Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
In image/video processing software and hardware products, low complexity interpolation algorithms, such as cubic and splines methods, are commonly used. However, these methods tend to blur textures and produce jaggy e...
详细信息
In this paper we propose a method to estimate the InSAR interferometric phase using the correlation weight subspace projection technique. In the method the correlation weight data vector is constructed, thus the noise...
详细信息
Aiming at the problem of high false alarm rate and missing rate with single detection method, an improved target detection algorithm for crashed plane detection is proposed in this paper. The method firstly detects th...
详细信息
We propose a novel locality sensitive vocabulary coding scheme to extract compact descriptors for low bit rate visual search. We employ Latent Dirichlet Allocation (LDA) to learn the topic vocabularies of lower dimens...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
Mining frequent itemsets is a core problem in many data mining tasks, most existing works on mining frequent itemsets can only capture the long-term and static frequency itemsets, they do not suit the task whose frequ...
详细信息
In the cyber-physical society, networks are constructed for information transportation. Among them, power law networks with the scale free property are extensively found in self-organized systems. The dynamicity of th...
详细信息
In the cyber-physical society, networks are constructed for information transportation. Among them, power law networks with the scale free property are extensively found in self-organized systems. The dynamicity of the cyber-physical society drives large-scale networks keeping interacting and evolving. Several networks can be integrated or merged into one network during the evolving process of the whole cyber-physical society either because they share the same nodes or because one network is trying to connect to the other. A natural question is that in what way two or more networks will merge with each other so that their previous scale-free properties still hold. In this paper, we conducted a set of simulation experiments to study the effects of different merging processes on the degree distribution of merged networks. The result can be used to understand the merging process of complex networks in the cyber-physical society and also can be used to design an integration strategy for multiple networks.
Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl...
详细信息
In this paper, we propose a new image coding scheme which combines the advantage of hierarchical (i.e. multi-resolution) representation, adaptive interpolation and rate-distortion optimization capability of block-base...
详细信息
暂无评论