Abstract: This paper applies Parzen-window nonparametric estimation of active contour methods for image segmentation which can be performed without regarding image regions as any of typical probability distributions, so it expands the application range of the ...
Abstract: Firstly, order morphological transformations on gray image are introduced in this paper, then an image processing system in which order morphological transformation is implemented by hardware is presented. The system is composed of Digital Signal Pro...
Abstract: Skin color character is widely used for face detection and face tracking. This paper construct a mixed model in both normalized RGB and HSV color space, which can be used to acquire possible skin regions in original image. It designs a sequential fle...
Abstract: The classical Principal Component Analysis (PCA) for image feature extraction is usually based on vectors, which makes it very time-consuming, and the class information in the training sample has not been utilized fully also. To overcome these two dr...
Abstract: In this paper a watermarking scheme for digital image that can resist geometrical attacks is proposed. The watermark is a key-dependent random vector according to Gaussian distribution. After preprocessed and periodized, the watermark is embedded int...
Abstract: Based on modification of time constraints in the FPGA design, a watermark-embedding scheme is proposed for protection of intellectual property rights of the system designer. A coded binary watermark sequence is used to replace the least significant d...
Abstract: Based on relative error covariarice matrix (RECM) information, a reduced-order model is proposed for solving linear inverse problem. The reduced-order model turns the high order model into an approximate lower order model, which can efficiently allev...
Abstract: The real-time detection algorithm of moving point target in image sequences is one of key algorithms in many real-time processing systems. After the analysis of real background and the demand of the detection algorithm, this paper presents a research...
Abstract: After analyzing the inherence of radiometric resolution in SAR images, this paper points out there is considerable error of radiometric resolution in SAR images using current engineering estimation formula which only suits for the qualitative analysi...
Abstract: This paper amply analyzes the airborne SAR motion compensation mechanism on the range compression data and complex image data, and proposes a motion compen-sation algorithm for the high resolution airborne SAR. This algorithm makes use of the sub-ape...
Abstract: The Wigner-Ville Distribution (WVD)-Hough transform could effectively detect several Linear Modulated Frequency(LMF) signals in low Signal to Noise Ratio (SNR.) envi-ronment. However, when the energy of these LMF signals diverge greatly, it is quite ...
Abstract: Inspired by the biology immune system, the concept of Immunodominance in immunology is introduced to Artificial Immune System (AIS) in this paper. In AIS, the concept includes two parts, antibody-immunodominance and antigen- immunodominance. Based on...
Abstract: The principle of pseudo-random phase modulation fuze, pseudo-random phase modulation and Pulse Amplitude Modulation (PAM) combined fuze, and noise FM jamming are introduced in brief. On this basis, the Signal to Jamming Ratio (SJR) gains of the two f...
Abstract: It is a basic problem for the simulation of correlated Rayleigh. fading to produce the multiple independent Rayleigh fading waveforms. Jakes model has been widely accepted, but it has major shortcoming in the statistical independence. A new math mode...
Abstract: A new selected transmission scheme of multiple antennas is proposed, named Greedy Search (GS) method. The transmit antennas selected from all antennas can be used as the active transmit antennas. When, used with waterfilling power allocation, GS meth...
Abstract: The paper studies the performance of CDMA systems with the space-fcime ap-proach under the conditions of multi-users and multipaths. The space-time spreading scheme with a novel algorithm can improve the downlink performance by using two antenna elem...
Abstract: The rate-distortion theory is induced to the system model, and the mathematic formula between the feedback channel rate and the closed-loop MIMO capacity are deduced. Through theoretical analysis and simulation results, this paper proposes four impor...
Abstract: It is usually assumed that the perfect propagation delay has been achieved between the receiver and the transmitter, the receiver and the transmitter synchronize per-fectly, actually it is impossible to do this. Because of this, this paper proposes a...
Abstract: Ad hoc network is an energy-limited network. How to improve energy efficiency in an Ad hoc network is an important open problem. This paper proposes a new routing metric, which integrates congestion status at the link layer and remaining energy of a ...
Abstract: In this paper, a transmission time based admission control algorithm in IEEE 802.11 wireless LANs is proposed. When a new real-time flow requests to be admitted to the system, the Access Point (AP) evaluates whether the new flow will overrun the syst...
Abstract: Firstly, the uplink capacity of CDMA system, in multi-path fading channels with single-user-detection and multi-user detection, is analyzed in this paper. The uplink capacity comparison between LS code and Walsh code is discussed for the above-mentio...
Abstract: A novel model of the multiplex system is proposed, which can suppress narrowband interference and white Gaussian noise by using adaptive combination filter and estimation model of SPECCORR_TDOA based on analyses of cyclostationary signals. Finally, t...
Abstract: Because the algebraic expression of Rijndael S box is a composition of the converse function with a q-polynomial over GF(28), in this paper the variables of S box are supposed rationally and the relations between these variables are analyzed, then a ...
Abstract: Analyses of a nominative signature scheme (KPW scheme) and a nominative proxy signature scheme (PL scheme) are given, respectively. The results show that the KPW scheme is not a nominative signature scheme since the nominator not only can verify and ...
Abstract: The reflector antenna distortion model is built by exploding test results. The radiation characteristics of a kind of distorted shaped reflector antenna are computed by using PO and PTD method, and the radiation characteristics of the reflector anten...
Abstract: This paper surveys some typical approaches to migration models used in Mobile Agent System(MAS) and describes the migration mechanism in MAS which is designed and implemented by authors. Focused on the issues about the agents dynamic routing and migr...