Visually salient object or region detection in images is an active research field in recent years. Inspired by that curvelets can provide multi-scale sparse representation of objects with edges and textures, in this p...
详细信息
ISBN:
(纸本)9781509028610
Visually salient object or region detection in images is an active research field in recent years. Inspired by that curvelets can provide multi-scale sparse representation of objects with edges and textures, in this paper, we propose a novel saliency detection model based on fast discrete curvelet transform (SDCT) to detect more compact salient objects in an image. First, fast discrete curvelet transform is used to acquire multi-scale representation of feature maps in CIElab.color space. Then the feature maps are transformed to feature salient maps based on dissimilarity measure between patches in a global manner. Finally, the complementary feature salient maps at each scale and each color channel are merged linearly to obtain unitary saliency map. Experimental results on MSRA saliency benchmark database show that the proposed SDCT model outperforms the most state-of-the-art saliency detection models in spatial and frequency domain with higher overall performance, especially acquires more compact salient object and suppresses background saliency effectively, which is desirable for many computer vision applications.
network coding allows network node to process data by the traditional method of data forwarding, which can effectively improve network throughput, robustness and reliability. In this paper, we propose an improved floo...
详细信息
We propose a protocol for directly measuring the concurrence of a two-qubit electronic pure entangled state. To complete this task, we first design a parity-check measurement(PCM) which is constructed by two polariz...
详细信息
We propose a protocol for directly measuring the concurrence of a two-qubit electronic pure entangled state. To complete this task, we first design a parity-check measurement(PCM) which is constructed by two polarization beam splitters(PBSs) and a charge detector. By using the PCM for three rounds, we can achieve the concurrence by calculating the total probability of picking up the odd parity states from the initial states. Since the conduction electron may be a good candidate for the realization of quantum computation, this protocol may be useful in future solid quantum computation.
We describe an entanglement purification protocol for a polarization Bell state. Different from the previous protocols,it does not require the controlled-not gate, and only uses linear optical elements to complete the...
详细信息
We describe an entanglement purification protocol for a polarization Bell state. Different from the previous protocols,it does not require the controlled-not gate, and only uses linear optical elements to complete the task. This protocol requires multi-copy degraded mixed states, which can make this protocol obtain a high fidelity in one purification step. It can also be extended to purify the multi-photon Greenberger–Horne–Zeilinger(GHZ) state. This protocol may be useful in future long-distance communication.
Traditional mobile communication systems mainly work on the licensed frequency band near or below 3 GHz;however,this band is becoming increasingly *** the other hand,there are abundant unlicensed spectrum resources in...
详细信息
Traditional mobile communication systems mainly work on the licensed frequency band near or below 3 GHz;however,this band is becoming increasingly *** the other hand,there are abundant unlicensed spectrum resources in higher frequency bands,e.g.,6 GHz,15 GHz,and 28 GHz,and if those bands are applied,the current spectrum shortage problem could be effectively ***,the wireless channel characteristics and models are important but still unknown,and thus in this study,extensive measurements and modeling have been conducted to study the characteristics of the high-frequency 15-GHz ***,a PN(Pseudo Noise)sequence based time-domain measurement system was built and applied to measure the propagation characteristics of the LOS(Line-of-Sight)and NLOS(Non-Line-of-Sight)scenarios in an indoor corridor at 15 ***,in-depth analysis and modeling on the large-scale characteristics of wireless channels,the relationship between distance and path loss,the path loss exponent,and the shadow fading standard variance are ***,the relationship between received power and different elevation angles was *** the measurement,two 25-dBi horn antennas with a 10 half-power beam width are used to change elevation angles in the transmitting terminal and azimuth angles in the receiving terminal for all measurement *** findings and results in this work will serve as a reference and basis for future theoretical studies of the 15-GHz band.
WiFi signals have attracted extensive attention for context-aware due to its ubiquity. Traditional WiFi sensing methods mainly adopt Received Signal Strength Indication (RSSI), however the coarse features hamper its e...
详细信息
With the development of computer technology and Biomedical Engineering, the image registering technology is widely used in healthcare and the disease diagnosis and clinical care demand higher registering precision and...
详细信息
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment b...
详细信息
In this paper, we proposed a hybrid encryption algorithm in order to solve the security problems on lightweight data on the cloud storage service. This paper first improves the RSA algorithm in the cloud environment by increasing the length of the RSA key to an extent that it can quickly generate big primes. Then, we merge AES and RSA algorithms on the basis of the improved RSA algorithm. This is called a hybrid encryption algorithm which is suitable for security of the lightweight data in cloud storage environment in order to further enhance the confidentiality of data in the cloud. The experimental result shows that the hybrid encryption algorithm has advantages of fast encryption and decryption, more secure, and it is also able to settle the security problems of users' lightweight data in a certain extent.
This paper reports the design and analysis of a novel pyramidal horn antenna based on Micro Electro Mechanical Systems(MEMS) technology,which is used in terahertz(THz) *** structure of the antenna includes two parts,p...
详细信息
ISBN:
(纸本)9781510823808
This paper reports the design and analysis of a novel pyramidal horn antenna based on Micro Electro Mechanical Systems(MEMS) technology,which is used in terahertz(THz) *** structure of the antenna includes two parts,pyramidal horn structure and rectangle waveguide for feed,the fabrication of the structure needs only one wafer,and the antenna can be easily integrated with other parts of on-chip *** are many tunable parameters of the horn,so that high performance THz antenna can be achieved by optimizing these *** proposed antenna can be manufactured by MEMS processing with low fabrication cost,suitable for many terahertz systems.
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CF...
详细信息
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CFO is an entirely deterministic algorithm.
暂无评论