory to self-program. This very useful feature has been deliberately included to give the user the ability to perform bootloading operations.Devices like the PIC18F452 are designed with a designated“boot block”, a small section of protectable program memory allocated specifically for bootload firmware.
上传时间: 2015-03-05
上传用户:rfvrfv
一个自适应控制方面的资料
标签: matlab
上传时间: 2015-03-16
上传用户:jingchao