Under some special conditions, the P3P problem can have 1, 2, 3 and 4 solutions, and if the 3 control points and the optical center lie on a circle, the problem is indeterminate. In this paper, by the Monte Carlo appr...
详细信息
Under some special conditions, the P3P problem can have 1, 2, 3 and 4 solutions, and if the 3 control points and the optical center lie on a circle, the problem is indeterminate. In this paper, by the Monte Carlo approach of up to 1 million samples, it is shown that the probabilities of the P3P problem with one solution, two solutions, three solutions, and four solutions are respectively 0.9993, 0.0007, 0.0000, 0.0000. The result confirms the well-known fact that in the most cases, the P3P has a unique solution.
A novel video scrambling algorithm based on generalized Fibonacci numbers is given in this paper. The experiment results show that the algorithm has better robust than the traditional video scrambling algorithm. Based...
详细信息
ISBN:
(纸本)9780889867024
A novel video scrambling algorithm based on generalized Fibonacci numbers is given in this paper. The experiment results show that the algorithm has better robust than the traditional video scrambling algorithm. Based on the property of uniformity of the corresponding Fibonacci transformation, the suggested method has the following advantages: (1) Encoding and decoding are very simple and they can be applied in real-time situations. (2) The algorithm can endure severe attacks such as extreme noise levels, very high loss in its data or data packets. (3) The algorithm is independent on any video format or encode mode.
The Based on the background of anti counterfeit of commercial bills, a novel digital watermarking method is proposed in this paper. The watermarking algorithm is based on a class of orthogonal function systems - V sys...
详细信息
Two-dimensional principal component analysis (2DPCA) for face recognition has been proposed which is based on 2D matrices. It needs more coefficients for feature vectors than principal component analysis (PCA). In thi...
详细信息
Refinement is a necessary and effective step in some node localization schemes of wireless sensor networks (WSN). Suitable refinement procedure can improve the node localization accuracy and raise the robustness of th...
详细信息
ISBN:
(纸本)9780863418365
Refinement is a necessary and effective step in some node localization schemes of wireless sensor networks (WSN). Suitable refinement procedure can improve the node localization accuracy and raise the robustness of the localization algorithm. However, most existing refinement algorithms are costly duo to complex computation and frequent communication, and may induce serious coverage problem duo to nonconvergent iterations. In view of above facts, Steepest descent method is proposed to be used as the refinement algorithm in this paper, and corresponding simulation experiments are done to testify its feasibility and validity. The results show that steepest descent method can optimize the node positions to a fairish accuracy extent, and compared with existing refinement methods, it outperforms in communication cost, computation cost, and coverage rate.
The software systems which are related to national science and technology projects are very crucial. This kind of systems always involves high technical factors and has to spend a large amount of money, so the quality...
详细信息
The software systems which are related to national science and technology projects are very crucial. This kind of systems always involves high technical factors and has to spend a large amount of money, so the quality and reliability of the software deserve to be further studied. Hence, we propose to apply four intelligent classification techniques most used in data mining fields, including Bayesian belief networks (BBN), nearest neighbor (NN), rough set (RS) and decision tree (DT), to validate the usefulness of software metrics for risk prediction. Results show that comparing with metrics such as Lines of code (LOC) and Cyclomatic complexity (V(G)) which are traditionally used for risk prediction, Halstead program difficulty (D), Number of executable statements (EXEC) and Halstead program volume (V) are the more effective metrics as risk predictors. By analyzing obtained results we also found that BBN was more effective than the other three methods in risk prediction.
Classification of multi-source remote sensing images has been studied for decades, and many methods have been proposed or improved. Most of these studies focus on how to improve the classifiers in order to obtain high...
详细信息
Classification of multi-source remote sensing images has been studied for decades, and many methods have been proposed or improved. Most of these studies focus on how to improve the classifiers in order to obtain higher classification accuracy. However, as we know, even if the most promising method such as neural network, its performance not only depends on the classifier itself, but also has relation with the training pattern (i.e. features). On consideration of this aspect, we propose an approach to feature selection and classification of multi-source remote sensing images based on Mallat fusion and residual error in this paper. Firstly, the fusion of multi-source images can provide a fused image which is more preferable for classification. And then a featureselection scheme approach based on fused image is proposed, which is to select effective subsets of features as inputs of a classifier by taking into account the residual error associated with each land-cover class. In addition, a classification technique base on selected features by using a feed-forward neural network is investigated. The results of computer experiments carried out on a multisource data set confirm the validity of the proposed approach.
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as images with defocusing, motion blur, oc...
详细信息
ISBN:
(纸本)9784901122078
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as images with defocusing, motion blur, occlusion etc.) is a challenging task. In this paper, a detailed method to solve this problem is proposed. This method is implemented in three main steps: first, segment the rough pupil region based on Gaussian Mixture Model according to the gray level distribution of eye image;then modify the rough segmentation result using morphological method to minimize the influence of some disturbing factors;last step is to estimate the pupil parameters based on minimizing the least square error. The proposed method is first tested on CASIA iris image dataset, and then on our self-captured iris dataset which with more varieties. Experiments show that the proposed method can perform well for non-ideal eye images of various qualities.
Iris image quality assessment is an important part of iris recognition system because the qualities of iris images would largely influence the recognition results. In this paper, we analyze and compare several represe...
详细信息
ISBN:
(纸本)9784901122078
Iris image quality assessment is an important part of iris recognition system because the qualities of iris images would largely influence the recognition results. In this paper, we analyze and compare several representative quality assessment methods, and then propose an effective method based on Laplacian of Gaussian operator for iris image assessment. Through computer simulations of several typical algorithms on our iris image database, SJTU-IDB, the proposed method is shown superior to the compared quality assessment methods.
Two medieval Slavonic manuscripts are recorded, investigated and analyzed by philologists in collaboration with computer scientists. The aim of the project is to develop algorithms that support the philologists by aut...
详细信息
暂无评论