In this work, we present a device for cell manipulation and separation using travelling wave dielectophoretic (twDEP) force. The device consists of microchamber and 16 parallel electrode array controlled by four-phase...
详细信息
Part I of this special issue is devoted to the physical layer, MAC layer, and physical-link cross-layer design technologies of vehicular communications and networks. There are 21 papers in this issue.
Part I of this special issue is devoted to the physical layer, MAC layer, and physical-link cross-layer design technologies of vehicular communications and networks. There are 21 papers in this issue.
A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, i...
详细信息
ISBN:
(纸本)9780980326741
A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, including the WFLogSv and the WAM methods. This level of accuracy is the result of improving the WFLogSv steganalyzer by considering a more comprehensive relationship between the singular values of each image block and the linear correlation of the rows and the columns. That is, instead of the closeness of the lower singular values to zero, the energy distribution of the singular values is investigated. An innovative measure is proposed for this investigation, which is inspired from arithmetic mean-geometric mean inequality. Experimental results confirm the supremacy of the proposed steganalysis scheme over its counterparts.
Automatic image annotation is a promising solution to narrow the semantic gap between low-level content and high-level semantic concept, which has been an active research area in the fields of image retrieval, pattern...
详细信息
A passive universal image steganalysis method is proposed that is shown to be of higher detection accuracy than existing truly blind steganalysis methods including Farid's and the WAM. This is achieved by improvin...
详细信息
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform wa...
详细信息
ISBN:
(纸本)9781457717000
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform was proposed in the paper. Firstly, text lines are labeled by using maximum gradient difference, and then we use the method of non-text filtering to get rid of shorter text lines and dots. Finally, margin information is extracted after refining on text lines, and two-stage Hough transform is made to the margin extracted information with the strategy varying from “coarse” to “fine” strategy, calculating the skew angle of document image which is fixed by the average of several longest lines. Experiment results shows that the algorithm detects skew angles of document image more rapidly and accurately than Hough transform alone.
image retrieval has been an active research topic due to its great importance in the field of image management, digital library and web searching. However, the performances of the existing approaches, including text-b...
详细信息
In this paper, we investigate the interference mitigation from a cross-layer perspective for a cognitive radio (CR) multiple-input multiple-output (MIMO) network coexisting with a primary time-division-duplexing (TDD)...
详细信息
In this paper, we investigate the interference mitigation from a cross-layer perspective for a cognitive radio (CR) multiple-input multiple-output (MIMO) network coexisting with a primary time-division-duplexing (TDD) system. The channel allocation in the media access control (MAC) layer and a subspace-based precoding scheme in the physical layer of the CR network are jointly considered to minimise the interference to the primary user and maximise the CR throughput. Two distributed cross-layer algorithms, namely, joint iterative channel allocation and precoding (JICAP) and non-iterative channel allocation and precoding (NICAP), are proposed for the cases with and without channel information among CR nodes, respectively. Moreover, a channel estimation scheme is also proposed to enable the NICAP. The effectiveness of the proposed algorithms over non-cross-layer counterpart is demonstrated via simulations.
This paper presents a cursive Arabic text recognition system. The system decomposes the document image into test line images and extracts a set of simple statistical features from a one-pixel width window which is...
详细信息
This paper presents a cursive Arabic text recognition system. The system decomposes the document image into test line images and extracts a set of simple statistical features from a one-pixel width window which is sliding a cross that text line. It then injects the resulting feature vectors to Hidden Markov Models. The proposed system is applied to a data corpus which includes Arabic text of more than 600 A4-size sheets typewritten in multiple computergenerated fonts.
In the past decade there has been a great interest in a synthesis-based model for signals, based on sparse and redundant representations. Such a model assumes that the signal of interest can be composed as a linear co...
详细信息
In the past decade there has been a great interest in a synthesis-based model for signals, based on sparse and redundant representations. Such a model assumes that the signal of interest can be composed as a linear combination of few columns from a given matrix (the dictionary). An alternative analysis-based model can be envisioned, where an analysis operator multiplies the signal, leading to a cosparse outcome. In this paper, we consider this analysis model, in the context of a generic missing data problem (e.g., compressed sensing, inpainting, source separation, etc.). Our work proposes a uniqueness result for the solution of this problem, based on properties of the analysis operator and the measurement matrix. This paper also considers two pursuit algorithms for solving the missing data problem, an L1-based and a new greedy method. Our simulations demonstrate the appeal of the analysis model, and the success of the pursuit techniques presented.
暂无评论