Abstract: This paper proposes a Hess (also known as Hessian) matrix-based multi-focus image fusion method. In this method, multi-scale Hess matrix is utilized to detect feature and background regions. On this basis, source images are split into two different p...
Abstract: Due to the influences of scattering of the light and interference of the noise, underwater image quality is always degraded severely. In order to remove the blur and suppress the noise, and improve the quality of underwater image, a novel underwater ...
Abstract: The problem of tracking drift is produced easily by traditional sparse representation tracking methods in complex scene. To solve this problem, a novel tracking approach based on sparse optimization of local sensing is proposed. Firstly, the object a...
Abstract: To get the closed boundary of target object of given stereoscopic image, this paper proposes an improved algorithm with disparity-guided constraint for active contour extraction based on greedy snake model. The disparity relationship between the cont...
Abstract: With the development of smart phones and mobile internet, Quick Response (QR) codes are widely applied to mobile information interaction. However, the appearance of the standard QR code is similar to the noise signal. It is lack of visual aesthetics,...
Abstract: As a result of the existence of organisms and suspended particles under underwater conditions, images captured under water usually have low contrast, color distortion and loss of visibility. At the same time, due to the existence of the artificial li...
Abstract: Fingerprint-based indoor localization technology is attracted extensive attention of researchers with the fusion of crowd-sensing and machine learning. However, existing approaches have the bottleneck of scalability and instantaneity caused by high r...
Abstract: In order to balance between convergence and distribution in Multi-Objective Evolutionary Algorithms (MOEAs), a Many-Objective Evolutionary Algorithm based on Angle Penalized Distance (MaOEA-APD) is proposed. Firstly, considering the importance of con...
Abstract: Based on a large number of training samples to generate high confidence images, generative adversarial nets achieve good results, but the existing network of image generation in the training sample basis, the training parameters can not be used to ge...
Abstract: For the image distortion of over-carved, this paper proposes a modified Seam Carving (SC) method based on image blocking. Images are segmented into protected and non-protected blocks according to the labelled averaged column summation energy vectors,...
Abstract: To overcome the deficiency of static expression feature, which lacks time information and can not reflect the subtle changes of expression adequately, a dynamic expression recognition method is proposed for non-specific face: the dynamic expression r...
Abstract: Hand infrared trace images can not clearly reflect the original contact contour of hand, which belong to a special kind of infrared blurred images. Inspired by biological immune, an artificial targeting immunotherapy is proposed to extract the hand t...
Abstract: For the problem of noninvasive continuous blood pressure algorithm with un-accuracy, a novel multi- parameter fusion algorithm based on BP neural network is proposed, according to the formation from electrocardiogram and photoplethysmograph of arteri...
Abstract: In order to provide a recommended-path service for tourists with the shortest traveling time in the peak-season, the Time Optimal Traveling Salesman Problem (TOTSP) is further studied and the fit function is introduced into the fitness function of th...
Abstract: The traditional Direct Position Determination (DPD) methods have localization accuracy decrease when locating distributed sources. DPD methods of the distributed source is proposed in this paper to overcome mentioned above shortcoming. Firstly, a DPD...
Abstract: To improve the convergence speed and noise suppression effects of blind equalizer under impulsive noise environment, a new dual-mode blind equalization algorithm based on Renyi entropy and fractional lower order statistics is presented. Renyi entropy...
Abstract: To solve the problem of data loss in the field of Fiber Bragg Grating (FBG) sensing, a signal repaired method based on compressed sensing with improved reconstruction algorithm is proposed. According to the characteristics of signal, the suitable obs...
Abstract: For the generator polynomial blind recognition method of binary pseudo-random sequences, it is necessary to know the polynomials order in advance, the algorithm with poor fault tolerance and high complexity. In this paper, the analysis matrix is firs...
Abstract: In order to achieve the justification of whether a frame structure detection exists or not under the condition that protocol is unknown, an algorithm for frame structure detection in physical layer based on multi-fractal spectrum is proposed. Firstly...
Abstract: This paper proposes a new OFDM symbol duration based cyclostationary spectrum sensing method. The method first estimates the cyclic autocorrelation function from every received OFDM symbol during its symbol period, then constructs the test statistic ...
Abstract: Minimum Mean Square Error (MMSE) algorithm is near-optimal for uplink massive MIMO systems, but it involves high-complexity matrix inversion. Recently, the proposed detection algorithm based on Neumann series approximation reduces the complexity with...
Abstract: Most of the existing vertical handover algorithms are only based on user centric or network centric, which do not fully consider the common impact of the two sides on the handover decision. In order to solve this problem, a two-sided matching model b...
Abstract: Mixed Operation based Ciphers (MOC) attract cryptographers owing to their high security and high efficiency on both software and hardware platforms. As a basic principle of cryptosystem design, completeness refers to that every output bit contains th...
Abstract: In order to overcome the defects such as contour emerging induced by the cipher phase information mainly concentrated in the pure phase mask and difficult to resist the amplitude phase retrieval attack in current optical image encryption technology, ...
Abstract: As for energy hole issue in Wireless Sensor Network (WSN), an energy-balanced dynamic hierarchical data forwarding strategy is proposed. According to the node usable energy, relative position and the energy consumption of cluster head in different ar...
Abstract: With the expansion of Software Defined Network (SDN), the decoupling of control layer and data layer brings new problems such as controller deployment. In this paper, a Multi-Controller Deployment Algorithm Based on Load Balance (MCDALB) in SDN is pr...
Abstract: For spaceborne GNSS-R, Delay-Doppler Map (DDM) shape is less sensitive to wind speed, resulting in poor retrieval accuracy measured by fitting theoretical DDM to the measured one. To solve this problem, a method directly linking the individual DDM po...
Abstract: The regular false targets which are generated by the intermittent sampling repeater jamming can be easily recognized. To overcome this disadvantage, an inter-pulse periodical shift-frequency jamming method is proposed against Synthetic Aperture Radar...
Abstract: The traditional detectors of colocated MIMO radar can detect a target without training data. However, the detection performance is poor with low number of waveform sampling. In this paper, two detectors, based on the Generalized Likelihood Ratio Test...
Abstract: Focus on the problem of phase ambiguity and the issue that it is impossible to estimate the unambiguous angles of multiple sources with the same frequency and time of arrival. An approach for multiple sources parameters estimation with rotating inter...
Abstract: Considering the problem of mismatched impedance of millimeter wave antenna, an algorithm based on Particle Swarm Ant Colony Optimization (PSACO) is proposed to optimize antenna patch parameters and the pheromone guidance mechanism of the ant colony a...
Abstract: Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is foun...