The FM modulation improves the anti-interference ability by sacrificing the bandwidth of the communication channel. In the underwater acoustic communication, as the bandwidth of the communication channel is very limit...
详细信息
Underwater acoustic (UWA) channel is a complex time-, space- and frequency-variant channel. So to realize the high efficiency and real-time transmission of image with great data quantity, it will refer to both source ...
详细信息
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced ...
详细信息
ISBN:
(纸本)9781424479276
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced first to simulate the intensity distribution of vessel lumen with different size in the longitudinal images. Then the Levenberg-Marquardt method is applied to fit the model within a series of region-of interests defined in the longitudinal image. The estimated parameters of the model are employed to define the boundary points of vessel lumen. The detected boundary points of vessel lumen in six longitudinal images are transformed to the cross-sectional planes in order to calculate the degree of stenosis according to the luminal areas. Our proposed method was evaluated in ten CCTA images with ten reported non-calcified stenosis. The degree of each stenosis was computed according to the luminal area and compared with the standard reference given by radiologists. Experimental results show that our method can estimate the degree of stenosis with a high accuracy.
In the literature of voice conversion(VC),the method based on statistical Gaussian mixture model(GMM)serves as a ***,one of the inherent drawbacks of GMM is well-known as discontinuity problem,which is caused by trans...
详细信息
In the literature of voice conversion(VC),the method based on statistical Gaussian mixture model(GMM)serves as a ***,one of the inherent drawbacks of GMM is well-known as discontinuity problem,which is caused by transforming features on a frame-by-frame basis,thus ignoring the dynamics between adjacent frames and fnally resulting in degraded quality of the converted speech.A variety of algorithms have been proposed to overcome this defciency,among which the state space model(SSM)based method provides some promising *** this paper,we proceed by presenting an enhanced version of the traditional SSM,namely,the switching SSM(SSSM).This new structure is more flexible than the conventional one in that it allows using mixture of components to account for the rapid transitions between neighboring ***,physical meaning of the model parameters of SSSM has been examined in depth,leading to efcient application-specifc training and transforming procedures of *** including both objective and subjective measurements were conducted to compare the performances of the conventional and the proposed SSM-based methods,which have convinced that obvious improvements in both aspects of similarity and quality can be obtained by SSSM.
Charging of large-scale electric vehicles will have a significantimpact on the grid sothat their charging schedule needs tobe optimized. The traditional centralized scheduling method requires high performance in infor...
详细信息
Charging of large-scale electric vehicles will have a significantimpact on the grid sothat their charging schedule needs tobe optimized. The traditional centralized scheduling method requires high performance in information exchange and computing. Based on the analysis of the features of electric vehicle charging load and the research of cloud computing, we propose a cloud computing based schedule platform for optimal charging of electric vehicles. In addition, the function and implementation of the three basic modules of the platform(the data collection module, the cloud computing center and the control center) are exposed. The platform performs well in optimal scheduling for electric vehicles. In addition, the platform can alsomake full use of the computing resource and reduce the communication congestion.
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper propose...
详细信息
ISBN:
(纸本)9781467349994
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper proposes the regular polygon path derived from Circle,which is the best determined *** upper-bound of the polygon and the localization scheme are presented,and the performance is evaluated by simulations.
The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-ba...
详细信息
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In t...
详细信息
Coverage enhancement is one of the hot research topics in wireless multimedia sensor networks. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propose...
详细信息
Coverage enhancement is one of the hot research topics in wireless multimedia sensor networks. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is proposed in multimedia sensor networks on the basis of the model whose pitch angle and deviation angle can be adjusted. Based on the proposed elliptical cone sensing model, we can derive the coverage area of the node and calculate the optimal pitch angle according the information of monitoring area and the nodes, and then the deviation angle is optimized based on co-evolution algorithm, which eliminate the overlapped and blind sensing area effectively. A set of simulations demonstrate the effectiveness of our algorithm in coverage ratio.
A palmprint based authentication system that can work with a popular webcam in non-contact acquisition mode is potentially a good choice for biometric ***,this camera based imaging acquisition mode causes the difficul...
详细信息
暂无评论