In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations b...
详细信息
In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations between propagation attenuation and roughness and frequency were *** results show that the influence of propagation attenuation in lower frequency is more obvious,and roughness attenuation is increased rapidly as roughness of coal mine tunnels *** tilted attenuation is stronger than roughness attenuation as propagation frequency increasing.
Fractal image compression has been interested due to highly possible compression ratio and selectable quality variation. However, one of disadvantages in fractal image compression is that it takes long time for encodi...
详细信息
Fractal image compression has been interested due to highly possible compression ratio and selectable quality variation. However, one of disadvantages in fractal image compression is that it takes long time for encoding. So far, there are several methods proposed to get the high speed of encoding such as Fisher's, Hurtgen's and Saupe's, etc. In this paper, implementation of fractal image compression using Fisher's and Hurtgen's methods on DSP TMS320C5515 Stick kit is presented. Experimental results show that the Fisher's method is faster than Hurtgen's while the quality of decoded image (PSNR) is equivalently comparable in these methods.
The fractal dimension of sea clutter is estimated and its multifractal features are analyzed in this paper. A new method based on the difference between multifractal spectra of sea clutter and target plus sea clutter ...
详细信息
The fractal dimension of sea clutter is estimated and its multifractal features are analyzed in this paper. A new method based on the difference between multifractal spectra of sea clutter and target plus sea clutter is proposed to detect targets in sea clutter. The verification of real sea clutter shows that this method is useful and has low computation burden. So it provides a new idea and an effective method to detect low observable targets in sea clutter.
Keyword spotting refers to detection of all occurrences of any given word in a speech utterance. In this paper, we define the keyword spotting problem as a binary classification problem and propose a discriminative ap...
详细信息
Keyword spotting refers to detection of all occurrences of any given word in a speech utterance. In this paper, we define the keyword spotting problem as a binary classification problem and propose a discriminative approach for solving it. Our approach exploits evolutionary algorithm to determine the separating hyper plane between two classes: class of sentences containing the target keywords and class of sentences which don't include the target keywords. The results on TIMIT indicate that the proposed method has good performance equal to 95.7 FOM value (average true detection rate for different false alarm per keyword per hour) and acceptable speed equal to 3.3 RTF (Real Time Factor) value.
In this paper an FPGA-based implementation of Chaotic Pulse Position Modulation (CPPM) is described. The model of transmission in noisy channel is demonstrated. The result shows the operation, performance and feasibil...
详细信息
In this paper an FPGA-based implementation of Chaotic Pulse Position Modulation (CPPM) is described. The model of transmission in noisy channel is demonstrated. The result shows the operation, performance and feasibility of CPPM.
We propose a method for handwritten Arabic word recognition based on the combination of the Ridgelet transform and SVMs. Ridgelets are used for generating pertinent features of handwritten words while the classificati...
详细信息
We propose a method for handwritten Arabic word recognition based on the combination of the Ridgelet transform and SVMs. Ridgelets are used for generating pertinent features of handwritten words while the classification stage is based on the One-Against-All multiclass implementation of SVMs. The experimental investigation is conducted on a vocabulary of twenty-four words extracted from the ITN/ENIT database. The Ridgelet performance is assessed comparatively to the results obtained for Radon and uniform grid (zoning) features. Results highlight the reliability of the Ridgelet-SVM combination for handwritten Arabic word recognition.
We present a fast method for locating iris features in frontal face images based on the Hough transform. The aim of this work is to detect the circles surrounding the exterior iris pattern from a set of facial images....
详细信息
We present a fast method for locating iris features in frontal face images based on the Hough transform. The aim of this work is to detect the circles surrounding the exterior iris pattern from a set of facial images. The circular Hough transform is used for this purpose, a first edge detection technique is used for finding the edges in the input image. After the characteristics points of circles are detected and drawn this last on the original image then, the pattern of the iris is extracted.
Audio-only speaker/speech recognition systems ASR are far from being perfect especially under noisy conditions. Furthermore, it is a known fact that the content of speech can be revealed partially through lip-reading....
详细信息
Audio-only speaker/speech recognition systems ASR are far from being perfect especially under noisy conditions. Furthermore, it is a known fact that the content of speech can be revealed partially through lip-reading. Human speech perception is bimodal in nature: Humans combine audio and visual information in deciding what has been spoken, especially in noisy environments. In this paper, we describe a speaker identification system where lip information is fused with corresponding speech information from each speaker. The energy, the zero cross ratio (ZCR) and the pitch are used as features for the audio modality. The features for the lip texture modality are 2D-DCT coefficients of the luminance component. Intuitively, we would expect lip information to be somewhat complementary to speech information due to the range of lip movements associated with the production of the corresponding phonemes in speech using a multilayer perceptron classifier.
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
The objective of this work is to present a signature verification system based on combination of off-line and online systems for managing conflict provided by the Support Vector Machine (SVM) classifiers. This system ...
详细信息
The objective of this work is to present a signature verification system based on combination of off-line and online systems for managing conflict provided by the Support Vector Machine (SVM) classifiers. This system is basically divided into three parts: i) off-line verification stage, ii) on-line verification stage and iii) combination module using Dempster-Shafer theory (DST). The proposed framework allows combining the normalized SVM outputs and uses an estimation technique based on the dissonant model of Appriou to compute the belief assignments. Combination is performed using Dempster-Shafer (DS) rule followed by the likelihood ratio based decision making. Experiments are conducted on the well know NISDCC signature collection using false rejection and false acceptance criteria. The obtained results show that the proposed combination framework using DST yields the best verification accuracy compared to the sum rule even when individual off-line and on-line classifications provide conflicting results.
暂无评论