scispace - formally typeset
Search or ask a question
Author

Bruce W. Suter

Bio: Bruce W. Suter is an academic researcher from Air Force Research Laboratory. The author has contributed to research in topics: Filter bank & Wavelet transform. The author has an hindex of 21, co-authored 132 publications receiving 3089 citations. Previous affiliations of Bruce W. Suter include Texas A&M University & University of Alabama at Birmingham.


Papers
More filters
Journal ArticleDOI
TL;DR: The multilayer perceptron, when trained as a classifier using backpropagation, is shown to approximate the Bayes optimal discriminant function.
Abstract: The multilayer perceptron, when trained as a classifier using backpropagation, is shown to approximate the Bayes optimal discriminant function. The result is demonstrated for both the two-class problem and multiple classes. It is shown that the outputs of the multilayer perceptron approximate the a posteriori probability functions of the classes being trained. The proof applies to any number of layers and any type of unit activation function, linear or nonlinear. >

866 citations

Journal ArticleDOI
TL;DR: The authors propose a general algorithm to compute multi wavelet transform coefficients by adding proper premultirate filter banks before the vector filter banks that generate multiwavelets, which indicates that the energy compaction for discrete multiwavelet transforms may be better than the one for conventional discrete wavelet transforms.
Abstract: The pyramid algorithm for computing single wavelet transform coefficients is well known. The pyramid algorithm can be implemented by using tree-structured multirate filter banks. The authors propose a general algorithm to compute multiwavelet transform coefficients by adding proper premultirate filter banks before the vector filter banks that generate multiwavelets. The proposed algorithm can be thought of as a discrete vector-valued wavelet transform for certain discrete-time vector-valued signals. The proposed algorithm can be also thought of as a discrete multiwavelet transform for discrete-time signals. The authors then present some numerical experiments to illustrate the performance of the algorithm, which indicates that the energy compaction for discrete multiwavelet transforms may be better than the one for conventional discrete wavelet transforms.

321 citations

Journal ArticleDOI
TL;DR: In particular, the authors showed that the complexity of first-order descent methods for convex minimization can be computed using the Kurdyka-Łojasiewicz (KL) inequality.
Abstract: This paper shows that error bounds can be used as effective tools for deriving complexity results for first-order descent methods in convex minimization. In a first stage, this objective led us to revisit the interplay between error bounds and the Kurdyka-Łojasiewicz (KL) inequality. One can show the equivalence between the two concepts for convex functions having a moderately flat profile near the set of minimizers (as those of functions with Holderian growth). A counterexample shows that the equivalence is no longer true for extremely flat functions. This fact reveals the relevance of an approach based on KL inequality. In a second stage, we show how KL inequalities can in turn be employed to compute new complexity bounds for a wealth of descent methods for convex problems. Our approach is completely original and makes use of a one-dimensional worst-case proximal sequence in the spirit of the famous majorant method of Kantorovich. Our result applies to a very simple abstract scheme that covers a wide class of descent methods. As a byproduct of our study, we also provide new results for the globalization of KL inequalities in the convex framework. Our main results inaugurate a simple method: derive an error bound, compute the desingularizing function whenever possible, identify essential constants in the descent method and finally compute the complexity using the one-dimensional worst case proximal sequence. Our method is illustrated through projection methods for feasibility problems, and through the famous iterative shrinkage thresholding algorithm (ISTA), for which we show that the complexity bound is of the form \(O(q^{k})\) where the constituents of the bound only depend on error bound constants obtained for an arbitrary least squares objective with \(\ell ^1\) regularization.

258 citations

Journal ArticleDOI
TL;DR: This paper proposes novel clock skew estimators assuming different delay environments to achieve energy-efficient network-wide synchronization for WSNs and derives the Cramer-Rao lower bounds and the maximum likelihood estimators under different delay models and assumptions.
Abstract: Recently, a few efficient timing synchronization protocols for wireless sensor networks (WSNs) have been proposed with the goal of maximizing the accuracy and minimizing the power utilization. This paper proposes novel clock skew estimators assuming different delay environments to achieve energy-efficient network-wide synchronization for WSNs. The proposed clock skew correction mechanism significantly increases the re-synchronization period, which is a critical factor in reducing the overall power consumption. The proposed synchronization scheme can be applied to the conventional protocols without additional overheads. Moreover, this paper derives the Cramer-Rao lower bounds and the maximum likelihood estimators under different delay models and assumptions. These analytical metrics serves as good benchmarks for the thus far reported experimental results

258 citations

Journal ArticleDOI
TL;DR: This paper presents discrete vector wavelet transforms for discrete-time vector-valued (or blocked) signals, which can be thought of as a family of unitary vector transforms.
Abstract: In this paper, we introduce vector-valued multiresolution analysis and vector-valued wavelets for vector-valued signal spaces. We construct vector-valued wavelets by using paraunitary vector filter bank theory. In particular, we construct vector-valued Meyer wavelets that are band-limited. We classify and construct vector-valued wavelets with sampling property. As an application of vector-valued wavelets, multiwavelets can be constructed from vector-valued wavelets. We show that certain linear combinations of known scalar-valued wavelets may yield multiwavelets. We then present discrete vector wavelet transforms for discrete-time vector-valued (or blocked) signals, which can be thought of as a family of unitary vector transforms.

210 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, a selfconsistent density functional method using standard norm-conserving pseudopotentials and a flexible, numerical linear combination of atomic orbitals basis set, which includes multiple-zeta and polarization orbitals, was developed and implemented.
Abstract: We have developed and implemented a selfconsistent density functional method using standard norm-conserving pseudopotentials and a flexible, numerical linear combination of atomic orbitals basis set, which includes multiple-zeta and polarization orbitals. Exchange and correlation are treated with the local spin density or generalized gradient approximations. The basis functions and the electron density are projected on a real-space grid, in order to calculate the Hartree and exchange-correlation potentials and matrix elements, with a number of operations that scales linearly with the size of the system. We use a modified energy functional, whose minimization produces orthogonal wavefunctions and the same energy and density as the Kohn-Sham energy functional, without the need for an explicit orthogonalization. Additionally, using localized Wannier-like electron wavefunctions allows the computation time and memory required to minimize the energy to also scale linearly with the size of the system. Forces and stresses are also calculated efficiently and accurately, thus allowing structural relaxation and molecular dynamics simulations.

8,723 citations

Proceedings ArticleDOI
08 Jul 2009
TL;DR: A new data set is proposed, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
Abstract: During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems, and results in a very poor evaluation of anomaly detection approaches. To solve these issues, we have proposed a new data set, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.

3,300 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

MonographDOI
02 Jul 2004
TL;DR: This combining pattern classifiers methods and algorithms helps people to enjoy a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their computer.
Abstract: Thank you for downloading combining pattern classifiers methods and algorithms. Maybe you have knowledge that, people have look hundreds times for their chosen novels like this combining pattern classifiers methods and algorithms, but end up in infectious downloads. Rather than enjoying a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their computer.

2,667 citations