In this paper we derive a quality measure for analysing the performance of algorithms which seek to find boundaries and boundary models between regions of differing mean grey-level value. The measure can be used to co...
详细信息
In this paper we derive a quality measure for analysing the performance of algorithms which seek to find boundaries and boundary models between regions of differing mean grey-level value. The measure can be used to compare different approaches and, more importantly, it can also be used as a first step to building self-optimising vision systems that can automatically optimise important parameters at each level of the system.
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed "magic numbers" stored with the files, and proprietary ...
详细信息
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed "magic numbers" stored with the files, and proprietary descriptive file wrappers. All of these methods have significant limitations. This paper proposes algorithms for automatically generating "fingerprints" of file types based on a set of known input files, then using the fingerprints to recognize the true type of unknown files based on their content, rather than metadata associated with them. Recognition is performed by three different algorithms based on: byte frequency analysis, byte frequency cross-correlation analysis, and file header/trailer analysis. Tests were run to measure the accuracy of these algorithms. The accuracy varied from 23% to 96% depending upon which algorithm was used. These algorithms could be used by virus scanning packages, firewalls, intrusion detection systems, forensic analyses of computer hard drives, Web browsers, or any other program that needs to identify the types of files for proper operation. File type detection is also important to the operating systems for correct identification and handling of files regardless of file extension.
Spectrum sensing is a critical requirement for proposed Dynamic Spectrum Access networks both to avoid causing interference to primary users and to maximize the throughput of the secondary network. Traditional sensing...
详细信息
Spectrum sensing is a critical requirement for proposed Dynamic Spectrum Access networks both to avoid causing interference to primary users and to maximize the throughput of the secondary network. Traditional sensing algorithms are performance limited by the length of time they can observe the primary user's transmission. We implement for demonstrative purposes a number of sequence detection spectrum sensing algorithms that take into account the transitions in the primary user's channel access, resulting in better sensing performance. The demonstration consists of primary and secondary data links that are both streaming video in the same frequency band, forcing the secondary link to opportunistically access the spectrum. Various sensing algorithms are selectable and configurable at the secondary transmitter, including multiple sequence detection algorithms and energy detection. The superior performance of the sequence detection algorithms is evident at the receivers through a number of metrics, including video quality, plots of the historical data rate, and estimates of the detection and false alarm probabilities.
Layered space-time code technique is a good scheme to improve the wireless transmission rate and reliability. The paper discusses four detection algorithms for the Vertical-Bell Laboratories Layered Space-Time (V-BLAS...
详细信息
Layered space-time code technique is a good scheme to improve the wireless transmission rate and reliability. The paper discusses four detection algorithms for the Vertical-Bell Laboratories Layered Space-Time (V-BLAST) system. Then, it analyzes the process of algorithms in detail and simulates them. The bit error rate (BER) for the four detection algorithms in different channel situations are compared.
The capability of identifying physical structures in an unknown environment is important for autonomous mobile robot navigation and scene understanding. A methodology for detecting corridor and door structures in an i...
详细信息
The capability of identifying physical structures in an unknown environment is important for autonomous mobile robot navigation and scene understanding. A methodology for detecting corridor and door structures in an indoor environment is proposed, and the performances of the corridor detection algorithm and door detection algorithm applied in different environments are evaluated. In the proposed algorithms, we utilize a feedback mechanism based hypothesis generation and verification (HGV) method to detect corridor and door structures using low level line features in video images. The proposed method consists of low, intermediate, and high level processing stages which correspond to the extraction of low-level features, the formation of hypotheses, and the verification of hypotheses using a feedback mechanism, respectively. The system has been tested on a large number of real corridor images captured by a moving robot in a corridor. The experimental results validated the effectiveness and robustness of the proposed methods with respect to different viewpoints, different robot moving speed, under different illumination conditions and reflection variations.
This paper analyses the performance of a large bunch of pitch detection algorithms on clean and noisy speech data. Two sets of noisy speech data are considered. One corresponds to simulated noisy data, and is obtained...
详细信息
This paper analyses the performance of a large bunch of pitch detection algorithms on clean and noisy speech data. Two sets of noisy speech data are considered. One corresponds to simulated noisy data, and is obtained by adding several types of noise signals at various levels on the clean speech data of the Pitch-Tracking Database from Graz University of Technology (PTDB-TUG). The second one, SPEECON, was recorded in several different acoustic environments. The paper discusses the performance of pitch detection algorithms on the simulated noisy data, and on the real noisy data of the SPEECON corpus. Also, an analysis of the performance of the best pitch detection algorithm with respect to estimated signal-to-noise ratio (SNR) shows that very similar performance is observed on the real noisy data recorded in public places, and on the clean data with addition of babble noise.
Intelligence, Surveillance, and Reconnaissance (ISR) missions involve complex analysis of sensor data that can benefit from the exploitation of geographically aligned context. In this paper we discuss our approach to ...
详细信息
ISBN:
(纸本)9781479978212
Intelligence, Surveillance, and Reconnaissance (ISR) missions involve complex analysis of sensor data that can benefit from the exploitation of geographically aligned context. In this paper we discuss our approach to utilizing geo-registered imagery and context for the purpose of aiding ISR applications. Specifically this includes rendering context masks on imagery, increasing the speed at which detection algorithms process data, providing a way to intelligently control detection density for given ground areas, identifying difficult traffic terrain, and peak suppression refinement.
detection algorithms for single user wireless communication using multiple antennas at both the transmitter and receiver in a Rayleigh (flat) fading environment are compared. The system includes N transmitting antenna...
详细信息
detection algorithms for single user wireless communication using multiple antennas at both the transmitter and receiver in a Rayleigh (flat) fading environment are compared. The system includes N transmitting antennas, M receiving antennas (N/spl les/M) and repetition coding at the transmitter (delay diversity). The linear decorrelating (LD) and minimum mean squared error (MMSE) detectors are compared with their D-BLAST and V-BLAST versions using bit error ratio versus signal-to-noise ratio simulation. For BPSK, the MMSE detector and its BLAST versions perform best and yield almost indistinguishable BER curves. The LD detector performs worst. For fixed N, as M increases, all the BER curves converge. The effect of error propagation in the BLAST schemes is shown to be non-negligible.
This paper considers the problem of detecting ground moving targets in a wireless sensor network for military surveillance application. The sensor nodes are severely constrained in both power and computational perform...
详细信息
This paper considers the problem of detecting ground moving targets in a wireless sensor network for military surveillance application. The sensor nodes are severely constrained in both power and computational performance, and the battle field environments are commonly very complicated. A modified order statistic constant false alarm rate (OS-CFAR) detection algorithm was chosen to be implemented on sensor nodes. The algorithm includes background estimate and adaptive threshold. The experimental results with real acoustic and seismic data indicate that this algorithm is robust and flexible.
Detecting rocks in images is a valuable capability for autonomous planetary science. Rock detection facilitates selective data collection and return. It also assists with image analysis on Earth. This work reviews sev...
详细信息
Detecting rocks in images is a valuable capability for autonomous planetary science. Rock detection facilitates selective data collection and return. It also assists with image analysis on Earth. This work reviews seven rock detection algorithms from the autonomous science literature. We evaluate each algorithm with respect to several autonomous geology applications. Tests show the algorithms' performance on Mars Exploration Rover imagery, terrestrial images from analog environments, and synthetic images from a Mars terrain simulator. This provides insight into the detectors' performance under different imaging conditions.
暂无评论