The nonlocal (NL) means filter as a recent denoising approach has demonstrated its empirical merit for additive Gaussian noise. In this paper, a new nonlocal means despeckling method for synthetic aperture radar (SAR)...
详细信息
Semantic segmentation network is able to detect multi-scale traffic sign effectively. However, probabilities that different scale features participate in decision are equal in the network. In this work, we propose a l...
详细信息
It is commonplace for the lack of labeled data in novel domains on medical image computer-aided diagnosis but there have been some labeled data or prior knowledge in old correlative domains. In this paper, instance-tr...
详细信息
The task of gland segmentation based on deep learning serves as a crucial auxiliary tool for diagnosing cancer. However, existing methods still exhibit shortcomings in handling gland adhesion and scale adaptability. T...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is p...
详细信息
Contour extraction is an important task in imageprocessing and computer vision. The contextual modulation is a universal phenomenon in the primary visual cortex (VI). A biologically motivated computational model is presented for contour extraction in this paper. Two mechanisms of contextual modulation, surround suppression and collinear facilitation, are integrated in this model. We obtain good results via this model to extract contours from images with noise and texture backgrounds. This work provides a biologically motivated approach with great potential for computer vision.
Aiming at the problems of my country's current camellia fruit picking mainly relying on manual picking, large labor and low efficiency, the development and promotion of camellia fruit picking equipment and technol...
详细信息
For most machine learning algorithms, the performance of model trained on the source domain degenerates obviously when it is applied to the target domain because the distributions of both domains are different. Beside...
详细信息
The performance of the traditional clustering algorithm is not always satisfied with the high-dimensional datasets, which make clustering method limited in many application. To solve this problem, Projection Pursuit w...
详细信息
To handle data stream classification with concept drifts, recent studies have shown that a continuously evolving network structure can achieve better performance. However, firstly, they only change one hidden node at ...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
暂无评论