Active deception jamming is one of the common means to jam radar signals. How to effectively recognize active deception jamming is a challenge of modern radar technology. To address the accuracy and real-time of radar...
详细信息
The existing safety and health monitoring methods for bridge construction are mainly manual monitoring and wired monitoring with many disadvantages, such as low efficiency, poor accuracy, great implementation difficul...
详细信息
This paper presents a novel approach to compute DCT-I, DCT-III, and DCT-IV. By using a modular mapping and truncating, DCTs are approximated by linear sums of discrete moments computed fast only through additions. Thi...
详细信息
This paper introduced a novel high performance algorithm and VLSI architectures for achieving bit plane coding (BPC) in word level sequential and parallel mode. The proposed BPC algorithm adopts the techniques of co...
详细信息
This paper introduced a novel high performance algorithm and VLSI architectures for achieving bit plane coding (BPC) in word level sequential and parallel mode. The proposed BPC algorithm adopts the techniques of coding pass prediction and parallel & pipeline to reduce the number of accessing memory and to increase the ability of concurrently processing of the system, where all the coefficient bits of a code block could be coded by only one scan. A new parallel bit plane architecture (PA) was proposed to achieve word-level sequential coding. Moreover, an efficient high-speed architecture (HA) was presented to achieve multi-word parallel coding. Compared to the state of the art, the proposed PA could reduce the hardware cost more efficiently, though the throughput retains one coefficient coded per clock. While the proposed HA could perform coding for 4 coefficients belonging to a stripe column at one intra-clock cycle, so that coding for an NxN code-block could be completed in approximate N2/4 intra-clock cycles. Theoretical analysis and experimental results demonstrate that the proposed designs have high throughput rate with good performance in terms of speedup to cost, which can be good alternatives for low power applications.
The study provides a design scheme for the mountain landslide monitoring System based on wireless sensor networks. Different sensors are mainly used to collect data about the water depth in the soil and the sloping an...
详细信息
SIFT (Scale Invariant Feature Transform) is one of most popular approach for feature detection and matching. Many parallelized algorithms have been proposed to accelerate SIFT to apply into real-time systems. This pap...
详细信息
In this paper, a face recognition method using local qualitative representations is proposed to solve the problem of face recognition in varying lighting. Based on the observation that the ordinal relationship between...
详细信息
ISBN:
(纸本)9780819469526
In this paper, a face recognition method using local qualitative representations is proposed to solve the problem of face recognition in varying lighting. Based on the observation that the ordinal relationship between the average brightness of image regions pair is invariant under lighting changes, Local Binary Mapping is defined as an illumination invariant for face recognition based on Local Binary pattern descriptor, which extracts the local variance features of an image. For the 'symbol' feature vector, hamming distance is used as similarity measurement. It has been proved that the proposed method can provide the accuracy of 100 percent for subset 2, 3, 4 and 98.89 percent for subset 5 of the Yale facial database B when all images in subset 1 are used as gallery.
In this paper, we proposed a new Primitive-Structure- Based approach for extracting rectangle building from aerial urban images. We obtain all kinds of primitive-structure that compose rectangle by analysing geometric...
详细信息
In this paper, a semi-fragile watermark solution based on quantization index modulation in the wavelet region was proposed. The algorithm employs a compressed halftoned binary image as watermark and embeds it in the w...
详细信息
A novel authentication watermarking scheme for images is proposed in this paper, which holds accuracy location and high security at the same time. In the scheme, different keys are selected for different host data, an...
详细信息
暂无评论