Research in texture recognition often concentrates on recognizing textures with intraclass variations such as illumination, rotation, viewpoint and small scale changes. In contrast, in real-world applications a change...
详细信息
At present, in related image processing field, the fuzzy set theory has also gained more successful applications to some extent. The image processing based on the fuzzy theory is an important research area. The inform...
详细信息
At present, in related image processing field, the fuzzy set theory has also gained more successful applications to some extent. The image processing based on the fuzzy theory is an important research area. The information loss brought by 3D object projection in 2D image plane makes the image have the ambiguity exist in essence, thus there exists ambiguity when defining image characteristics such as the border, area and texture, therefore, because of the complexity of the image itself, uncertainty and inaccuracy or ambiguity may occur in the different stages of the processing. The algorithm in this paper improves the degree of membership function to make it suitable for the image fuzzy enhancement. The membership function curve is S-shaped, and at the inflection point, the function value on the left side drops rapidly while the function value on the right side rapidly rises. There is certain symmetry about the inflection point, and the function inflection point position can be decided by changing function parameters, and better enhancement effect can be gained by a small amount of iteration. By the experimental simulation, it is verified that the enhanced color image by adopting the method in this paper is bright in color on the visual effect with moderate increasing proportion of brightness and contrast, and best color maintaining performance and minimum chromaticity change, and also the image information entropy is improved when compared with the original image data.
This paper presents a novel image fusion method based on nonsubsampled shearlet transform (NSST) and block-based random image sampling for infrared and visible images. In the method, the NSST is firstly performed on e...
详细信息
This paper presents a novel image fusion method based on nonsubsampled shearlet transform (NSST) and block-based random image sampling for infrared and visible images. In the method, the NSST is firstly performed on each of the source images to obtain their low frequency and high frequency subbands coefficients. Then the low frequency coefficients are fused by combing the block-based random image sampling and the sliding widow technique, while the high frequency coefficients are fused using classical absolute value maximum choosing rule. The fused image is reconstructed though performing the inverse NSST. The experiments are carried out on five pairs of infrared and visible images using five traditional fusion methods to verify the effectiveness and efficiency of the proposed method and by comparing the fused results visually and objectively it is demonstrated that the proposed fusion method is competitive or even superior to the other wellknown methods.
Image enhancement, as a means of digital image processing, often is fuzzy. Based on defects of excessive enhancement and insufficient detail enhancement existing in the traditional image enhancement method, this paper...
详细信息
Image enhancement, as a means of digital image processing, often is fuzzy. Based on defects of excessive enhancement and insufficient detail enhancement existing in the traditional image enhancement method, this paper proposes a self-adaptive image enhancement method based on variable fuzzy sets, and such method can, according to the image's gray-scale properties, introduce the relative gray-scale level of the pixel as the fuzzy feature, and adopt the improved membership function to conduct the fuzzy enhancement, thus avoiding the loss of a great deal of gray-scale information after the enhancement. The paper also introduces the selection of optimal parameters, ensures the quality of the image enhanced and improves the feasibility and efficiency of this algorithm. This algorithm, on the basis of keeping the image's original brightness, enhances the image details at the same time. Experimental results show that such algorithm can obtain good visual effect and more obvious detail information.
The dual of the Kasami code of length q2 − 1, with q a power of 2, is constructed by concatenating a cyclic MDS code of length q + 1 over Fq with a Simplex code of length q − 1. This yields a new derivation of the wei...
Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares(RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one or...
详细信息
Due to the large error of LMS algorithm and the slow convergence rate, the recursive least squares(RLS) algorithm is proposed. Although the recursive estimation error is greatly reduced, the convergence rate is one order of magnitude higher than that of the general LMS filter. When the order N increases, the amount of calculation for a single iteration of the RLS algorithm is increased significantly. Aiming at these problems, this paper proposes an improved FTRLS filtering algorithm, which is to find out the amount of large error and accumulate the error, and then make the error feedback to make the algorithm more stable. The analysis of MATLAB simulation results show that the improved algorithm can improve the convergence speed and stability of the algorithm, and effectively reduce the convergence of the noise.
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmissi...
详细信息
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic *** be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading *** proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping *** comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective *** derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading *** results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage ***,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
The community detection was performed from the perspective of links, and we proposed an inhibition method against social network worms. Firstly, a community detection algorithm was proposed, which based on link cluste...
详细信息
The community detection was performed from the perspective of links, and we proposed an inhibition method against social network worms. Firstly, a community detection algorithm was proposed, which based on link clustering, and we got related link incremental information through the network structure information at various time points. In order to obtain the link communities, we adopted an improved link partition density function to dispose the link incremental information. Next, we gave three selection strategies of key nodes in community and proposed corresponding worm inhibition method. Finally, on the basis of real web data sets, we applied community detection and worm inhibition experiments to prove validity of algorithm in this paper.
Multiple spacecraft formation flying is an important concept for future deep-space exploration missions. It requires reliable techniques for the control of formation configuration. This paper addresses the control pro...
详细信息
ISBN:
(纸本)9781538629024
Multiple spacecraft formation flying is an important concept for future deep-space exploration missions. It requires reliable techniques for the control of formation configuration. This paper addresses the control problem of spacecraft formation flying around the Sun-Earth L 2 libration point utilizing the framework of the circular restricted three-body problem (CR3BP). A leader/follower formation scheme consisting of one leader and three follower spacecraft is considered. The leader spacecraft is assumed to be in a fixed Halo orbit. The position of each follower spacecraft relative to the leader is controlled to be a constant using an active disturbance rejection control (ADRC) method. In this method, the unknown dynamics and external disturbances of the formation flying system are estimated by an extended state observer (ESO), and a nonlinear state error feedback control law is used to compensate for them in real time. Perturbative forces due to solar radiation pressure and the eccentric nature of the Earth's orbit are modeled as external disturbances. Numerical simulations and comparisons with an existing method show that desired formations are obtained with high accuracy using the proposed ADRC method.
In order to improve coverage and load balancing in cellular networks,CRE(Cell Range Expansion)which is introduced in LTE-Advanced has drawn significant ***,the ping-pong effect resulting from cell handover is still ...
详细信息
In order to improve coverage and load balancing in cellular networks,CRE(Cell Range Expansion)which is introduced in LTE-Advanced has drawn significant ***,the ping-pong effect resulting from cell handover is still a *** this paper,we propose a new dynamic smooth handover method based on transition zones for the celledge users to deal with the ping-pong *** cells’boundaries extend to transition zones within which the users do not switch serving *** the other hand,the range of the transition zones can be adjusted depending on performance *** results show that our proposed method is near optimum throughput and traffic load performance without the ping-pong effect.
暂无评论