Notice of Violation of IEEE Publication Principles “Image Fusion Based on Multi-scale Kalman Filtering” by Tongzhou Zhao, Yanli Wang, Haihui Wang in the Proceedings of the Second International Workshop on Education ...
Notice of Violation of IEEE Publication Principles “Image Fusion Based on Multi-scale Kalman Filtering” by Tongzhou Zhao, Yanli Wang, Haihui Wang in the Proceedings of the Second International Workshop on Education technology and Computer Science, March 2010, pp. 207-215 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: “Radar Image Fusion by Multiscale Kalman Filtering” by G. Simone, F.C. Morabito, A. Farina in the Proceedings of the Third International Conference on Information Fusion, July 2000, pp. 10-17 An image fusion algorithm, based on the Multiscale Kalman Filter (MKF), has been applied to combine remotely sensed data, acquired by radars having different resolutions and can improved information carried by each input image. The considered images have been acquired during the AIRSAR Mission and SIR-C/X-SAR Mission. The data have been co-registered to refer each pixel of each image to a common regular grid. The image fusion algorithm has been tested, and the merged images have been presented at different resolutions. A lineament detection algorithm based on the Hough transform, has been applied to the full resolution input data and to the full resolution merged data. The Golden Gate bridge has been detected in both images, but the computed probability of false alarm is lower in the case of the finest scale merged image than in the finest scale input image. This fact demonstrates that the knowledge provided by the
Discrete Tchebichef moments have been used in some recent image processing applications due to their advantage of preserving the analytical properties. However, the computation of Tchebichef moments is time-consuming....
详细信息
Discrete Tchebichef moments have been used in some recent image processing applications due to their advantage of preserving the analytical properties. However, the computation of Tchebichef moments is time-consuming. This paper presents a fast Tchebichef transform algorithm for binary images represented by Image Block Representation (IBR). The new algorithm calculates Tchebichef moments of an image by accumulating Tchebichef moments of the images corresponding to the blocks in the IBR of this image, and hence improves the computational efficiency. The experimental results in this paper show performance improvement over existing techniques in terms of CPU elapsed time.
It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To s...
详细信息
In this paper, we studied respectively the relationship among the data and information, information, knowledge and strategy content, combining with the decision-making process of human beings on understanding and opti...
详细信息
In this paper, we studied respectively the relationship among the data and information, information, knowledge and strategy content, combining with the decision-making process of human beings on understanding and optimizing the world. We also discussed variety representations of knowledge, and focused on analysis of object-oriented knowledge representation and put forward the basic description framework, summarizing the process that information, knowledge and intelligence are formed, which provided an important way for exploring the mechanism of intelligence.
A new method based on Fourier transform and coherence function was used to identify pure liquid precursor chemicals in this paper. Feature scattering spectra of several kinds of pure liquid precursor chemicals were de...
详细信息
A new method based on Fourier transform and coherence function was used to identify pure liquid precursor chemicals in this paper. Feature scattering spectra of several kinds of pure liquid precursor chemicals were detected through energy-dispersive X-ray scattering (EDXRS). These spectra, each of which was unique to particular liquid in the same case, were processed with coherence function after truncation and wavelet denoising. A suitable frequency was proved useful in calculation of similarity for liquid identification. In this work, the method mentioned above showed to be useful and effective to identify the unknown liquid materials whose samples were saved in the database.
A method based on energy dispersive X-ray diffraction (EDXRD) spectrum of illicit objects of complex background using coherence function was proposed. After theoretical analysis and calculation of the coherence functi...
详细信息
A method based on energy dispersive X-ray diffraction (EDXRD) spectrum of illicit objects of complex background using coherence function was proposed. After theoretical analysis and calculation of the coherence function, we got the best extracting frequency and the numbers of segment, and the results can also ensure that the requirements of resolution and smoothness. Then, the spectra of EDXRD of several samples of complex background were identified by coherence function, which method has been proved effective and reasonable in identifying the presence of suspicious objects packaged with complex background.
Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important appli...
详细信息
Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential mining techniques is web usage mining, for mining web log accesses, which the sequences of web page accesses made by different web users over a period of time, through a server, are recorded. Web access pattern tree (WAPtree) mining is a sequential pattern mining technique for web log access sequences. This paper proposes a more efficient approach for using the BFWAP-tree to mine frequent sequences, which reflects ancestordescendant relationship of nodes in BFWAP tree directly and efficiently. The proposed algorithm builds the frequent header node links of the original WAP-tree in a Breadth-First fashion and uses the layer code of each node to identify the ancestordescendant relationships between nodes of the tree. It then, finds each frequent sequential pattern, through progressive Breadth-First sequence search, starting with its first Breadth-First subsequence event Experiments show huge performance gain over the WAP-tree technique.
Pulse wave is easily contaminated by noise when being sampled and processed. In order to extract and analyze the useful information involved, the paper presents a novel denoising algorithm based on empirical mode ...
详细信息
Pulse wave is easily contaminated by noise when being sampled and processed. In order to extract and analyze the useful information involved, the paper presents a novel denoising algorithm based on empirical mode decomposition (EMD) and independent component analysis (ICA).First, the signal is decomposed by EMD ,then a series of intrinsic mode functions (IMFs) and the remainder can be obtained. Second, ICA will be performed to separate independent components from IMFs. At last, these independent components will be used to reconstruct the pulse wave signal. By using the method, we are able to separate noise and estimate desired source signals from pulse wave signal. Experimental results substantiate the strong potential of the proposed method for pulse wave signal noise separation.
In this paper, the influence of skin in energy-dispersive X-ray diffraction (EDXRD) spectrum of heroin was studied using singular value decomposition (SVD). The spectra of pure heroin, skin and heroin covered by skin ...
详细信息
In this paper, the influence of skin in energy-dispersive X-ray diffraction (EDXRD) spectrum of heroin was studied using singular value decomposition (SVD). The spectra of pure heroin, skin and heroin covered by skin were organized as matrices for SVD after truncation and smoothing. It was demonstrated that the two largest singular values and their corresponding left and right singular vectors of each matrix could reconstruct the matrix in the permissible error and contained enough information of the matrix. We extracted the two largest singular values of each matrix as two dimensions of the feature point of the corresponding spectrum. The feature points of different samples were clustered and a linear relationship was proved to be between and movement of feature point and thickness of component of skin, such as fat and muscle. This indicated that the method of SVD may be suitable for identification of heroin covered by skin.
暂无评论