In this paper we present a classifier called bi-density twin support vector machines (BDTWSVMs) for data classification. In the training stage, BDTWSVMs first compute the relative density degrees for all training points using the intra-class graph whose weights are determined by a local scaling heuristic strategy, then optimize a pair of nonparallel hyperplanes through two smaller sized support vector machine (SVM)-typed problems. In the prediction stage, BDTWSVMs assign to the class label depending on the kernel density degree-based distances from each test point to the two hyperplanes. BDTWSVMs not only inherit good properties from twin support vector machines (TWSVMs) but also give good description for data points. The experimental results on toy as well as publicly available datasets indicate that BDTWSVMs compare favorably with classical SVMs and TWSVMs in terms of generalization
标签: recognition Bi-density machines support pattern vector twin for
上传时间: 2019-06-09
上传用户:lyaiqing
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
keil C51 v6.12 完全解密版的安装说明 安装方法是先将V6.12安装程序复制到某个目录下,如复制到D:\keilC51 然后执行D:\keilC51\setup\setup.exe 安装程序,选择安装Eval Version版进 行安装。 注册码:K199U-20071-12A9U 当出现Please insert the add-on disk的提示画面,可按next按钮(不用 插入软盘)。 安装好之后就可以使用,没有代码大小的限制,这是完全版,比 Eval版增 加浮点库等内容。
上传时间: 2020-03-20
上传用户:mimeme
High-Speed, Low-Power Dual Operational Amplifier The AD826 features high output current drive capability of 50 mA min per amp, and is able to drive unlimited capacitive loads. With a low power supply current of 15 mA max for both amplifiers, the AD826 is a true general purpose operational amplifier. The AD826 is ideal for power sensitive applications such as video cameras and portable instrumentation. The AD826 can operate from a single +5 V supply, while still achieving 25 MHz of band width. Furthermore the AD826 is fully specified from a single +5 V to ±15 V power supplies. The AD826 excels as an ADC/DAC buffer or active filter in data acquisition systems and achieves a settling time of 70 ns to 0.01%, with a low input offset voltage of 2 mV max. The AD826 is available in small 8-lead plastic mini-DIP and SO packages.
上传时间: 2020-04-19
上传用户:su1254
transimpedance linearization circuitry. This allows it to drive video loads with excellent differential gain and phase perfor mance on only 50 mW of power. The AD8001 is a current feedback amplifier and features gain flatness of 0.1 dB to 100 MHz while offering differential gain and phase error of 0.01% and 0.025°. This makes the AD8001 ideal for professional video electronics such as cameras and video switchers. Additionally, the AD8001’s low distortion and fast settling make it ideal for buffer high-speed A-to-D converters. The AD8001 offers low power of 5.5 mA max (VS = ±5 V) and can run on a single +12 V power supply, while being capable of delivering over 70 mA of load current. These features make this amplifier ideal for portable and battery-powered applications where size and power are critical. The outstanding bandwidth of 800 MHz along with 1200 V/µs of slew rate make the AD8001 useful in many general purpose high-speed applications where dual power supplies of up to ±6 V and single supplies from 6 V to 12 V are needed. The AD8001 is available in the industrial temperature range of –40°C to +85°C.
上传时间: 2020-04-21
上传用户:su1254
The telecommunications industry has seen a rapid boost within the last decade. New realities and visions of functionalities in various telecommunications networks have brought forward the concept of next-generation networks (NGNs). The competitions among operators for support- ing various services, lowering of the cost of having mobile and cellular phones and smartphones, increasing demand for general mobility, explosion of digital traffic, and advent of convergence network technologies added more dynamism in the idea of NGNs. In fact, facilitating con- vergence of networks and convergence of various types of services is a significant objective of NGN
标签: Next-Generation Converged Building Networks
上传时间: 2020-05-26
上传用户:shancjb
According to the statistics of the Federal Communications Commission (FCC), temporal and geographical variations in the utilization of the as- signed spectrum range from 15% to 85%. The limited available radio spec- trum and the inefficiency in spectrum usage necessitate a new commu- nication paradigm to exploit the existing spectrum dynamically.
上传时间: 2020-05-26
上传用户:shancjb
The General Packet Radio Service (GPRS) allows an end user to send and receive data in packet transfer mode within a public land mobile network (PLMN) without using a permanent connection between the mobile station (MS) and the external network during data transfer. This way, GPRS opti- mizes the use of network and radio resources (RRs) since, unlike circuit- switched mode, no connection between the MS and the external network is established when there is no data flow in progress. Thus, this RR optimiza- tion makes it possible for the operator to offer more attractive fees.
上传时间: 2020-05-27
上传用户:shancjb
Communication, a word that many associate with modern technology, actually has nothing to do with technology. At its core, communication involves nothing more than the spoken or written word, and symbolic languages like art and music. Technology has become synonymous with communication because technology has historically been the method by which communication to or by the general population takes place.
标签: Implementing 802.11
上传时间: 2020-05-27
上传用户:shancjb
In general there are three different techniques for performance evaluation of systems and networks: mathematical analysis, measurements, and computer simulation. All these techniques have their strength and weaknesses. In the literature there are plenty of discussions about when to use which technique, how to apply it, and which pitfalls are related to which evaluation technique.
标签: Simulation Modeling Network Tools and for
上传时间: 2020-05-31
上传用户:shancjb