Fisher's linear discriminant analysis (FLDA) is one of the most well-known linear subspace selection methods. However, FLDA suffers from the class separation problem. The projection to a subspace tends to merge cl...
详细信息
An efficient SAR image fusion algorithm for multi-polarimetric images based on Directionlets transform is proposed. Directionlets transform is a new lattice-based multi scale analysis anisotropic multi-directional wav...
详细信息
ISBN:
(纸本)9781612847719
An efficient SAR image fusion algorithm for multi-polarimetric images based on Directionlets transform is proposed. Directionlets transform is a new lattice-based multi scale analysis anisotropic multi-directional wavelet transform. Firstly, several polarimetric images can be decomposed into low frequency coefficients and high-frequency coefficients with multi scales and multi-directions using the Directionlets transform. For the low-frequency coefficients, the average fusion method is used. For the each directional high frequency sub-band coefficients, the directive contrast and the larger value of region variance information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused Directionlets coefficients. Experimental results show that compared with traditional algorithm, the proposed algorithm can get better visual effect and the significant information of original image like textures and contour details is well maintained.
In wireless communication, the cooperative communications technology has been concern because of its advantages of spatial diversity. In particular, cooperative communication with a single relay is a simple, practical...
详细信息
In wireless communication, the cooperative communications technology has been concern because of its advantages of spatial diversity. In particular, cooperative communication with a single relay is a simple, practical technology for wireless sensor networks. In this paper, we analyze several simple network topologies. Under the condition of equal power allocating, the optimum relay locations are respectively determined by using symbol error rate (SER) formula. And these types of topologies are compared, the analysis results show that, Linear network topology has the best system performance, the system performance of isosceles triangle topology is better than that of equilateral triangle topology.
Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is...
详细信息
Nowadays, the Human Computer Interaction (HCI) developments improve the research of EOG. In this paper, A new EOG-based HCI system for multimedia control is designed and implemented. A special headset named Mindset is used to detect the EOG pulses generated by blinking, and then transmit them wirelessly via Bluetooth to PC. Three modules are contained in the system, which are the wireless communication module, EOG recognition module and the multimedia control module, respectively. The system can be used as an assistant for the disable persons, also can be used for amusement among normal people. It is feasible to put the system into practical use due to its security and convenience.
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propo...
详细信息
Large-scale semantic concept detection from large video database suffers from the large variations among different semantic concepts as well as their corresponding effective low-level features. In this paper, we propose a novel framework to deal with this obstacle. The proposed framework consists of four major components: feature pool construction, pre-filtering, modeling, and classification. First, a large low-level feature pool is constructed, from which a specific set of features are selected for the latter steps automatically or semi-automatically. Then, to deal with the unbalance problem in training set, a pre-filtering classifier is generated, which aim at achieving a high recall rate and a certain precision rate nearly 50% for a certain concept. Thereafter, from the pre-filtered training samples, a SVM classifier is built based on the selected features in the feature pool. After that, the SVM classifier is applied to classification of semantic concept. This framework is flexible and extensible in terms of adding new features into the feature pool, introducing human interactions on selecting features, building models for new concepts and adopting active learning.
Aim to solve the poor dynamic performance and the low disturbance resistance of PI power decoupling controller for DFIG power generator system based on matrix converter, this paper propose a nonlinear control algorith...
详细信息
Aim to solve the poor dynamic performance and the low disturbance resistance of PI power decoupling controller for DFIG power generator system based on matrix converter, this paper propose a nonlinear control algorithm for the AC-excitation DFIG system. First, we establish the mathematical model of the DFIG, based on the model, use the inverse system theory and deduce the inverse model, add the inverse model in series to the front of the original system model, develop the whole system to a pseudo linear system. Consider the system performance influenced by the parameters of the linearized model, we use the predictive control to improve the robustness. The simulation results show that the control strategy has fast response and good dynamic performance. The off-grid and cut-grid experimental data validate that under sub-synchronous or super-synchronous state, the stator voltage and frequency can maintain stability and achieve variable speed constant frequency operation.
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
暂无评论