This paper addresses an effective issue of content-based image retrieval (CBIR) by presenting Fuzzy Hamming Distance (FHD). Firstly, the theory of FHD is introduced, which includes degree of difference and cardinality...
详细信息
Semantic-based image retrieval bridges the gap between visual features and human understanding of image in the field of image retrieval. image annotation is one important technology of image retrieval based on the sem...
详细信息
Emotion Detection in Conversation (EDC) has been implemented in numerous domains and is under increasing attention. The EDC task is highly challenging due to the need to incorporate both the context of the utterance a...
详细信息
In this paper, we establish a novel bimodal emotion database from physiological signals and facial expression, which is named as PSFE. The physiological signals and facial expression of the PSFE database are respectiv...
详细信息
Error concealment can be regarded as a sort of error resilient coding techniques. This paper proposes a method to recover lost blocks in stereoscopic images. We first utilize the correlation to perform disparity estim...
详细信息
ISBN:
(纸本)9781424447848
Error concealment can be regarded as a sort of error resilient coding techniques. This paper proposes a method to recover lost blocks in stereoscopic images. We first utilize the correlation to perform disparity estimation to match the corresponding blocks for lost ones. And then we calculate the boundary smooth degree (BSD) for each recovered block. If BSD exceeds the threshold, it means that the boundary is discontinuous which mainly results from high detailed blocks, edge blocks or occluded blocks. So we consider neighboring blocks' BSD and estimate the content of a lost block, and adaptively use different methods to conceal it. Experimental results show that the proposed algorithm can greatly improve the subjective and objective quality of the reconstructed image.
This paper presents a new scheme for optimal packetization of scalable multimedia data over lossy network. By assigning an unequal amount of forward error correction (FEC) bits to each segment of transmission packets,...
This paper presents a new scheme for optimal packetization of scalable multimedia data over lossy network. By assigning an unequal amount of forward error correction (FEC) bits to each segment of transmission packets, the proposed algorithm protects a progressive bitstream generated by a three-dimensional set partitioning in hierarchical trees (3-D SPIHT) algorithm. The partical swarm optimization (PSO) algorithm is used to reasonably allocate bits between source coding and channel coding across packets. Experimental results show that the proposed algorithm provides close to optimal average peak signal-to-noise ratio performance and that its' running time is significantly lower than that of previously known solution.
An efficient fast inter mode decision algorithm for the baseline H.264/AVC video coding is proposed in this paper. The main idea of the algorithm is to reduce the number of candidate modes for rate distortion optimiza...
详细信息
An efficient fast inter mode decision algorithm for the baseline H.264/AVC video coding is proposed in this paper. The main idea of the algorithm is to reduce the number of candidate modes for rate distortion optimization (RDO) by using early mode detection in four different levels, viz. SKIP mode detection, type detection at macroblock-level, type detection at submacroblock-level and intra modes detection. In addition, the correlation of cost of current MB and the one of previous frame, as well as the cost's monotonous property are both used to help the mode decision. Compared to JM8.6 reference software, our algorithm can save encoding time 71.743% on average with negligible PSNR loss, which is very helpful for H.264/AVC inter frame. encoding.
Here we take advantage of the signal recovery power of Compressive Sensing (CS) to significantly reduce the computational complexity brought by the high-dimension image data, then an effective and efficient low-dimens...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,f...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,face recognition,autonomous driving and healthcare,AI is playing an important ***,although AI is promoting the technological revolution and industrial progress,its security risks are often *** studies have found that the wellperforming deep learning models are extremely vulnerable to adversarial examples [1-3].The adversarial examples are crafted by applying small,humanimperceptible perturbations to natural examples,but can mislead deep learning models to make wrong *** vulnerability of deep learning models to adversarial examples can raise security and safety threats to various realworld applications.
Two-dimensional gel electrophoresis (2DE) images are often corrupted by impulse noise in broad sense (including various artifacts, such as fingerprints, hairs, gel cracks, strips, water stains, dust and so on). In thi...
详细信息
暂无评论