Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Chaos-based dynamics system is typical of the properties of randomness, determinacy and sensitivity to the initial parameters, which makes it suitable for the application of image encryption. In this paper, a wavelet domain color image encryption algorithm based on chaos is proposed. The color plain image is firstly decomposed into R, G, B components. Then an improved 3D chaotic cat map is proposed...
Image reversible data hiding is the process of embedding information in an image in a visually imperceptible way with the result that both the original image and the embedded information can be exactly recovered. In the traditional approaches of histogram shifting and causal window-based difference/prediction-error expansion, pixel value prediction methods have been rather crude and simple. In this...
Recently there has emerged a lot of work that integrates the compressive sampling theory into watermarking schemes. The subtle changes in local space domain of the signal can lead to distinct disturbance in all the measurements. It will lead to the poor robustness when the watermark is directly embedded into the compressive sampling measurements. To solve this problem, a robust digital watermarking...
Xiangshan County is one of the most important areas in Zhejiang Province. The land use changes interpretion and its changing rules are the main aims of the paper. Firstly, for the classification system was the foundation of the study, it had to be built. Secondly, the tasks were the collection and preprocessing of the high resolution remote sensing images in 2009 and 2012. Thirdly, the interpretation...
For hyperspectral data classification, feature reduction techniques have become an apparent need to extract information from original data. In this paper, we introduce Locality Sensitive Discriminant Analysis (LSDA) to perform feature reduction for classification of hyperspectral imagery. By preserving both the discriminant and local geometrical structure in the data, the proposed method can obtain...
There are several papers about pseudo dynamic methods used in signature authentication. Recently, the gray scale features local binary pattern(LBP) originate from texture analysis has been widely used in signature verification system with advantage of robustness to illumination change. The major problem of LBP is its sensitivity to noise, hence many solutions has been applied to solve this problem...
We present a modified feature point descriptor (M-BRIEF) based on Binary Robust Independent Elementary Features (BRIEF). BRIEF is much faster both to build and to match than SIFT and SURF, and it yields a better recognition as well. However, the matching results are not robust when the viewpoint changes obviously. In our paper, M-BRIEF automatically adjusts the coordinates of the image patch according...
Because of complex scattering mechanism between the target and the runway, synthetic aperture radar (SAR) raw data generation and image simulation for the aircraft standing on the runway is a difficult thing. In this work, a new procedure is proposed to deal with this problem. Major scattered field from both the aircraft and the runway are calculated, meanwhile, multipath scattering and the shadowing...
A novel method is presented to recognize warheads in the ballistic missile defense. The normalized correlation coefficients and further the matching scores between range profiles (RPs) of warhead are first calculated. By introducing a threshold, the warhead and decoy can be separately classified. The distribution of these results is then modeled as a mathematical model. Based on such distribution,...
The Over-the-Horizon Radar (OTHR) is an effective approach for long-range target detection. However, most existing OTHR systems resort to receive array with quite large aperture, which makes them difficult to deploy. Based on the small aperture receive array, this paper presents a new architecture of long-range target detection system. The shortage of small aperture receive array on echo signal-to-noise...
As is known, the most prominent advantage of Finite Set Statistics (FISST) based multi-target tracking algorithms is it could cope with complicated tracking problems arising from special events such as target birth, target death and tracks crossing without complicated data association. Through improving the existing labeled particle Probability Hypothesis Density (L-P-PHD) filter, an improved labeled...
A serial-input serial-output encoder based on pipelined rotate-left-accumulator (RLA) circuits is designed for multi-rate Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes of Chinese digital terrestrial/television multimedia broadcasting (DTMB) standard. The RLA circuit can make the area usage economical, and the pipelined architecture can simplify the memory structure. The encoder is implemented...
In this paper, we study on the blind periodic estimation of the pseudo-noise (PN) sequence in variable-spreading-length (VSL) multi-rate direct-sequence code division multiple access (DS/CDMA) systems. The reprocessing of the power spectrum method which is used to estimate the period of general direct-sequence spread spectrum signals is extended to solve the periodic estimation of the PN sequence...
Audio information hiding is a technique, which is used to hide secret message into the audio flows. In this paper, an audio information hiding scheme with high-capacity is proposed, which uses both Compressed Sensing (CS) and psychoacoustic model algorithms for improving the capacity of hidden message and the auditory imperceptibility. The scheme first applies CS technology to compress the secret...
This paper presents a continuous time lowpass sigma-delta ADC for LTE communication with a chain of integrators and with capacitive feedforward summation (CICFF) plus circuit — which is an ideal function for implementation in low power applications. The summation of feedforward signals is achieved by capacitors plus, without the essential thing of any extra active components which can be used for...
We introduced a wireless optical communication system in this paper. Through the analysis of two main channels in the system: diffuse channel and light of sight (LOS) channel, we researched the influence of the multipath effect on the optical power distribution of the system and the influence of the SNR of the system under a given transmission rate. The method of reasonable layout of the LED array...
For the large interconnected power system, dynamic equivalence could significantly reduce the computing load and manifest the dominant characteristics. Coherent method is one approach of dynamic equivalence and its core is the automatic identification of coherency. Based on the angle perturbed trajectory measured by WAMS, a new coherency recognition method based on Independent Component Analysis is...
A Protocol Strategy of Device Management for lighting control system in ACN is analyzed. Through Petri based formal verification, a Petri model of DMP is built. The rationality of the model is validated. The reliability and circulation characteristics are also proved. Through Rationality, Reliability and circulation characteristics, we prove that DMP is reachable. The Protocol Strategy of Device Management...
Bit-Interleaved Coded Modulation with iterative decoding (BICM-ID) is a technique with combination of coding and high-order modulation. Its many outstanding merits such as it can advance the coding gain, suit the fading channel and separately design the encoding part and the modulation part, make it a very competitive technology in the new generation wireless transmission system. This paper analyzed...
Accuracy of peak detection is very important for autonomic evaluation based on photoplethysmographic (PPG) signals. Considering percussion peaks may not the maximum points in their PPG periods, the study proposed an improved algorithm of peak detection. It first determines the reference points at the rising edge of PPG percussion waves and then applies the local maximum only in the certain ranges...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.