High-quality Magnetic Resonance Imaging (MRI) provides an aid to reliable diagnosis. By processing medical images, doctors are able to view pathological features more easily;however, since pathological features are us...
详细信息
ISBN:
(纸本)9798400708305
High-quality Magnetic Resonance Imaging (MRI) provides an aid to reliable diagnosis. By processing medical images, doctors are able to view pathological features more easily;however, since pathological features are usually small in the early stages, we would like to obtain medical images that are as clear as possible so that doctors can observe relevant features and even finer textures. therefore, applying image super-resolution technology to medical images can reconstruct high-resolution medical images without increasing hardware equipment, which helps doctors make better diagnoses of patients' conditions. the use of deep learning methods can effectively reconstruct high-resolution images. In this paper, RCAN network is applied to the medical image dataset IXI and formed a control experiment with SAN, EDSR and T2Net network, and RCAN achieves good results both in terms of data metrics and in terms of recovering images for analysis.
To achieve higher network intrusion detection performance in the changing network environment, transfer learning is introduced and a network intrusion detection method based on Iterative and Weighted Easy Transfer Lea...
详细信息
BIM execution plan(BEP) is the basic guidance of BIM work. the content of BEP and implementation mode of TUAS Water Reclamation Plant(TWRP) BIM work are explained. the BIM design software and simulation software estab...
详细信息
Recent advancements in the embedded systems field have resulted in more complicated systems with application-specific blocks (IP cores), often known as System on Chip (SoC) devices. Several redundancy-based embedded d...
详细信息
Aiming at the problem of frequent false and missed detection due to the dense and scattered distribution of cancer cells in the pathological images of cervical cancer cells, the complex image background, and the rich ...
详细信息
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook...
详细信息
ISBN:
(纸本)9798400708305
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook of CSSCS building approach, which is top-down mapping and bottom-up founding. CSSCS virtualized multiple sensors, weapons, facilities and equipment, break the fixed relations between each other, combine them with network, and build up flexible information resources network. the information resources network can recompose dynamically according to the battle situation, which can be combined into an operational structure with a subordinate relationship at any time. the aim of CSSCS is to achieve command-flattening, disposal-quickening, evaluation-automation and perception-precision.
this paper proposed a combinational method to estimate and discriminate the P300 component. the Kalman filter and the wavelet transformation were used to estimate the P300 component and PCA and three discrimination me...
详细信息
ISBN:
(纸本)9780769529837
this paper proposed a combinational method to estimate and discriminate the P300 component. the Kalman filter and the wavelet transformation were used to estimate the P300 component and PCA and three discrimination methods;linear discrimination analysis, Mahalanobis distance, and Bayes' theorem, were used to discriminate the estimated P300 from single trial. the results show the effectiveness of the combinational technique in discrimination. the combination of wavelet transformation and a linear discrimination analysis can perform discrimination in the highest accuracy and the fastest processing speed.
Precision electronic warfare (PREW) is an application to solve many problems that are difficult to solve with current electronic warfare methods. However, the current issues related to designing jamming waveforms suit...
详细信息
this study presents hypothesis algorithm research about factors in Cyber-attacks due to lack of information security standard, Whatever the hazard, cybersecurity threats have become pervasive and continue to every Bus...
详细信息
the airborne informationprocessing system, which is subordinate to the avionics system, is the basic sub-system performing information data processing in the aircraft platform. It provides computing, storage, informa...
详细信息
暂无评论