With the development of remote sensing technique, onboard data compression has become an urgent need and a lot of study has been directed toward the development of efficient techniques. In this paper, the construction...
详细信息
ISBN:
(纸本)0780374886
With the development of remote sensing technique, onboard data compression has become an urgent need and a lot of study has been directed toward the development of efficient techniques. In this paper, the construction approach of integer Haar is discussed briefly, and a simple image compression scheme based on the integer Haar wavelet transform and block DPCM is proposed. The scheme can be easily designed for data processing in real-time systems of remote sensing with parallel algorithms. Simulation experimental results demonstrate that the proposed approach is a efficient image compression method.
This paper designs and implements a financial invoice recognition system based on the features of the Chinese financial invoice. By using the linear whole block moving method in each vertical segment, a new fast algor...
详细信息
This paper designs and implements a financial invoice recognition system based on the features of the Chinese financial invoice. By using the linear whole block moving method in each vertical segment, a new fast algorithm is put forward to detect and rectify slanted images. To distinguish the different form types (the foundation necessary for locating the form fields, filtering the form lines, etc), several representative form features are discussed and an invoice-type features library is built by using a semi-automatic machine study method. On the basis of the recognized invoice type, a real invoice form is re-oriented against the corresponding blank form according to the invoice type feature, solving the problem of adhesion of characters and form lines, as well as the problem of character segmentation and recognition. Based on the financial Chinese invoice image feature, a mutual rectification mechanism founded on the recognition results of financial Chinese characters and Arabic numerals is put forward to raise the recognition rate. Finally, experimental results and conclusions are presented.
An improved Zernike moment using a region-based shape descriptor is presented. The improved Zernike moment not only has rotation invariance, but also has scale invariance that the unimproved Zernike moment does not ha...
详细信息
An improved Zernike moment using a region-based shape descriptor is presented. The improved Zernike moment not only has rotation invariance, but also has scale invariance that the unimproved Zernike moment does not have. The experimental results show that the improved Zernike moment has better invariant properties than the unimproved Zernike moment using a region-based shape descriptor.
An improved Zernike moment using as a region-based shape descriptor is presented. The improved Zernike moment not only has rotation invariance, but also has scale invariance that the unimproved Zernike moment does not...
详细信息
An improved Zernike moment using as a region-based shape descriptor is presented. The improved Zernike moment not only has rotation invariance, but also has scale invariance that the unimproved Zernike moment does not have. The experimental results show that the improved Zernike moment has better invariant properties than unimproved Zernike moment using as region-based shape descriptor.
Video object (VO) is an important concept in MPEG-4. For objects can be easily manipulated without visible distortion, the copyright protection of video objects becomes an important issue. This paper presents a waterm...
详细信息
ISBN:
(纸本)0780377133
Video object (VO) is an important concept in MPEG-4. For objects can be easily manipulated without visible distortion, the copyright protection of video objects becomes an important issue. This paper presents a watermarking scheme for video objects. Different from other methods, the proposed scheme employed inertia ellipse to achieve fast synchronization recovery in case the object was manipulated. Shape adaptive DCT and visual mask were combined to embed the watermark into the arbitrarily shaped object, which was designed to achieve the trade-off between the invisibility and the robustness. Experiments show that our algorithm is robust to object manipulations such as rotations, translations, scaling and lossy compression. Our scheme can be easily incorporated into the object-based coding framework of MPEG-4.
This paper designs and implements a financial invoice recognition system based on the features of the Chinese financial invoice. By using the linear whole block moving method in each vertical segment, a new fast algor...
This paper proposes a hybrid approach of a texture-based method and a connected component-based one for extracting texts in real scene images. For detecting texts having a lot of variations in size, shape, etc, we use...
详细信息
ISBN:
(纸本)076951695X
This paper proposes a hybrid approach of a texture-based method and a connected component-based one for extracting texts in real scene images. For detecting texts having a lot of variations in size, shape, etc, we use a multiple-continuously adaptive mean shift algorithm on the text probability image produced by a multi-layer perceptron. It is assumed that the scene text lies on planar rectangular surfaces with homogeneous background colors. We correct perspective distortion using warping parameters calculated after segmentation of an input image. We can detect and reconstruct text images accurately and efficiently.
A new method based on MLE-OED is proposed for unsupervised image segmentation of multiple objects which have fuzzy edges. It adjusts the parameters of a mixture of Gaussian distributions via minimizing a new loss func...
详细信息
ISBN:
(纸本)076951695X
A new method based on MLE-OED is proposed for unsupervised image segmentation of multiple objects which have fuzzy edges. It adjusts the parameters of a mixture of Gaussian distributions via minimizing a new loss function proposed to implement image segmentation based on the image's local spatial information and global intensity distribution properties. The loss function consists of two terms: a local content fitting term, which optimizes the entropy distribution, and a global statistical fitting term, which maximizes the likelihood of the parameters for the given data. The proposed segmentation method was validated by simulated and real examples. The performance in the experiments is better than those of two popular methods.
Vertical Bell Laboratories Layered Space-Time (V-BLAST) is a promising system that realizes the enormous capacity of multiple-input multiple-output (MIMO) communications. We present an extension of V-BLAST, and propos...
详细信息
ISBN:
(纸本)0780375890
Vertical Bell Laboratories Layered Space-Time (V-BLAST) is a promising system that realizes the enormous capacity of multiple-input multiple-output (MIMO) communications. We present an extension of V-BLAST, and propose an effective transmit power allocation scheme for the extended system. The proposed transmit power allocation scheme minimizes the bit error rate (BER) averaged over all detection stages, and requires small feedback overhead from the receiver to the transmitter. Simulation results show that the extended V-BLAST system with the proposed transmit power allocation scheme provides a significant reduction in the BER compared to the conventional V-BLAST system. When the minimum mean square error (MMSE) nulling is adopted, the extended V-BLAST system is found to achieve the BER performance comparable to that of the maximum likelihood (ML) detection for the conventional V-BLAST architecture.
The coordinated path-planning problem for multiple unmanned air vehicles is studied with the proposal of a co-evolving and cooperating path planner. In the new planner, potential paths of each vehicle form their own s...
详细信息
The coordinated path-planning problem for multiple unmanned air vehicles is studied with the proposal of a co-evolving and cooperating path planner. In the new planner, potential paths of each vehicle form their own subpopulation, and evolve only in their own sub-population, while the interaction among all sub-problems is reflected by the definition of fitness function. Meanwhile, the individual candidates are evaluated with respect to the workspace so that the computation of the configuration space is avoided. By using a problem-specific representation of candidate solutions and genetic operators, our algorithm can take into account different kinds of mission constraints and generate the solutions in real-time.
暂无评论