A novel edge detection method based on anisotropic mathematical morphology and scale multiplication in nonsubsampled contourlet transform(NSCT) domain is proposed to obtain a superior and robust performance under heav...
详细信息
A novel edge detection method based on anisotropic mathematical morphology and scale multiplication in nonsubsampled contourlet transform(NSCT) domain is proposed to obtain a superior and robust performance under heavy noise. One preliminary result is obtained using anisotropic morphological gradient of the low-frequency component, yielding a single-pixel response with few pseudo edges. Due to the great ability of NSCT to localize distributed discontinuities such as edges, scale multiplication results of high-frequency components can get rid of a large amount of noise and produce well-localized edge candidates. The final result is a fusion of the detection results of low-frequency component and high-frequency components. Detailed experiments compared with other state-of-the-art methods demonstrate that the proposed method has a superior performance of edge detection and is quite robust even under heavy noise.
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a u...
详细信息
ISBN:
(纸本)9781479947249
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service(QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location,which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is *** privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
Memristor is a nonlinear resistor with the character of memory and is proved to be suitable for simulating synapse of neuron. This paper introduces two memristors in series with the same polarity (back-to-back) as sim...
详细信息
ISBN:
(纸本)9781479944903
Memristor is a nonlinear resistor with the character of memory and is proved to be suitable for simulating synapse of neuron. This paper introduces two memristors in series with the same polarity (back-to-back) as simulator for neuron's synapse and presents the model of recurrent neural networks with such back-to-back memristors. By analysis techniques and fixed point theory, some sufficient conditions are obtained for recurrent neural network having single attractor flow and multiple attractors flow. At last, simulation with numeric examples is presented to illustrate our results.
This paper analyzes the capacity of the finite scatterer (FS) multiple-input multiple-output (MIMO) channel model with finite angular resolution. The rank of the channel is bounded by not only the number of antennas b...
详细信息
This paper analyzes the capacity of the finite scatterer (FS) multiple-input multiple-output (MIMO) channel model with finite angular resolution. The rank of the channel is bounded by not only the number of antennas but also the finite angular resolution of antenna arrays. The probability mass function (PMF) of rank is studied and derived based on the Stirling number of the second kind. As a result, the closed-form expression of the capacity of a FS MIMO channel model is obtained. Furthermore, asymptotic analyses such as the large-scale system analysis, infinite scatterer analysis, and the multiplexing gain analysis are investigated.
Bat algorithm is a novel swarm intelligent algorithm inspired by the echolocation behavior of bats with varying pulse rates of emission and loudness. In this paper, a new variant which is called adaptive bat algorithm...
详细信息
Extracting non-rigid object from images can be used in object recognition, medical image analysis, video monitoring, etc. In order to improve the efficiency and accuracy of visual object extraction, we design a candid...
详细信息
Extracting non-rigid object from images can be used in object recognition, medical image analysis, video monitoring, etc. In order to improve the efficiency and accuracy of visual object extraction, we design a candidate shape generator based on a mixture strategy, called mixture generator, it combines the image data driven method with model parameter driven method, and tends to generate valid shape in area which has a high shape prior density value by exploiting the GPDM model, so the efficiency of search is greatly improved. To prove the accuracy of our mixture generator, we have done experiments under the framework of global optimization algorithm (simulated annealing) on the FGNET face database. Experiments show that, compared with traditional ASM algorithm, our method is not only insensitive to initialization conditions, but also can put up with clutters and realize a more robust object extraction.
In this paper, we propose a robust visual tracking algorithm based on online learning of a joint sparse dictionary. The joint sparse dictionary consists of positive and negative sub-dictionaries, which model foregroun...
详细信息
This paper considers the boundary control of a star-shaped open-channel network modeled by the Saint-Venant equations. We present the boundary feedback stabilization of the Saint-Venant equations by means of a Riemann...
详细信息
The convergence speed of multi-agent system is a focused issue in the consensus problem. The traditional consensus algorithm is generally discussed on the single-layer topology. The spectral partitioning algorithm of ...
详细信息
In this paper,we present a model predictive control algorithm for input-saturated systems by a saturation-dependent Lyapunov function *** saturation-dependent Lyapunov function captures the real-time information on th...
详细信息
ISBN:
(纸本)9781479900305
In this paper,we present a model predictive control algorithm for input-saturated systems by a saturation-dependent Lyapunov function *** saturation-dependent Lyapunov function captures the real-time information on the severity of saturation and thus leads to less conservative results in controller design.A set invariance condition for the systems with input saturation is presented.A min-max MPC algorithm is proposed for the linear parameter-varying(LPV) systems based on the invariant *** MPC controller is determined by solving a linear matrix inequality(LMI) optimization *** example demonstrates the effectiveness of the proposed algorithm.
暂无评论