Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7, 4) Hamming Code a...
详细信息
This paper proposes a new method for estimating the direction-of-arrival (DOA) of wideband signal, which employs particle filters to track array manifold at different frequency bands. Compared with the coherent signal...
详细信息
This paper proposes a new method for estimating the direction-of-arrival (DOA) of wideband signal, which employs particle filters to track array manifold at different frequency bands. Compared with the coherent signal-subspace method (CSM), the proposed method utilizes the current observed data and does not require the estimated covariance matrix, thus it performs better while considering a small sample set. In the meantime, this method does not require the preliminary DOA estimates. Moreover, the proposed method can localize completely correlated sources as it is based on the idea of maximum likelihood. Simulation results show that the performance of the propose method is better than CSM when the sample set is small, the signal to noise ratio (SNR) is low and the signal sources are correlated.
This paper describes a new non-homogeneous clutter and interference mitigation method for forward-looking airborne early warning radar with arbitrary linear array configuration. The approach is performed in three stag...
详细信息
This paper describes a new non-homogeneous clutter and interference mitigation method for forward-looking airborne early warning radar with arbitrary linear array configuration. The approach is performed in three stages, i. e. the minimal mean square space-time spectral estimation with iterative processing which using only a single range bin data, the clutter and jammer ridge reconstruction based on image feature extraction, moving target detection with subspace projection. An important feature of the proposed method is its ability to extract requisite implementation information from the data itself without sacrificing space-time aperture. A preliminary result against an airborne simulation data demonstrates the effectiveness of the proposed method.
In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations b...
详细信息
In this paper,the mine tunnels is regard as wave-guide which contains kinds of un-beneficial medium,we have study the formulas of electromagnetic waves propagation attenuation and roughness attenuation,the relations between propagation attenuation and roughness and frequency were *** results show that the influence of propagation attenuation in lower frequency is more obvious,and roughness attenuation is increased rapidly as roughness of coal mine tunnels *** tilted attenuation is stronger than roughness attenuation as propagation frequency increasing.
Fractal image compression has been interested due to highly possible compression ratio and selectable quality variation. However, one of disadvantages in fractal image compression is that it takes long time for encodi...
详细信息
Fractal image compression has been interested due to highly possible compression ratio and selectable quality variation. However, one of disadvantages in fractal image compression is that it takes long time for encoding. So far, there are several methods proposed to get the high speed of encoding such as Fisher's, Hurtgen's and Saupe's, etc. In this paper, implementation of fractal image compression using Fisher's and Hurtgen's methods on DSP TMS320C5515 Stick kit is presented. Experimental results show that the Fisher's method is faster than Hurtgen's while the quality of decoded image (PSNR) is equivalently comparable in these methods.
In this paper an FPGA-based implementation of Chaotic Pulse Position Modulation (CPPM) is described. The model of transmission in noisy channel is demonstrated. The result shows the operation, performance and feasibil...
详细信息
In this paper an FPGA-based implementation of Chaotic Pulse Position Modulation (CPPM) is described. The model of transmission in noisy channel is demonstrated. The result shows the operation, performance and feasibility of CPPM.
Keyword spotting refers to detection of all occurrences of any given word in a speech utterance. In this paper, we define the keyword spotting problem as a binary classification problem and propose a discriminative ap...
详细信息
Keyword spotting refers to detection of all occurrences of any given word in a speech utterance. In this paper, we define the keyword spotting problem as a binary classification problem and propose a discriminative approach for solving it. Our approach exploits evolutionary algorithm to determine the separating hyper plane between two classes: class of sentences containing the target keywords and class of sentences which don't include the target keywords. The results on TIMIT indicate that the proposed method has good performance equal to 95.7 FOM value (average true detection rate for different false alarm per keyword per hour) and acceptable speed equal to 3.3 RTF (Real Time Factor) value.
This paper proposes an approximated power method to track the signal subspace. Using rank-one update model, the signal subspace can be obtained by finding the least square solutions of two unconstrained weight functio...
详细信息
ISBN:
(纸本)9781612847191
This paper proposes an approximated power method to track the signal subspace. Using rank-one update model, the signal subspace can be obtained by finding the least square solutions of two unconstrained weight functions. As introduced in instrumental variable (IV), this bi-iteration algorithm can track signals corrupted by colored noise. Especially the tracking results are orthonormalized to get better performances. Some DOA simulations are provided to illustrate the effectiveness of the proposed method.
We propose a method for handwritten Arabic word recognition based on the combination of the Ridgelet transform and SVMs. Ridgelets are used for generating pertinent features of handwritten words while the classificati...
详细信息
We propose a method for handwritten Arabic word recognition based on the combination of the Ridgelet transform and SVMs. Ridgelets are used for generating pertinent features of handwritten words while the classification stage is based on the One-Against-All multiclass implementation of SVMs. The experimental investigation is conducted on a vocabulary of twenty-four words extracted from the ITN/ENIT database. The Ridgelet performance is assessed comparatively to the results obtained for Radon and uniform grid (zoning) features. Results highlight the reliability of the Ridgelet-SVM combination for handwritten Arabic word recognition.
We present a fast method for locating iris features in frontal face images based on the Hough transform. The aim of this work is to detect the circles surrounding the exterior iris pattern from a set of facial images....
详细信息
We present a fast method for locating iris features in frontal face images based on the Hough transform. The aim of this work is to detect the circles surrounding the exterior iris pattern from a set of facial images. The circular Hough transform is used for this purpose, a first edge detection technique is used for finding the edges in the input image. After the characteristics points of circles are detected and drawn this last on the original image then, the pattern of the iris is extracted.
暂无评论