The researches on saliency detection for common images have been thoroughly explored in recent years, but little attention has been paid to hyperspectral images. However, salient region detection can contribute to fin...
详细信息
ISBN:
(纸本)9781479919499
The researches on saliency detection for common images have been thoroughly explored in recent years, but little attention has been paid to hyperspectral images. However, salient region detection can contribute to finding significant targets in hyperspectral images. In this paper, spectral saliency is introduced to the spectral domain for detecting targets in hyperspectral images, which are computed by expanding the Itti's visual attention model. Firstly, spatial and spectral features are extracted from hyperspectral image. The conspicuity feature of the first three principal components, orientations, spectral angle and visible spectral band opponent are computed to sum into a saliency map. Finally, salient targets are detected by winner-take-all strategy finding the region with the highest value in the saliency map. Experimental results show that the proposed method have better effectiveness of target detection compared with the method based on RGB image and visible spectrum.
Video steganalysis takes effect when videos corrupted by the target steganography method are available. Nevertheless, classical classifiers deteriorate in the opposite case. This paper presents a method to cope with t...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the as...
详细信息
We present a scheme for the practical decoy-state quantum key distribution with heralded single-photon source. In this scheme, only two-intensity decoy states are employed. However, its performance can approach the asymptotic case of using infinite decoy states. We compare it with the standard three-intensity decoy-state method, and through numerical simulations, we demonstrate its significant improvement over the three-intensity method in both the final key rate and the secure transmission distance. Furthermore, when taking statistical fluctuations into account, a very high key generation rate can still be obtained even at a long transmission distance.
In RFID systems, one of the problems that we must solve is the collision between tags which lowers their efficiency. Two main approaches to tag collision are generally adopted: ALOHA and Tree algorithms. This paper re...
详细信息
In this paper, we proposed a hybrid image data hiding method used for watermarking applications in order to make sure the hidden dual watermarks survive after the image manipulation and enhancement processes. To achie...
详细信息
This paper presents a new adaptive optimal nonlinear control for trajectory tracking of nonlinear affine-in control systems with unknown internal dynamics. The referred proposed controller which is based on a L2 norm ...
详细信息
An authentication scheme that uses rehashing and secret sharing methods to verify the reality of a color image’s content is proposed in this paper. First, the proposed scheme uses Shamir’s secret sharing method to s...
详细信息
A novel multi-layer third-order substrate integrated waveguide (SIW) bandpass filter with improved lower stopband performance is proposed. TE201-mode in folded-SIW cavity is utilized to implement negative cross coupli...
详细信息
In this paper, we propose an unknown input estimation based sliding mode control (UIESMC) approach for air path in the EGR-VGT diesel engine. This proposed UIESMC controller is adopted to track the intake and exhaust ...
详细信息
In this paper, we propose an unknown input estimation based sliding mode control (UIESMC) approach for air path in the EGR-VGT diesel engine. This proposed UIESMC controller is adopted to track the intake and exhaust manifold pressures, and compressor mass flow rate when under unknown inputs, which include the un-modeled dynamics, modeled parametric uncertainties and the unknown faults. These unknown inputs are estimated by PI observer by applying high gain at the integral term to satisfy the requirements of both estimation accuracy and less sensitivity to measure noises. This paper finally inverted the EGR and VGT gas mass flow rates into their corresponding valves positions by flow-position transformation module. Finally, through co-simulation results from AMESim and MATLAB/Simulink, the effectiveness and robustness of the proposed control strategy is demonstrated.
In this paper, a novel adaptive coded-modulation scheme, namely M-ary coded modulation, which is spectrally-efficient and can facilitate variable data-rates, is proposed to meet different quality-of-service (QoS) requ...
详细信息
In this paper, a novel adaptive coded-modulation scheme, namely M-ary coded modulation, which is spectrally-efficient and can facilitate variable data-rates, is proposed to meet different quality-of-service (QoS) requirements for wireless multimedia applications. An efficient constellation subset selection algorithm incorporated with a novel M-ary coding technique is proposed to generate convolutional codes for different constellation subsets. The studies on the theoretical and practical aspects of our proposed adaptive coded-modulation scheme are presented. Compared with other existing adaptive coded-modulation methods, our scheme offers more flexibilities. According to Monte Carlo simulation results, our new M-ary coded-modulation scheme not only can satisfy the predetermined symbol-error-rate (SER) requirement, but also can significantly enhance the communication quality in terms of bit error rate and throughput.
暂无评论