According to defocus imaging theory, the amount of blur in the defocus images varies with depth of the object in the scene. So depth in the scene can be recovered by estimating the blur with the knowledge of the lens ...
详细信息
According to defocus imaging theory, the amount of blur in the defocus images varies with depth of the object in the scene. So depth in the scene can be recovered by estimating the blur with the knowledge of the lens parameters. A novel application of the total variation principle is made for the estimation of the amount of blur in the defocus images. Three main processes are included: the process of image defocusing is modeled using the model of anisotropic heat diffusion, then the depth recovery problem is translated into the minimum problem of energy functional with total variation regularization, and the gradient flow is used to seek the optimal solution. The recovery of focus image and the excess restrictions are avoided. The experiment results show that the algorithm is quite effective and depth information in edge is well retained particularly. Compared with the least square algorithm, depth recovery error with the total variation algorithm is reduced about 40%.
Locally linear embedding (LLE) is an elegant nonlinear method for feature extraction and manifold learning, which attempt to project the original data into a lower dimensional feature space by preserving the local nei...
详细信息
Randí et al. proposed a significant graphical representation for DNA sequences, which is very compact and avoids loss of information. In this paper, we build a fast algorithm for this graphical representation wit...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to l...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locate endpoint intervals of a speech signal embedded in noise. With the EMD, the noise signals can be decomposed into different numbers of sub-signals called intrinsic mode functions (IMFs), which is a zero-mean AM-FM component. Then TEO can be used to extract the desired feature of the modulation energy for IMF components. In order to show the effectiveness of the proposed method, examples are presented to show that the new measure is more effective than traditional measures. The present experimental results show that the measure can be used to improve the performance of endpoint detection algorithms and the accuracy of this algorithm is quite satisfactory and acceptable.
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is...
详细信息
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is used to realize normalizing of the face image. Secondly, a determination criterion of eye location is established by the priori knowledge of geometrical facial features. Thirdly, a range of threshold values that would separate eye blocks from others in a segmented face image is estimated. With the progressive increase of the threshold by an appropriate step in that range, once two eye blocks appear from the segmented image, they will be detected by the determination criterion of eye location. Finally, the 2-D correlation coefficient is used as a symmetry similarity measure to check the factuality of the two detected eyes. The experimental results demonstrate the high efficiency of the algorithm in runtime and correct localization rate.
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use case...
详细信息
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use cases of SON and has been intensively studied in 3GPP working groups. In this paper, we take the user equipment (UE) speed into account to solve the MRO problem. We propose a US-MRO algorithm, which assigns different Hysteresis parameters to UEs with different speed. The simulation results show that the success rate of Handover (HO) is improved and user experience is enhanced by the US-MRO algorithm.
In many areas of pattern recognition and machine learning, subspace selection is an essential step. Fisher's linear discriminant analysis (LDA) is one of the most well-known linear subspace selection methods. Howe...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locat...
详细信息
Accurate endpoint detection is a necessary capability for speech recognition. A new energy measure method based on the empirical mode decomposition (EMD) algorithm and Teager energy operator (TEO) is proposed to locate endpoint intervals of a speech signal embedded in noise. With the EMD, the noise signals can be decomposed into different numbers of sub-signals called intrinsic mode functions (IMFs), which is a zero-mean AM-FM component. Then TEO can be used to extract the desired feature of the modulation energy for IMF components. In order to show the effectiveness of the proposed method, examples are presented to show that the new measure is more effective than traditional measures. The present experimental results show that the measure can be used to improve the performance of endpoint detection algorithms and the accuracy of this algorithm is quite satisfactory and acceptable.
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. That is, a polygon is divided into two parts by a line: S 1 and S 2 . Furthermore, we analyze the security and computational complexity, as well as the comparison of these two protocols. The results of analysis show that the proposed protocols are secure and efficient. We believe the two protocols will be useful in other geometric and combinatorial problems.
A variety of wavelet transform methods have been introduced to remove noise from images. However, many of these algorithms remove the fine details and smooth the structures of the image when removing noise. The wavele...
详细信息
暂无评论