Pairwise constraints have been successful to be applied in traditional clustering methods. However, little progress has been made in incorporating them into spectral clustering. In this paper, we propose a new method ...
详细信息
In the detection of change objects of SAR images, regard to the images containing high intensity noise, traditional methods will produce a considerable false alarm. This paper presents a new method of change detection...
详细信息
The nonlocal (NL) means filter as a recent denoising approach has demonstrated its empirical merit for additive Gaussian noise. In this paper, a new nonlocal means despeckling method for synthetic aperture radar (SAR)...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is p...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is presented for contour extraction in this paper. Two mechanisms of contextual modulation, surround suppression and collinear facilitation, are integrated in this model. We obtain good results via this model to extract contours from images with noise and texture backgrounds. This work provides a biologically motivated approach with great potential for computer vision.
It is commonplace for the lack of labeled data in novel domains on medical image computer-aided diagnosis but there have been some labeled data or prior knowledge in old correlative domains. In this paper, instance-tr...
详细信息
The performance of the traditional clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, Projection Pursuit w...
详细信息
In this paper we propose a novel spectral clustering algorithm called Immune Greedy Spectral Clustering Algorithm, which introduces immune clone selection algorithm instead of greedy selection to choose a subset befor...
详细信息
This paper presents a parallel artificial immune model termed as tower master-slave model (TMSM) for solving optimising problems. Based on TMSM, the parallel immune memory clonal selection algorithm (PIMCSA) is also p...
详细信息
The target recognition accuracy of remote sensing images is not satisfied. The labels of images acquisition and recollecting are difficult and expensive. In order to solve the problem, we introduce transfer learning i...
详细信息
The cooperative behaviors of players on weighted networks are investigated by incorporation of trust mechanisms into a well-accepted game model, i.e., the networked prisoner’s dilemma game, afterwards some weight-upd...
详细信息
The cooperative behaviors of players on weighted networks are investigated by incorporation of trust mechanisms into a well-accepted game model, i.e., the networked prisoner’s dilemma game, afterwards some weight-updating schemes are designed according to the credit records. Despite the differences in network topologies and strategy updating protocols, a simple yet significant principle surfaces that, to promote the emergence of cooperation over abundant weighted networks, only the latest credit record of partners is required to be taken into consideration, whereas incorporating more previous records may even deteriorate the cooperation performance. To support such an appealing principle, we have investigated more deeply into the role of credit records so as to give a detailed explanation underlying it. The virtue of this work lies in providing insights into the effective usage of the currently available credit records.
暂无评论