The research applies space-time adaptive processing (STAP) techniques to a pseudo-circular array generated by selectively thinning a rectangular array. A hybrid approach incorporating elevation interferometry and STAP...
详细信息
ISBN:
(纸本)078037357X
The research applies space-time adaptive processing (STAP) techniques to a pseudo-circular array generated by selectively thinning a rectangular array. A hybrid approach incorporating elevation interferometry and STAP techniques is used. Results show the thinned 16-element pseudo-circular array offers significant detection performance improvement over the baseline factored time-space (FTS) technique operating on a linear array, e.g., an 8-element horizontal linear array. Results are demonstrated for cases with and without range ambiguous clutter. This performance level is achieved using a factor of M less sample support than required for full adaptivity where M represents the number of pulses within a coherent processing interval.
Growth in popularity of the Internet has spawned a great interest in collaborative IP networks that support collaborative meetings between individuals or groups located at remote stations. The emphasis on security of ...
详细信息
Recent advances in computer arithmetic offer interesting alternative solutions for low-power design. Depending on an assortment of factors that need to be considered, it is worth evaluating the logarithmic number syst...
详细信息
Recent advances in computer arithmetic offer interesting alternative solutions for low-power design. Depending on an assortment of factors that need to be considered, it is worth evaluating the logarithmic number system (LNS) or the residue number system (RNS) for hardware implementations of computationally intensive tasks. As such, the choice of arithmetic can lead to substantial power savings.
A novel robust scheme is presented, for the efficient transmission of image sequences over unreliable channels. The proposed scheme is based on an efficient error-resilient wavelet video coder and is able to produce e...
详细信息
Pre-processing algorithms improve the quality of a compression system by removing unimportant data before encoding. This enhances both the visual quality and coding efficiency of the system. We cast the pre-processing...
详细信息
Pre-processing algorithms improve the quality of a compression system by removing unimportant data before encoding. This enhances both the visual quality and coding efficiency of the system. We cast the pre-processing problem in the operational rate-distortion framework. Filtering the displaced frame difference is the focus, and the proposed method couples the choice of the quantization scale to the response of the prefilter. Coding errors are then addressed by penalizing significant differences between coded blocks. Finally, experimental results illustrate the efficacy of the method within the context of an MPEG-2 coding scenario.
Most digital watermarking techniques are susceptible to damage by data cropping. Although the effects of cropping might not be perceptible, watermark recovery may be rendered difficult or impossible due to the desynch...
详细信息
Most digital watermarking techniques are susceptible to damage by data cropping. Although the effects of cropping might not be perceptible, watermark recovery may be rendered difficult or impossible due to the desynchronization of the recovery process. The transform encryption coding (TEC) based watermarking algorithm was presented at ICASSP 2000 (see Ruiz, F.J. and Deller, J.R., Jr, IEEE International Conference on Acoustics, Speech and Signal processing 2000). This paper investigates the performance of TEC watermarking in the presence of cropping, and presents an algorithm that identifies cropped samples and recovers watermarks from the damaged record. Implementation details and experimental results under different environmental conditions are presented.
Growth in popularity of the Internet has spawned a great interest in collaborative IP networks that support collaborative meetings between individuals or groups located at remote stations. The emphasis on security of ...
详细信息
ISBN:
(纸本)0780367197
Growth in popularity of the Internet has spawned a great interest in collaborative IP networks that support collaborative meetings between individuals or groups located at remote stations. The emphasis on security of information transfer during these meetings has made the management of end-to-end security in collaborative IP network environments, that may involve the creation of ad hoc communication networks that contain the Internet as an intermediate network, an important research issue. Addition of security features through standard methods gives rise to complex incompatibility problems resulting from the specific routing and address translation schemes that may be in place in these networks. The development of enhanced protocols that remove this incompatibility and ensure interoperability between security functions and address translation functions is discussed in this paper. Detailed steps in ensuring end-to-end security in various cases involving change of IP address, change of both IP address and the port, and the use of encapsulation security payload implemented in transport mode are described. The enhanced protocols presented here support generic implementation in the sense that the implementation of the security-related protocol is transparent to the use or not of the address translation scheme. For providing a proof of concept demonstration of the proposed solutions, the structure of a prototype collaborative network, which employs the Internet as an intermediate communication medium for supporting videoconferencing between remote stations, is outlined.
A region-based color image indexing and retrieval algorithm is presented. As a basis for the indexing, a novel K-Means segmentation algorithm is used, modified so as to take into account the coherence of the regions. ...
详细信息
A region-based color image indexing and retrieval algorithm is presented. As a basis for the indexing, a novel K-Means segmentation algorithm is used, modified so as to take into account the coherence of the regions. A new color distance is also defined for this algorithm. Based on the extracted regions, characteristic features are estimated using color, texture and shape information. An important and unique aspect of the algorithm is that, in the context of similarity-based querying, the user is allowed to view the internal representation of the submitted image and the query results. Experimental results demonstrate the performance of the algorithm. The development of an intelligent image content-based search engine for the World-Wide Web is also presented, as a direct application of the presented algorithm.
A novel robust scheme is presented, for the efficient transmission of image sequences over unreliable channels. The proposed scheme is based on an efficient error-resilient wavelet video coder and is able to produce e...
详细信息
ISBN:
(纸本)0780366859
A novel robust scheme is presented, for the efficient transmission of image sequences over unreliable channels. The proposed scheme is based on an efficient error-resilient wavelet video coder and is able to produce embedded bitstreams. The robust coder is evaluated for the transmission of image sequences over binary symmetric channels and is shown to have very promising performance.
An efficient technique based on the Bayes test is introduced in this paper, for the identification of the occlusion and visible background and foreground areas in a noisy stereoscopic image pair. Four hypotheses are u...
详细信息
ISBN:
(纸本)0769511104
An efficient technique based on the Bayes test is introduced in this paper, for the identification of the occlusion and visible background and foreground areas in a noisy stereoscopic image pair. Four hypotheses are used for the formulation of compound Bayes decision rules. Experimental results illustrating the performance of the proposed techniques are presented and evaluated.
暂无评论