In this paper, a novel watermarking scheme based on relationship of Tchebichef Moments is proposed. Firstly, the image is divided into blocks;then the Tchebichef moment's relationship of each block is computed, wh...
详细信息
In this paper, a novel camera parameters calibration algorithm is proposed by exploiting defocus information. The proposed algorithm is based on two defocus images of the same scene obtained by changing camera's a...
详细信息
In this paper, a novel camera parameters calibration algorithm is proposed by exploiting defocus information. The proposed algorithm is based on two defocus images of the same scene obtained by changing camera's aperture numbers. Both images can be arbitrarily blurred. The blur difference between the two defocused images was estimated. Combining with imaging geometry of the thin lens, the corresponding camera parameters can be calibrated. This proposed algorithm remove the limit of calibration algorithm given by Soon-Yong Park that one of the images used in calibration must be focused. And it is valid without process of scale normalization. The calibrated parameters yield consistent results in depth estimation. Experimental results on synthetic and real images are presented to demonstrate the effectiveness of the proposed algorithm.
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, d...
详细信息
This paperpsilas purpose is to design a novel artificial immune model for network intrusion detection. This novel model can satisfy three main requirements of an efficient network intrusion detection system, namely, distributed, lightweight and self-organizing, can also quicken the process of affinity maturation of detector population and improve the efficiency of anomaly detection. The algorithms of adaptive extracting vaccines and vaccine operator are given in detail. And then, on the basis of Kimpsilas conceptual model for network intrusion detection, a novel artificial immune model and relevant algorithm for real-time network intrusion detection is proposed, which integrates vaccine operator with negative selection algorithm and clonal selection algorithm.
Scheduling is one of the most well-known problems in both modern service science and service operational management. On the basis of quantum swarm evolutionary method, a new technique, immune quantum swarm optimizatio...
详细信息
Scheduling is one of the most well-known problems in both modern service science and service operational management. On the basis of quantum swarm evolutionary method, a new technique, immune quantum swarm optimization (IQSO) approach is proposed by redefining the immune operators, vaccinating operator and immune selecting operator, which has a powerful global exploration capability and its applications with permutation flowshop scheduling. The experimental results obtained from the proposed method on some benchmark instances show that it is very promising, compared to genetic algorithms and swarm intelligence methods.
A high-order PE method has been derived and analyzed for solving multi-object RCS for the first time. Compared with the existing method SPE, the present method has following features: Firstly, boundary conditions incl...
详细信息
A high-order PE method has been derived and analyzed for solving multi-object RCS for the first time. Compared with the existing method SPE, the present method has following features: Firstly, boundary conditions including PML and scatterers boundary conditions can be handled as easy as SPE method. Secondly, to obtain the full bistatic RCS, we need only two rotated PE runs for high-order PE while in SPE method the number is twelve. Last but most important of all is that due to the narrow-angle approximation, the SPE cannot handle multi-object scattering problems exactly while the high-order PE method can compute multi-object RCS efficiently. The method is very powerful in deal with objects quite large compared to the wavelength.
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper pres...
详细信息
ISBN:
(纸本)9780972147903
The effectiveness of ad-hoc retrieval systems appears to have reached a *** the research community is investigating an assortment of variables that will help them develop increasingly accurate retrieval *** paper presents a new method of high accuracy retrieval of document,which is based on quotient *** describes the problem space from different granularity:sentence,paragraph and document,and studies the relations among different granularities.
A novel and efficient speckle noise reduction algorithm based on Bayesian contourlet shrinkage using contourlet transform is ***,we show the sub-band decompositions of SAR images using contourle transforms,which provi...
详细信息
A novel and efficient speckle noise reduction algorithm based on Bayesian contourlet shrinkage using contourlet transform is ***,we show the sub-band decompositions of SAR images using contourle transforms,which provides sparse representation at both spatial and directional ***,a Bayesian contourlet shrinkage factor is applied to the decomposed data to estimate the best value for noise-free contourle *** results show that compared with conventional wavelet despeckling algorithm,the proposed algorithm can achieve an excellent balance between suppresses speckle effectively and preserve image details,and the significant information of origina image like textures and contour details is well ma intained.
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare field. First of all, direct-path interference (DPI) suppression which is the technique of bottleneck of movin...
详细信息
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare field. First of all, direct-path interference (DPI) suppression which is the technique of bottleneck of moving target detection by a noncooperative frequency modulation(FM) broadcast transmitter is analyzed in this article; Secondly, a space-time-frequency domain synthetic solution to this problem is introduced: Adaptive nulling array processing is considered in the space domain, DPI cancellation based on adaptive fractional delay interpolation (AFDI) technique is used in planned time domain, and long-time coherent integration is utilized in the frequency domain; Finaily, an experimental system is planned by considering FM broadcast transmitter as a noncooperative illuminator, Simulation results by real collected data show that the proposed method has a better performance of moving target detection.
One of the major problems in continuous wave bistatic radar based on FM radio transmitter is direct path interference(DPI). This is the signal received directly from a transmitter by the receive channel antenna. The D...
详细信息
ISBN:
(纸本)9780863418488
One of the major problems in continuous wave bistatic radar based on FM radio transmitter is direct path interference(DPI). This is the signal received directly from a transmitter by the receive channel antenna. The DPI and the reflected signal are coherent, have similar structure except for the mutual delay and Doppler frequency shift. To detect targets it is necessary to suppress or remove the DPI signal. First of all, the DPI signal based on FM radio transmitter is analyzed. Secondly, the approach based on adaptive nulling array processing is introduced in detail to solve this problem. Finally, associated signalprocessing schemes of the FM-radio-based passive radar is discussed. Simulation results by applying real collected data show the proposed method is effective.
暂无评论