Dissertations / Theses on the topic 'Fat pattern'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Fat pattern.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chlebowski, Rowan T., Aaron K. Aragaki, Garnet L. Anderson, Cynthia A. Thomson, JoAnn E. Manson, Michael S. Simon, Barbara V. Howard, et al. "Low-Fat Dietary Pattern and Breast Cancer Mortality in the Women’s Health Initiative Randomized Controlled Trial." AMER SOC CLINICAL ONCOLOGY, 2017. http://hdl.handle.net/10150/625754.
Full textMoore, Rebecca. "The relationship between a dietary pattern high in fruits, vegetables, low fat dairy, and whole grains and low in red meat and vascular structure and function in individuals with type 2 diabetes." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1439307990.
Full textAlejo, Willy, Daniel Rodriguez, Guillermo Kemper, and Universidad Peruana de Ciencias Aplicadas (UPC). "A biometric method based on the matching of dilated and skeletonized IR images of the veins map of the dorsum of the hand." IEEE, 2015. http://hdl.handle.net/10757/556175.
Full textThis work proposes a biometric identification system that works together with a palm vein reader sensor and a hand-clenching support, designed to perform the capture the back of the hand. Several processing steps were performed: extraction of the region of interest, binarization, dilation, noise filtering, skeletonization, as well as extraction and verification of patterns based on the measurment of coincidence of vertical and horizontal displacements of skeletonized and dilated images. The proposed method achieved the following results: processing time post capture of 1.8 seconds, FRR of 0.47% and FAR of 0,00%, with a referential database of 50 people from a total of 1500 random captures.
Speakman, Skyler. "Fast Constrained Subset Scanning for Pattern Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/434.
Full textFitch, Alistair John. "Fast statistically robust image registration." Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/844612/.
Full textNiu, Chaowei. "Motion pattern analysis for far-field vehicle surveillance." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/36188.
Full textIncludes bibliographical references (p. 71-73).
The main goal of this thesis is to analyze the motion patterns in far-field vehicle tracking data collected by multiple, stationary non-overlapping cameras. The specific focus is to fully recover the camera's network topology, which means the graph structure relating cameras and typical transitions time between cameras, then based on the recovered topology, to learn the traffic patterns(i.e. source/sink, transition probability, etc.), and finally be able to detect unusual events. I will present a weighted statistical method to learn the environment's topology. First, an appearance model is constructed by the combination of normalized color and overall model size to measure the appearance similarity of moving objects across non-overlapping views. Then based on the similarity in appearance, weighted votes are used to learn the temporally correlating information. By exploiting the statistical spatio-temporal information weighted by the similarity in an object's appearance, this method can automatically learn the possible links between the disjoint views and recover the topology of the network. After the network topology has been recovered, we then gather statistics about motion patterns in this distributed camera setting. And finally, we explore the problem of how to detect unusual tracks using the information we have inferred.
by Chaowei Niu.
S.M.
Goh, Eng Lim. "Parallel architectures with fast ray-tracing image synthesis." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335748.
Full textChen, Peng 1960. "Precipitation and Pattern Formation under Far-From-Equilibrium Conditions." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc278650/.
Full textLeone, Ryan J. "Patterns and Composition of Weight Change in College Freshmen." Bowling Green State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1428668895.
Full textZhang, Xin Iris, and 張欣. "Fast mining of spatial co-location patterns." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30462708.
Full textTruong, Alfred Kar Yin. "Fast growing and interpretable oblique trees via logistic regression models." Thesis, University of Oxford, 2009. http://ora.ox.ac.uk/objects/uuid:e0de0156-da01-4781-85c5-8213f5004f10.
Full textZakerolhosseini, Ali. "The application of fast transforms to real-time pattern recognition." Thesis, University of Kent, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.267380.
Full textMoustafa, Moustafa Abdel-Azim. "Feature recognition using a fast radon transform-based computer vision system." Thesis, Cranfield University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.305610.
Full textPerry, S. T. "Fast interactive object delineation in images for content based retrieval and navigation." Thesis, University of Southampton, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286748.
Full textEdwards, Susannah Lin. "Associations between Dietary Patterns and Cardiovascular Disease Risk in US Females." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461172539.
Full textBoussakta, Said. "Algorithms and development of the number theoretic and related fast transforms with applications." Thesis, University of Newcastle Upon Tyne, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293568.
Full textKuan, Joseph. "Image texture analysis and fast similarity search for content based retrieval and navigation." Thesis, University of Southampton, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287321.
Full textBlunt, Matthew Oliver. "Far-from-equilibrium nanoparticle assemblies : patterns, transport and dynamics." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/13112/.
Full textWilson, Andrew Gordon. "Covariance kernels for fast automatic pattern discovery and extrapolation with Gaussian processes." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708032.
Full textZhang, Qinjie, and Longyu Zhou. "Cultural adaptation pattern analysis of McDonald's and KFC in the Chinese market." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176311.
Full textMelhorn, Susan Jennifer. "The microstructure of food intake under conditions of high-fat diet, social stress and social subordination." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1243018975.
Full textAbbasi, Roohollah. "Colour pattern evolution and development in Vanessa butterflies." John Wiley & Sons Publishers, 2015. http://hdl.handle.net/1993/30979.
Full textFebruary 2016
Schuck, Renaud. "Two-photon minimal inertia scanning patterns for fast acquisition of calcium dynamics." Thesis, Imperial College London, 2017. http://hdl.handle.net/10044/1/57510.
Full textStanford, Derek C. "Fast automatic unsupervised image segmentation and curve detection in spatial point patterns /." Thesis, Connect to this title online; UW restricted, 1999. http://hdl.handle.net/1773/8976.
Full textBramsiepe, Jonathan. "A function of cell-cycle regulation in pattern formation : endoreplication controls cell-fate maintenance in Arabidopsis." Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAJ119.
Full textCell differentiation is often linked with a switch from a mitotic to an endoreplication cycle, in which cells re-replicate their DNA without cell division. The molecular regulation of endoreplication and its biological fonction are only poorly understood. Here, I have used trichomes (leaf hairs) of Arabidopsis as a model to study cell differentiation and endoreplication. My work revealed that endoreplication cycles in Arabidopsis are controlled by cyclin dependent kinase (CDK) inhibitor proteins, which in turn are subject to protein degradation mediated by the action of SKP-CULLIN-F-BOX (SCF) complexes. This presumably creates oscillating levels of CDK activity, which are needed for repeated progression through DNA synthesis phases in endoreplicating cells. However, overexpression of CDK inhibitors did not only block endoreplication but also resulted in the dedifferentiation of trichome precursor cells. Similar observations were made with weak- loss-of-function alleles for the major CDK in Arabidopsis, CDKA;1, giving rise to the notion that endoreplication is required for cell fate maintenance. Trichome dedifferentiation was enhanced when trichome fate regulators were mutated. Surprisingly, the dedifferentiation could be at least partially repressed when RBR1, the Arabidopsis homolog of the animal tumor suppressor protein Retinoblastoma (Rb), was concomitantly mutated. Similarly, a mutation in PRCZ-methyltransfcrase CURLY LEAF (CLF) rescued the trichome maintenance defect of weak CDKA;1 mutants. Taken together, this suggests that PRC2 and RBR1 set a dynamic tissue threshold for cell differentiation during epidermis development in Arabidopsis
Lo, Chong Fai. "Is 'fast food mania' developed in Macua? An exploration of the burgeoning fast food consumption patterns in an emerging market." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2147581.
Full textKummari, Chandrashekar. "Embedded test pattern generator for memories /." Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1240704151&sid=1&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textRichardson, Adam. "Apexification Healing Patterns Comparing MTA & Bioceramic Putty." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu159177077247595.
Full textMontenegro, Jorge Antonio. "Interpreting Cultural and Sociopolitical Landscapes in the Upper Piura Valley, Far North Coast of Perú (1100 B.C.- A.D. 1532)." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/238.
Full textMathew, Mini. "Novel State Coding For Scalable Pattern Matching." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1885751671&sid=2&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textJawaid, S. "Differential changes in neuromuscular junction morphology after divergence of activity pattern in rat slow and fast skeletal muscles." Thesis, University of Aberdeen, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.592627.
Full textRevaud, Jérôme. "Contributions to a fast and robust object recognition in images." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00694442.
Full textPetersson, Hjärne Jon. "A Hero in Disgrace : The patterns of a hero in David Lurie's twist of fate." Thesis, Växjö University, School of Humanities, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2573.
Full textIn this essay I look at J.M Coetzee’s Disgrace from a rather different perspective. I argue that, despite his less than heroic attributes, David Lurie is the protagonist of an adventure and follows Joseph Campbell’s pattern of the hero’s ditto. Furthermore, the goal of David Lurie’s journey lies in self-realization and self-reinvention, which is not typical for the hero’s journey. The Ultimate Boon is usually something else but different times call for different heroes. In J.M. Coetzee and the Ethics of Reading, Derek Attridge suggests that David Lurie grows on the reader throughout the novel and is a better person at the end (Attridge 183). This indicates that David Lurie goes through a process personally that changes him in a positive direction. Besides Campbell’s theory, the theories of Propp and Stanford are presented and put to good use as theoretical background. Since this essay deals with both narratology and structuralism I provide short explanations of these two branches of literature criticism as presented in Peter Barry’s Beginning Theory. I then discuss relevant passages from Disgrace in connection with the different stages of the hero’s journey as described by Campbell. I do so in the order they are presented in Campbell’s book.
Harris, Juliette May. "Gene targeting of a fast myosin promoter in muscle cells to alter myosin expression patterns." Thesis, Imperial College London, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286625.
Full textDoong, Jia-Yau. "The relationship of body fat distribution pattern to metabolic syndrome in the US and Taiwan." Diss., 2008. http://proquest.umi.com/pqdweb?did=1683720971&sid=1&Fmt=2&clientId=3552&RQT=309&VName=PQD.
Full textMaftei, Oana. "Intrauterine influences on obesity and insulin resistance in pre-pubertal children." Thesis, 2012. http://hdl.handle.net/2440/75507.
Full textThesis (Ph.D.) -- University of Adelaide, School of Population Health and Clinical Practice and School of Paediatrics and Reproductive Health, 2012
"Fast frequent pattern mining." 2003. http://library.cuhk.edu.hk/record=b5891575.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 57-60).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iii
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Frequent Pattern Mining --- p.1
Chapter 1.2 --- Biosequence Pattern Mining --- p.2
Chapter 1.3 --- Organization of the Thesis --- p.4
Chapter 2 --- PP-Mine: Fast Mining Frequent Patterns In-Memory --- p.5
Chapter 2.1 --- Background --- p.5
Chapter 2.2 --- The Overview --- p.6
Chapter 2.3 --- PP-tree Representations and Its Construction --- p.7
Chapter 2.4 --- PP-Mine --- p.8
Chapter 2.5 --- Discussions --- p.14
Chapter 2.6 --- Performance Study --- p.15
Chapter 3 --- Fast Biosequence Patterns Mining --- p.20
Chapter 3.1 --- Background --- p.21
Chapter 3.1.1 --- Differences in Biosequences --- p.21
Chapter 3.1.2 --- Mining Sequential Patterns --- p.22
Chapter 3.1.3 --- Mining Long Patterns --- p.23
Chapter 3.1.4 --- Related Works in Bioinformatics --- p.23
Chapter 3.2 --- The Overview --- p.24
Chapter 3.2.1 --- The Problem --- p.24
Chapter 3.2.2 --- The Overview of Our Approach --- p.25
Chapter 3.3 --- The Segment Phase --- p.26
Chapter 3.3.1 --- Finding Frequent Segments --- p.26
Chapter 3.3.2 --- The Index-based Querying --- p.27
Chapter 3.3.3 --- The Compression-based Querying --- p.30
Chapter 3.4 --- The Pattern Phase --- p.32
Chapter 3.4.1 --- The Pruning Strategies --- p.34
Chapter 3.4.2 --- The Querying Strategies --- p.37
Chapter 3.5 --- Experiment --- p.40
Chapter 3.5.1 --- Synthetic Data Sets --- p.40
Chapter 3.5.2 --- Biological Data Sets --- p.46
Chapter 4 --- Conclusion --- p.55
Bibliography --- p.60
Cheng, Chang-Yeng, and 鄭昶延. "Fast Pattern Detection in Stream Data." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95244923612433375113.
Full text國立清華大學
資訊工程學系
92
Digital pollution is emerging as an overwhelming threat to the Internet, whose ubiquitous connectivity conversely cultivates the widespread outbreaks of such dirt. Considerable amount of human efforts and network resources are wasted at a little cost of the few polluters. To prevent flooding of the contamination, classical string matching schemes and their variants can be the first aid for the effective quarantine to establish its censorship. The features of the typical pollutants are extracted and refined into so-called signatures. Every transfer post then looks through the incoming stream data for these signatures. Upon detecting any such pattern, the post can obstruct the connection and sound an alert to inform higher-level security systems. Obviously, the processing speed and accuracy of pattern detection schemes is crucial to the effectiveness of security systems. To expedite the scrutiny, we propose a novel pattern detection technique based on the decision tree induction to seek for significant improvement over the classical schemes. According to the intrinsic of the pattern, the tree is sprouted adaptively to minimize the number of symbols in the data stream needed to be examined. This allows a unique order to inspect the symbols in a strategic way optimized contextually, as opposed to the fixed order followed by the other schemes. In other words, this strategy inspects the symbols in every possible matching positions in parallel, and rules out the unmatching ones that have at least one false matching symbol. Finally only the possible positions that match the previous inspected symbols needed to be checked with the entire pattern. This way reduces considerable amounts of context symbol checks to confirm a matching. Performance study indicates our approach achieves the speed-up of five or more over the best competitors.
"Fast pattern matching and its applications." Thesis, 2011. http://library.cuhk.edu.hk/record=b6075121.
Full textFirstly, this thesis proposes a fast algorithm for Walsh Hadamard Transform (WHT) on sliding windows which can be used to implement pattern matching efficiently.
Support vector machine (SVM) is a widely used classification approach. Direct computation of SVM is not desirable in applications requiring computationally efficient classification. To relieve the burden of high computational time required for computing SVM, this thesis proposes a transform domain SVM (TDSVM) using pruning that computes SVM much faster. Experimental results show the efficiency in applying the proposed method for human detection.
Then this thesis analyzes and compares state-of-the-art algorithms for full search equivalent pattern matching. Inspired by the analysis, this thesis develops a new family of transforms called the Kronecker-Hadamard Transform (KHT) of which the GCK family is a subset and WHT is a member. Thus, KHT provides more choices of transforms for representing images. Then this thesis proposes a new fast algorithm that is more efficient than the GCK algorithm. All KHTs can be computed efficiently using the fast KHT algorithm. Based on the KHT, this thesis then proposes the segmented KHT (SegKHT). By segmenting input data into Ls parts, the SegKHT requires 1/Ls the computation required by the KHT algorithm in computing basis vectors. Experimental results show that the proposed algorithm can significantly accelerate the pattern matching process and outperforms state-of-the-art methods.
This thesis aims at improving the computational efficiency in pattern matching.
Ouyang, Wanli.
Adviser: Wai Kuen Cham.
Source: Dissertation Abstracts International, Volume: 73-04, Section: B, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 143-147).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
Wang, Po-chung, and 王柏忠. "Fast Pattern Classification through Nearest-Neighbor Search." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/46937856524916401924.
Full text國立高雄第一科技大學
電腦與通訊工程所
98
Over recent years, support vector machines (SVMs) have been widely used for solving a variety of classification problems in the fields of pattern recognition and data mining applications. One basic principle behind SVMs is to predict the class label of a testing sample by using the optimal hyperplane determined from labeled training samples. Obviously, this principle brings SVMs a limitation that they are computationally infeasible for training a very large-scale dataset. To overcome this drawback, an intuitive approach is to reduce the number of training samples that are unrelated to the construction of the optimal hyperplane. In this thesis, an efficient approach based on nearest neighbor search is therefore proposed to identify non-relevant samples that can subsequently be removed from a large-scale training dataset without degrading the classification accuracy. The performance of the proposed approach is assessed through the use of several publicly available datasets such as IRIS, Monks, and Forest. Experimental results demonstrate that the proposed approach is a significant improvement compared with the previous attempts in terms of the reduced number of training samples, the time taken for SVM training procedures, and the classification accuracy.
CHEN, BANG-ZHENG, and 陳邦正. "A fast method of wall pattern generation." Thesis, 1991. http://ndltd.ncl.edu.tw/handle/30030774050720333610.
Full textYu-Nan, Su, and 蘇育南. "Implementation of Antenna Far-Field Pattern Measurement System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/83525232294769208028.
Full text樹德科技大學
電腦與通訊研究所
94
Antennas are very popular in 802.11b/g WLANs and Bluetooth applications by using 2.4GHz ISM band. For antenna designer, it is a key to increase the efficiency of antenna measurement effectively. As we know, a Far-Field Antenna Measurement System is extremely expensive. This research goal is using the mature RF techniques to design and build up a low cost and high reliability Antenna Measurement System to offer antenna designer the fast and accurate measured results.
Shun-I, Chu, and 朱順義. "Charging Pattern Optimization for Li-Ion Fast Chargers." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/71214223142328112784.
Full text義守大學
電機工程學系
92
Recently, the number of portable personal telecommunication systems such as mobile phones and laptop computers has grown explosively. Secondary batteries are often used in these equipments because they are cost-effective over the lifetime of the product. Among these, lithium-ion (Li-ion) batteries are growing at a rapid rate in response to environmental concerns and the need for higher energy density. The performance and longevity of lithium ion batteries depend, to a large extent, on the quality of their chargers. Commercially available fast chargers are often not designed in the best interests of the battery. Therefore, it is important for battery manufacturers to determine the optimal charging pattern for their products. Several efforts have been devoted to study the charging techniques and charging patterns. From those methods, multi-stage pulse charging algorithm is proven to have the advantages such as prolong cycle lives, enhance discharge/charge energy efficiency, and reduce the charging time. However, the optimal current value for each stage still cannot be determined. In order to search the optimization charging pattern for multi-stage pulse charging algorithm, a rapid charger designed based on CPLD (Complex Programmable Logic Device) is implemented in this thesis. A human-machine interface designed by LabVIEW (Laboratory Virtual Instrument Engineering Workbench) is also implemented to set the charging currents and monitor the charging status. A searching algorithm for charging pattern based on Taguchi method and orthogonal array is then proposed for Li-ion batteries in this thesis. Due to the characteristics of Taguchi method and orthogonal array, the experimental number required for charging pattern searching can be minimized. Experimental results show that the obtained rapid charging pattern is capable of charging the lithium-ion batteries to 60% capacity in 30 minutes.
Lin, Jun-Wei, and 林浚瑋. "Maintenance Algorithms for Fast Updated Frequent Pattern Trees." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/80896537645549114192.
Full text義守大學
資訊管理學系碩士班
94
Due to the increasing usage and development of information technologies, how to mine the useful information and helpful knowledge from the huge and complicated transactions has been evolving into an important research area. In the past, researchers usually assumed the database was static to simplify the data-mining problem. Most of the classic algorithms proposed thus focused on batch mining, and did not utilize previously mined information for incrementally growing databases. The Frequent-Pattern-tree (FP-tree) is an efficient data structure for association-rule mining without generation of candidate itemsets. It was used to compress a database into a tree structure which stored only large items. It, however, needed to process all transactions in a batch way when the databases are usually changed whether insertion, deletion or modification of transactions. In real-world applications, however, developing a mining algorithm that can maintenance the discovered information as a database changes is quite important. In this paper, we thus attempt to extend the FP-tree construction algorithm for efficiently handling the insertion, deletion or modification of transactions. A fast updated FP-tree (FUFP-tree) structure is used, which makes the tree update process become easier. An FUFP-tree maintenance algorithm is also proposed for reducing the execution time in reconstructing the tree when transaction are inserted, deleted or modified. Experimental results show that the proposed FUFP-tree maintenance algorithm for the insertion, deletion or modification of transactions runs faster than the batch FP-tree construction algorithm for handling updated database and generates nearly the same tree structures as the FP-tree algorithm. The proposed three approaches can thus achieve a good performance in execution time and tree complexity.
Cheng, Bo En, and 鄭博恩. "Fast Pattern Matching Using Dynamically Partitioned AC-DFA." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107CGU05392014%22.&searchmode=basic.
Full textYu-HaoTseng and 曾毓豪. "Fast and Memory Efficient NFA Pattern Matching using GPU." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/05823690367574769741.
Full text國立成功大學
資訊工程學系
102
With the rapid development of networks, a large number of malicious packets, such as virus and malware, are spreading in recent years. Network intrusion detection system (NIDS) is mainly designed for monitoring whether there are some malicious packets over the Internet. The technique of pattern matching plays an important role because we often use it to protect our systems. With pre-defined virus signatures called patterns, NIDS can find out whether these pre-defined patterns exist in the payload of packets. Finite state automata (FSA), such as NFA and DFA, are one of pattern matching techniques in NIDS. Because processing a large amount of network packets only on a single thread cannot satisfy our high-speed demand, we need hardware to accelerate the performance of pattern matching. GPU can be used to effectively accelerate the performance of pattern matching because abundant parallel hardware threads are supported. In this thesis, we propose a new NFA-based method to store more complex regular expressions in limited memory of GPU effectively. The proposed constrained NFA (CNFA) is constructed from the original NFA based on the method used in the subset construction algorithm that converts NFA to DFA. Compared to original NFA and DFA, the proposed CNFA imposes a constraint that each state can only have at most two transitions for each character, namely self-loop and non-self-loop transitions. Based on our experimental results, the proposed CNFA can achieve the performance of about 100 Gbps at the best case on GPU. Also, the proposed CNFA only needs 18% of memory usage, used in iNFAnt. In addition, the proposed CNFA can be used for more complex rule sets that is not possible to be implemented in iNFAnt.
KAN, CHE-CHIH, and 康哲誌. "Fast fractal image encoding based on contrast pattern classification." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/24105998227669428278.
Full text國立臺灣科技大學
資訊工程系
96
Speeding up fractal image encoding is an important issue. In this thesis, we propose a fractal encoding method based on contrast-pattern classification. According to contrast-pattern of each block, range and domain blocks are divided into 6 classes – Smooth, Chessboard, Horizontal, Vertical, Diagonal and Anti-diagonal (SCHVD). Then, for each range block, we only search domain blocks in the corresponding domain pool to speed up fractal encoding. By limiting the domain pool for each range block, the encoding time can be shortened. Moreover, the proposed method can be combined with the spatial-correlation method. In this hybrid approach, most range blocks could get qualified domain blocks from neighbor’s fractal code. For others, which can’t get domain blocks from neighbor search, the SCHVD classification is served to limit the size of domain pool to speed up encoding. Experiment results show that the proposed algorithm can shorten encoding time and also keep the quality of the reconstructed image.
Yeh, Yao-Jung, and 葉燿榮. "SOPC-based fast kNN classification system for pattern recognition." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/00502704957002074464.
Full text國立臺灣師範大學
資訊教育學系
94
A novel algorithm for field programmable gate array (FPGA) realization of kNN classifiers using wavelet transform and partial distance search (PDS) is presented in this paper. The PDS is usually adopted as a software approach for attaining moderate codeword search acceleration. In this paper, a novel PDS algorithm well-suited for hardware realization is proposed. The algorithm identifies first k closest vectors in the design set of a kNN classifier for each input vector by performing the PDS in the wavelet domain. The algorithm employs subspace search, bitplane reduction and multiple-coefficient accumulation techniques for the effective reduction of the area complexity and computation latency. Concurrent classification of different input vectors for further computation acceleration is also allowed by the employment of multiple-module PDS. The proposed implementation has been embedded in a softcore CPU for physical performance measurement. Experimental results show that the implementation provides a cost-effective solution to the FPGA realization of kNN classification systems where both high throughput and low area cost are desired.
Lee, Che-Wei, and 李哲瑋. "Double-layered Initial Search Pattern for Fast Motion Estimation." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/94919139335258025914.
Full text國立成功大學
電機工程學系碩博士班
93
Multimedia communication relies on data compression technologies to reduce the data bytes of transmission and enhance the speed of transmission. Motion estimation is vital to many motion-compensated video-coding techniques/standards, such as ISO MPEG-1/2/4 and ITU-T H.261/262/263/264。In block motion estimation, a search pattern with a different shape and size has a very important impact on performance of motion estimation. The performance indicates that the speed of finding out motion vectors and the visual quality of predicted results. In recent years, many computationally efficient fast search algorithm were developed, among which are typically the three-step search (3SS) in 1994, the new diamond search (DS) in 2000, the hexagon-based Search (HEXBS) in 2002, and the efficient three-step search (E3SS) in 2004. Here we propose a pair of simple, robust and efficient fast block matching motion estimation algorithms, called double-layered initial search patterns (DLISP). Simulation experiments demonstrate that the proposed DLISP algorithm greatly outperforms the well-known hexagon-based Search (HEXBS) algorithm and achieves similar MSE performance compared to efficient three-step search (E3SS) while reducing its computation by up to 22% approximately. Compared with other recently proposed block-matching algorithms, the proposed DLISP algorithms works better on average in terms of MSE values, reconstructed image quality, and average number of search points.
LEE, Yi-Hui, and 李怡慧. "Fast motion estimation algorithm based on adaptive search pattern." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/79257830641405966245.
Full text義守大學
資訊工程學系碩士班
95
Motion estimation plays an important role in the video coding. The objective of the motion estimation is to remove the temporal redundancy between video frames, and then achieve high compression ratio. In video coding, the full search motion estimation algorithm is searching all possible positions in the searching area, thus it has the optimum performance for motion compensation. But it requires the highest computational load, therefore, the fast algorithms is developed to reduce the computational burden. Traditional fast algorithms are used to search pattern than the distribution error is the smallest of the next search for a search pattern of the center. Only the quantity of the distribution error, it is impossible to be the most likely direction of the message. That is in distribution error is to judge the size, according to continue to do a single search path of information is not enough. The proposed method is mainly based on the adaptive search pattern and use the ratio of the Mean Square Error between the search points to decide next search direction. As well as to set up dynamic threshold in order to stop search at once, it can reducing the search points. The experimental results show that the new scheme is reduce the search points effectively and quality of video is approximate to traditional fast algorithms.