In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local scaling heuristic strategy, then optimize a pair of nonparallel hyperplanes through two smaller sized support vector machine (SVM)-typed problems. In the prediction stage, BDTWSVMs assign to the class label depending on the kernel density degree-based distances from each test point to the two hyperplanes. BDTWSVMs not only inherit good properties from twin support vector machines (TWSVMs) but also give good description for data points. The experimental results on toy as well as publicly available datasets indicate that BDTWSVMs compare favorably with classical SVMs and TWSVMs in terms of generalization
標(biāo)簽: recognition Bi-density machines support pattern vector twin for
上傳時(shí)間: 2019-06-09
上傳用戶(hù):lyaiqing
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
標(biāo)簽: Fundamental Limits Secure Class on of
上傳時(shí)間: 2020-01-04
上傳用戶(hù):kddlas
The contemporary view of the Smart City is very much static and infrastructure- centric, focusing on installation and subsequent management of Edge devices and analytics of data provided by these devices. While this still allows a more efficient management of the city’s infrastructure, optimizations and savings in different do- mains, the existing architectures are currently designed as single-purpose, vertically siloed solutions. This hinders active involvement of a variety of stakeholders (e.g., citizens and businesses) who naturally form part of the city’s ecosystem and have an inherent interest in jointly coordinating and influencing city-level activities.
標(biāo)簽: Internet Systems Cities People Things Smart The and of
上傳時(shí)間: 2020-05-26
上傳用戶(hù):shancjb
The telecommunications industry has seen a rapid boost within the last decade. New realities and visions of functionalities in various telecommunications networks have brought forward the concept of next-generation networks (NGNs). The competitions among operators for support- ing various services, lowering of the cost of having mobile and cellular phones and smartphones, increasing demand for general mobility, explosion of digital traffic, and advent of convergence network technologies added more dynamism in the idea of NGNs. In fact, facilitating con- vergence of networks and convergence of various types of services is a significant objective of NGN
標(biāo)簽: Next-Generation Converged Building Networks
上傳時(shí)間: 2020-05-26
上傳用戶(hù):shancjb
The General Packet Radio Service (GPRS) allows an end user to send and receive data in packet transfer mode within a public land mobile network (PLMN) without using a permanent connection between the mobile station (MS) and the external network during data transfer. This way, GPRS opti- mizes the use of network and radio resources (RRs) since, unlike circuit- switched mode, no connection between the MS and the external network is established when there is no data flow in progress. Thus, this RR optimiza- tion makes it possible for the operator to offer more attractive fees.
上傳時(shí)間: 2020-05-27
上傳用戶(hù):shancjb
Communication, a word that many associate with modern technology, actually has nothing to do with technology. At its core, communication involves nothing more than the spoken or written word, and symbolic languages like art and music. Technology has become synonymous with communication because technology has historically been the method by which communication to or by the general population takes place.
標(biāo)簽: Implementing 802.11
上傳時(shí)間: 2020-05-27
上傳用戶(hù):shancjb
In general there are three different techniques for performance evaluation of systems and networks: mathematical analysis, measurements, and computer simulation. All these techniques have their strength and weaknesses. In the literature there are plenty of discussions about when to use which technique, how to apply it, and which pitfalls are related to which evaluation technique.
標(biāo)簽: Simulation Modeling Network Tools and for
上傳時(shí)間: 2020-05-31
上傳用戶(hù):shancjb
Mobile wireless communications are in constant evolution due to the continu- ously increasing requirements and expectations of both users and operators. Mass multimedia* services have been for a long time expected to generate a large amount of data traffic in future wireless networks [1]. Mass multimedia services are, by definition, purposed for many people. In general, it can be distinguished between the distribution of any popular content over a wide area and the distribu- tion of location-dependent information in highly populated areas. Representative examples include the delivery of live video streaming content (like sports compe- titions, concerts, or news) and file download (multimedia clips, digital newspa- pers, or software updates).
標(biāo)簽: Broadcasting Generation Mobile Next
上傳時(shí)間: 2020-05-31
上傳用戶(hù):shancjb
The telecommunications industry has seen a rapid boost within the last decade. New realities and visions of functionalities in various telecommunications networks have brought forward the concept of next-generation networks (NGNs). The competitions among operators for support- ing various services, lowering of the cost of having mobile and cellular phones and smartphones, increasing demand for general mobility, explosion of digital traffic, and advent of convergence network technologies added more dynamism in the idea of NGNs. In fact, facilitating con- vergence of networks and convergence of various types of services is a significant objective of NGNs.
標(biāo)簽: Next-Generation Converged Networks
上傳時(shí)間: 2020-05-31
上傳用戶(hù):shancjb
Before delving into the details of orthogonal frequency division multiplexing (OFDM), relevant background material must be presented first. The purpose of this chapter is to provide the necessary building blocks for the development of OFDM principles. Included in this chapter are reviews of stochastic and random process, discrete-time signals and systems, and the Discrete Fourier Transform (DFT). Tooled with the necessary mathematical foundation, we proceed with an overview of digital communication systems and OFDM communication systems. We conclude the chapter with summaries of the OFDM wireless LAN standards currently in existence and a high-level comparison of single carrier systems versus OFDM.
上傳時(shí)間: 2020-05-31
上傳用戶(hù):shancjb
蟲(chóng)蟲(chóng)下載站版權(quán)所有 京ICP備2021023401號(hào)-1