In many morphological shape decomposition algorithms, either a shape can only be decomposed into shape components of extremely simple forms or a time consuming search process is employed to determine decomposition. In...
详细信息
ISBN:
(纸本)9780769527765
In many morphological shape decomposition algorithms, either a shape can only be decomposed into shape components of extremely simple forms or a time consuming search process is employed to determine decomposition. In our paper, we present a morphological shape approximation algorithm that decomposes a two dimensional (2-D) binary shape into a collection of convex polygonal components. A single convex polygonal approximation for a given image is first identified. This first component is determined incrementally by selecting a sequence of basic shape primitives. These shape primitives are chosen based on shape information extracted from the given shape at different scale levels. Additional shape components are identified recursively from the difference image between the given image and the first component. Simple operations are used to repair certain concavities caused by the set difference operations. After decomposition the original shape can be reconstructed exactly by the union of all convex components and finer details can also be included. Our paper has been implemented using MA TLAB software.
The combination of the chaotic theory and the cryptography is an important study field of the image encryption. Classical Arnold cat map can change the position of image pixel points through iteration, but these pixel...
详细信息
Construction parts consisting of modern composite materials made of carbon fiber reinforced plastic (CFRP) laminates still need to be machined, whereby drill holes are frequently manufactured. Special attention has to...
详细信息
ISBN:
(纸本)0872638529
Construction parts consisting of modern composite materials made of carbon fiber reinforced plastic (CFRP) laminates still need to be machined, whereby drill holes are frequently manufactured. Special attention has to be paid to the machining quality, which implies dimensional accuracy as well as a defect-free peripheral zone. Machining defects often occur as a consequence of excessive mechanical and thermal loads, which are often caused by wrong process conditions or by the wrong choice of machining process itself. With respect to widely used state-of-the-art machine tools providing high performance and equipped with potent control unit, for the comparatively large drill hole, circular milling gains interest as an alternative to the drilling operation assisted by ultrasonic torsional mode vibration cutting. Here, the circular milling process Is compared to the drilling process focusing on the cutting of hole having 6 mm diameter to CFRP laminates. The research work highlights the tool wear, the dimensional accuracy and the defects, which occur in the peripheral zone.
Advanced design aims to achieve the best possible performance subject to operational constraints. Such questions can be formulated as optimization problems. The advantages of using an explicit optimization formulation...
详细信息
Aiming at the importance of the analysis for public opinion on Internet, the authors propose a high-performance extraction method for public opinion. In this method, the space model for classification is adopted to de...
详细信息
Aiming at the importance of the analysis for public opinion on Internet, the authors propose a high-performance extraction method for public opinion. In this method, the space model for classification is adopted to describe the relationship between words and categories. The combined feature selection method is used to remove noisy words from the original feature space effectively. Then the category weight of words is calculated by the improved formula combining the frequency of words and distribution of words. Finally, the class weights of the not-categorized documents based on the category weight of words are obtained for realizing opinion extraction. Experiment results show that the method has comparatively high classification and good stability.
A novel near infrared (NIR) modeling method-Laplacian regularized least squares regression (LapRLSR) was presented,which can take the advantage of many unlabeled spectra to promote the prediction performance of th...
详细信息
A novel near infrared (NIR) modeling method-Laplacian regularized least squares regression (LapRLSR) was presented,which can take the advantage of many unlabeled spectra to promote the prediction performance of the model even if there are only few calibration samples. Using LapRLSR modeling, NIR spectral analysis was applied to the online monitoring of the concentration of salvia acid B in the column separation of Salvianolate. The results demonstrated that LapRLSR outperformed partial least squares (PLS) significantly, and NIR online analysis was applicable.
In networked control systems, because of limits on communication rates, control waveforms are frequently piece-wise constant with limits on rates at which they can switch levels. It is, therefore, natural to expect ev...
详细信息
Wireless networked embedded systems are becoming increasingly important in a wide area of technical fields. In this tutorial paper we present recent results on the design of these systems and their use in control appl...
详细信息
In this paper, a hybrid simplex-improved genetic algorithm (HSIGA) which combines simplex method (SM) and genetic algorithm (GA) is proposed to solve global numerical optimization problems. In this hybrid algorithm so...
详细信息
In this paper, a hybrid simplex-improved genetic algorithm (HSIGA) which combines simplex method (SM) and genetic algorithm (GA) is proposed to solve global numerical optimization problems. In this hybrid algorithm some improved genetic mechanisms, for example, non-linear ranking selection, competition and selection among several crossover offspring, adaptive change of mutation scaling and stage evolution, are adopted; and new population is produced through three ap-proaches, i.e. elitist strategy, modified simplex strategy and improved genetic algorithm (IGA) strategy. Numerical experi-ments are included to demonstrate effectiveness of the proposed algorithm.
Phase-randomization is an important assumption in many security proofs of practical quantum key distribution (QKD) systems. Here, we present the first experimental QKD with reliable active phase-randomization. A polar...
详细信息
暂无评论