Empirical mode decomposition (EMD) provides a powerful tool for adaptive multiscale analysis of nonstationary signals. Bidimensional empirical mode decomposition (BEMD) techniques decompose an image into several bidim...
详细信息
ISBN:
(纸本)9781467391672
Empirical mode decomposition (EMD) provides a powerful tool for adaptive multiscale analysis of nonstationary signals. Bidimensional empirical mode decomposition (BEMD) techniques decompose an image into several bidimensional intrinsic mode functions (BIMFs) and a bidimensional residue (BR). Firstly, several polarization images can be decomposed into several BIMFs with multi-scales using BEMD. For the BIMF coefficients, the teager energy-based method is used. For the each BIMF coefficients, the area-based teager energy larger value of information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused image. Experimental results show that the proposed algorithm gives more satisfactory results than the traditional image fusion algorithms in preserving the edges and texture information.
Since the existing full-rate cooperative transmission schemes have a serious defect in low Bit Error Rate (BER) performance while the existing high-rate cooperative transmission schemes have a serious defect in low sp...
详细信息
Since the existing full-rate cooperative transmission schemes have a serious defect in low Bit Error Rate (BER) performance while the existing high-rate cooperative transmission schemes have a serious defect in low spectral efficiency, a distributed high-rate cooperative relay transmission scheme based on full-rate cooperative communication model is proposed in this paper, in which Cyclic Delay Diversity (CDD) technology and Linear Constellation Precoding (LCP) technology are employed. Moreover, the proposed scheme addresses the issue of obtaining maximum spatial and multipath diversity with low decoding complexity and high transmission reliability. The BER performance of the proposed scheme is contrasted to that of the full-rate transmission scheme where better performance is achieved, and is improved when the number of the multipath or the relay nodes increases.
Since the single-antenna relay cooperative communication systems have a serious defect in reliability of data transmission, while the MIMO communication systems have difficulty in design and decoding, we propose a mix...
详细信息
Since the single-antenna relay cooperative communication systems have a serious defect in reliability of data transmission, while the MIMO communication systems have difficulty in design and decoding, we propose a mixed structure of full-rate and low-detection complexity cooperative relay transmission scheme based on full-rate relay cooperative transmission model, which combines the advantages of cyclic delay diversity (CDD) technology and linear constellation precoding (LCP) technology. This scheme can excavation diversity gain by using single antenna terminal and multiple antenna simultaneously, moreover, the decoding complexity is low. The bit error rate (BER) performance is improved with the number of the antenna or the multipath or the relay nodes increases.
IEEE 802.11 is a protocol standard widely used in wireless local area network (WLAN). For the distributed coordination function (DCF) of IEEE 802.11 MAC layer, the binary exponential backoff (BEB) algorithm has the de...
详细信息
IEEE 802.11 is a protocol standard widely used in wireless local area network (WLAN). For the distributed coordination function (DCF) of IEEE 802.11 MAC layer, the binary exponential backoff (BEB) algorithm has the defect of poor access fairness. To address this issue, the design criteria of backoff algorithm is generalized from the analysis of the key performance parameters of DCF, and then a logarithmic backoff (LB) algorithm based on dynamic contention window (CW) adjustment is proposed. The algorithm dynamically adjusts the initial value of CW and the backoff size of the CW by using the logarithmic function that takes the number of network competing nodes as the variable. Simulation results show that compared with the BEB algorithm, the LB algorithm can effectively improve the fairness performance and the throughput performance, and also reduce network delay.
Multiple-Instance Learning (MIL) is used to predict the unlabeled bags' label by learning the labeled positive training bags and negative training *** bag is made up of several unlabeled instances.A bag is labeled ...
详细信息
Multiple-Instance Learning (MIL) is used to predict the unlabeled bags' label by learning the labeled positive training bags and negative training *** bag is made up of several unlabeled instances.A bag is labeled positive if at least one of its instances is positive,otherwise *** multiple-instance learning methods with instance selection ignore the representative degree of the selected *** example,if an instance has many similar instances with the same label around it,the instance should be more representative than *** on this idea,in this paper,a multiple-instance learning with instance selection via constructive covering algorithm (MilCa) is *** MilCa,we firstly use maximal Hausdorff to select some initial positive instances from positive bags,then use a Constructive Covering Algorithm (CCA) to restructure the structure of the original instances of negative *** an inverse testing process is employed to exclude the false positive instances from positive bags and to select the high representative degree instances ordered by the number of covered instances from training ***,a similarity measure function is used to convert the training bag into a single sample and CCA is again used to classification for the converted *** results on synthetic data and standard benchmark datasets demonstrate that MilCa can decrease the number of the selected instances and it is competitive with the state-of-the-art MIL algorithms.
Randomized cyclic delay diversity (RCDD) is an effective means to capture both the space diversity and the frequency diversity with low complexity detection over frequency-selective fading channels. Since many existin...
详细信息
Multi-objective optimization algorithms have demonstrated their effectiveness and efficiency in detecting community structure in complex networks, by which a set of trade-off partitions of networks are obtained instea...
详细信息
Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations ...
详细信息
Collaboration among authors is a pervasive phenomenon currently. Mining useful information from cooperation is a significant study to unravel relationships underneath these papers and predict potential collaborations or future popular academic topics. This paper demonstrates the change of Structural Holes in the whole network and for some individual authors from 2009 to 2012 in ICML. This paper is going to study the biggest subset in 2009, which separates into several smaller subsets with less structural holes in 2010 and 2011, while the number of structural holes in 2012 increases. The graphs of the whole networks from 2009 to 2012 drawn by Ucinet are going to demonstrate the changes of structural holes from 2009 to 2012 and expl the reason why there are more structural holes in 2012 compared to 2010 and 2011. The reason is that the ainnumber of authors in 2012 increases about 50 percent compared to 2011, which results in that authors need to find new collaborations and leaders may become intermediaries to connect new authors and existing authors occupying structural holes. And some authors whose papers are published on ICML continuously from 2009 to 2012 are going to be analysed to indicate the changes of their position in the network. Some authors are increasingly constrained in certain groups, while some other authors become bridges connecting different groups and some other authors changes are correspond to the changes of the whole network. They are constrained in certain subset with less structural holes in 2010 and 2011 but, due to large number of authors joining in ICML, more likely to occupy more structural holes.
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, ...
详细信息
ISBN:
(纸本)9781467372190
The research of the relationship between eye-movement and human activity has become a hot spot in the field of the human-computer interaction. In order to recognize the eye-movement patterns related to reading tasks, an algorithm based on electrooculogram(EOG) has been proposed in this paper. In the proposed approach, wavelet packet decomposition was firstly used to smooth EOG signals during reading tasks, and then, according to the predefined coding strategy, the smoothed EOG waveform is translated into a coding string to represent current reading state. Finally, Levenshtein distance is employed to measure the similarity of the template string and the output string. The experiments under the experimental paradigms of autonomy-reading and stimulus-reading and reading with rest state have been carried out. The mean accurate has reached 90%. The experimental results indicate that the proposed algorithm can effectively recognize human reading activity state.
Speech enhancement is crucial for speech recognition accuracy. How to eliminate the effect of the noise constitutes a challenging problem in speech processing. This paper presents a new technique for speech enhancemen...
详细信息
暂无评论