An efficient SAR image fusion algorithm for multi-polarimetric images based on Directionlets transform is proposed. Directionlets transform is a new lattice-based multi scale analysis anisotropic multi-directional wav...
详细信息
ISBN:
(纸本)9781612847719
An efficient SAR image fusion algorithm for multi-polarimetric images based on Directionlets transform is proposed. Directionlets transform is a new lattice-based multi scale analysis anisotropic multi-directional wavelet transform. Firstly, several polarimetric images can be decomposed into low frequency coefficients and high-frequency coefficients with multi scales and multi-directions using the Directionlets transform. For the low-frequency coefficients, the average fusion method is used. For the each directional high frequency sub-band coefficients, the directive contrast and the larger value of region variance information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused Directionlets coefficients. Experimental results show that compared with traditional algorithm, the proposed algorithm can get better visual effect and the significant information of original image like textures and contour details is well maintained.
In wireless communication, the cooperative communications technology has been concern because of its advantages of spatial diversity. In particular, cooperative communication with a single relay is a simple, practical...
详细信息
In wireless communication, the cooperative communications technology has been concern because of its advantages of spatial diversity. In particular, cooperative communication with a single relay is a simple, practical technology for wireless sensor networks. In this paper, we analyze several simple network topologies. Under the condition of equal power allocating, the optimum relay locations are respectively determined by using symbol error rate (SER) formula. And these types of topologies are compared, the analysis results show that, Linear network topology has the best system performance, the system performance of isosceles triangle topology is better than that of equilateral triangle topology.
Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is...
详细信息
Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is used to detect the EOG pulses generated by blinking, and then transmit them wirelessly via Bluetooth to PC. Three modules are contained in the system, which are the wireless communication module, EOG recognition module and the multimedia control module, respectively. The system can be used as an assistant for the disable persons, also can be used for amusement among normal people. It is feasible to put the system into practical use due to its security and convenience.
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propo...
详细信息
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propose a novel framework to deal with this obstacle. The proposed framework consists of four major components: feature pool construction, pre-filtering, modeling, and classification. First, a large low-level feature pool is constructed, from which a specific set of features are selected for the latter steps automatically or semi-automatically. Then, to deal with the unbalance problem in training set, a pre-filtering classifier is generated, which aim at achieving a high recall rate and a certain precision rate nearly 50% for a certain concept. Thereafter, from the pre-filtered training samples, a SVM classifier is built based on the selected features in the feature pool. After that, the SVM classifier is applied to classification of semantic concept. This framework is flexible and extensible in terms of adding new features into the feature pool, introducing human interactions on selecting features, building models for new concepts and adopting active learning.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
SVM (Support Vector Machines) is a novel algorithm of machine learning which is based on SLT (Statistical Learning Theory). It can solve the problem characterized by nonlinear, high dimension, small sample and local m...
详细信息
SVM (Support Vector Machines) is a novel algorithm of machine learning which is based on SLT (Statistical Learning Theory). It can solve the problem characterized by nonlinear, high dimension, small sample and local m...
详细信息
SVM (Support Vector Machines) is a novel algorithm of machine learning which is based on SLT (Statistical Learning Theory). It can solve the problem characterized by nonlinear, high dimension, small sample and local minimizing perfectly. For non-linear problem, the forecasting technique of FCTR (First classification, then regression) was proposed, based on the classification approach of SVM and has carried on the simulation experiment. The experiment shows that the fitting value which obtains using the return to first would be more precise than directly. Using this method to food production forecast, its accuracy is superior to other production forecasting methods.
暂无评论