Based on adaptive filtering and retinex method, this paper presents a novel algorithm for Enhancement of hand vein images. First of all, the principle of the near-infrared hand vein image acquisition is introduced. Se...
详细信息
Based on adaptive filtering and retinex method, this paper presents a novel algorithm for Enhancement of hand vein images. First of all, the principle of the near-infrared hand vein image acquisition is introduced. Secondly, the retinex method is used to normalize hand vein images, and the adaptive smoothing method is selected to estimate the illumination. Thirdly, Gray cosine transform is used to enhance the discrimination of the skin and the vein in hand vein images. Finally, a determination criterion of hand vein is established to remove the false vein blocks from the segmented hand vein images. We developed a hand vein recognition system in Microsoft VC6.0 and the experimental results demonstrate the high efficiency of the proposed algorithm in runtime and correct recognition rate.
To achieve low detection complexity and full-rate wireless cooperative transmissions, pre-coding and cyclic delay diversity (CDD) techniques are fully considered and properly combined for a two-path successive relay n...
详细信息
The characteristic basis function method (CBFM) is used to analyze the electromagnetic characteristics of antenna arrays in this paper. The original antenna arrays are divided into a number of subdomains and high-leve...
详细信息
ISBN:
(纸本)9781467317993
The characteristic basis function method (CBFM) is used to analyze the electromagnetic characteristics of antenna arrays in this paper. The original antenna arrays are divided into a number of subdomains and high-level basis functions are constructed for each subdomain through their couplings, the resulting matrix can be largely reduced. The characteristic basis function method not only has high accuracy and computing time is greatly reduced. The numerical results are given to illustrate that the method is accurate and efficient.
Adaptive cross approximation (ACA) algorithm as a kind of common matrix compression method is often used to analyze the electromagnetic radiation and scattering problems. In the region of far field, the impedance matr...
详细信息
ISBN:
(纸本)9781467317993
Adaptive cross approximation (ACA) algorithm as a kind of common matrix compression method is often used to analyze the electromagnetic radiation and scattering problems. In the region of far field, the impedance matrix is compressed by ACA method, and the extracted impedance matrix is accelerated filling by equivalent dipole-moment method (EDM). In the area of near field, the method of moments or the equivalent dipole-moment method is applied for filling the impedance matrix. The iterative near field preconditioning technique is used to solve matrix equation, so that fast calculation of radar cross section (RCS) can be achieved. Numerical results show that the computational efficiency is improved significantly via applying the presented method in this paper without sacrificing much accuracy.
A contour tree is a topological abstraction of a scalar field. Contour tree simplification (CTS) removes branches corresponding to noise, while making the size of the tree small enough for maintaining essential struct...
详细信息
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ...
详细信息
This paper focuses on the research about sensor module driver at bottom layer of popular Android OS. The main structure of Android is decomposed and illuminated, and the sensor system structure is decomposed in detail...
详细信息
This paper focuses on the research about sensor module driver at bottom layer of popular Android OS. The main structure of Android is decomposed and illuminated, and the sensor system structure is decomposed in detail. The design of driver and Hardware Abstract Layer (HAL) is presented, and the steps, procedure, data structure of development about Sensor interfaces are also presented.
Fuzzy soft set (FSs) is a novel mathematical tool, in order to describe and measure uncertain information of FSs perfectly, granularity analysis based on covering about FSs is originally discussed in this paper. First...
详细信息
In recent years, WSN (Wireless Sensor Network) technology has been developed rapidly, and been widely used in the fields of industry, agriculture, medicine and so on. To solve the low communication rate and short-dist...
详细信息
ISBN:
(纸本)9781467344999
In recent years, WSN (Wireless Sensor Network) technology has been developed rapidly, and been widely used in the fields of industry, agriculture, medicine and so on. To solve the low communication rate and short-distance data transmission in the current temperature and humidity monitoring system, this paper designs a temperature and humidity remote monitoring system based on WSN technology. In this system, microprocessor Atmega128L is adopted as the control core of network node, and wireless transceiver module nRF905 is used to realize wireless data transmission. The data of temperature and humidity is sampled by using digital temperature sensor DS18B20 and humidity sensor SHT75 in the system. The proposed network protocol in this paper not only can realize long-rang wireless data transmission, but also can realize self-organizing and manual networking. The results of practical test show that this system has the stable and reliable performance and the advantage of scalability.
In cognitive radio (CR) networks, unlicensed secondary users need to conduct spectrum sensing to gain access to a licensed spectrum band. And cooperation among CR users will solve the problems caused by multipath fadi...
详细信息
In cognitive radio (CR) networks, unlicensed secondary users need to conduct spectrum sensing to gain access to a licensed spectrum band. And cooperation among CR users will solve the problems caused by multipath fading and shadowing. In this paper, we propose a multi-threshold method at local nodes to cope with noises of great uncertainty. Functions of distance between bodies of evidence are used at fusion centre to make synthetic judgment. To guarantee security which is an essential component for basic network functions, we will take selfish nodes into account which try to occupy channels exclusively. The proposed technique has shown better performance than conventional algorithms without increase the system overhead.
暂无评论