The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Level set methods have been extensively used in contour recognition and image segmentation. The traditional level set methods require to initialize the level set function regularly and are strongly dependent on initial contour position thus there are many problems about the methods. Considering those problems, this article proposed a new level set method to draw geometric active contour self-adaptively...
The patterns of Human Epithelial type 2 (HEp-2) cell provide useful information for the diagnosis of systemic autoimmune diseases. However, the recognition of cell patterns requires manual annotation by experienced physicians, which is subject to inter-observer variability. Therefore, an automatic diagnosis system is desirable. As the crucial pre-processing step for cell pattern recognition, the performance...
Existed algorithms to detect constructing vehicles intrusion in order to prevent power grid transmission line from damage by using video/image processing can only detect constructing vehicles in a single color. In this paper, a new algorithm to detect invasive constructing vehicles based on BOW presentation model is proposed. Firstly, Gaussian fuzzy operation is imposed on the image and Gaussian mixture...
In the calculation process of spatial-temporal co-occurrence patterns, traditional methods often set the whole time frame as the actual existence time by default for all moving targets. However, in practice, existence time frame of different types is not necessarily the whole time frame. Based on this fact, the paper describes the calculation method of spatial-temporal interest degree-spatial frequency...
Face recognition is a typical application of biometrics identification technologies, which requires specific methods to obtain face representation as its features. In this paper, we apply a simple yet highly reliable method called Vector Quantization (VQ) to extract the features. Although VQ algorithm has been proven effective, the inability of VQ histogram features to convey spatial structure information,...
We design a low energy Bluetooth (BLE) device including reference-tag-based indoor position algorithm to solve different situations including location determining, route guideline and tracking in this study. It can not only help the visitor or patient to understand the position but also provide a system for medical staff to monitor the safety of patients and new born babies in hospital. This device...
This paper presented a SIFT based multiple instance learning algorithm to deal with the problem of pose variation in the tracking process. The MIL algorithm learns weak classifiers by using instances in the positive and negative bags. Then, a strong classifier is generated by powerful weak classifiers which are selected by maximizing the inner product between the classifier and the maximum likelihood...
Retinex is a theory on the human visual perception. It explains an object's color is determined by its reflectance. The classic Retinex causes the problems of halo, color distortion and noise, etc. In order to solve these problems, In this paper, we present a algorithm that combining with Nonlinear Image Enhancement and Guided Filter to estimate the reflection components under Retinex frame work....
Multiplier is a fundamental component for digital signal processing (DSP) applications and takes up the most part of the resource utilization, namely power and area. Approximate circuitry architectures have been studied as innovative paradigm for reducing resource utilization for DSP systems. In this paper, the 4:2 compressor based approximate multiplier architecture which uses both truncation and...
In the last decades, Robust Principal Component Analysis (PCA) has been drawn much attention in the image processing, computer vision and machine learning communities and various robust PCA methods have been developed. This paper introduces a new generalized robust PCA with emphasizing on ℓ2, 1-norm minimization on loss function. The ℓ2, 1-norm instead of Frobenius norms based loss function is robust...
This paper presented a novel holes filling method for the scattered point cloud, particularly for recovering the missing points at featured curves or corners. Firstly, hole-boundary point and feature point were extracted to determine the incomplete feature curves. According to these two point sets, the holes were categorized into two types, featured holes and non-featured holes. Secondly, tensor voting...
The three-dimensional high efficiency video coding (3D-HEVC) is an emerging standard to compress multi-view video plus depth (MVD) data. In 3D-HEVC, many new approaches are developed for depth intra coding. In addition to the 35 intra prediction modes inherited from HEVC, depth modeling modes (DMMs) are also employed to better preserve the object edges, which improve the coding efficiency significantly,...
This paper present a novel algorithm for cartoon image segmentation based on the simple linear iterative clustering (SLIC) superpixels and adaptive region propagation merging. To break the limitation of the original SLIC algorithm in confirming to image boundaries, this paper proposed to improve the quality of the superpixels generation based on the connectivity constraint. To achieve efficient segmentation...
Under the environment of big data, retrieval becomes a crucial technology and image retrieval is paid more attention and widely used. The paper proposes a second-order retrieval algorithm, of which can be used to retrieval the similar images. Firstly, extracting image sift features. Then, build frequency table of characteristic words by k-means clustering and bag of word algorithm. Finally, based...
Under the condition of low sample, how to improve the robustness of adaptive beamforming algorithm is a key problem in engineering application. This article first introduces the minimum variance distrtionless response. On the basis, the algorithm of diagonal loading has been researched and how to select the optimal loading value in the practical application has been emphatically analyzed. Finally,...
Pattern matching algorithms are very important in both data mining and the intrusion detection system. Efficiency and accuracy BM algorithm for text matching is relatively high, but, when a large number of repeated and complex characters to match in the network, the efficiency will be lower. Aiming at BM algorithm's efficiency of matching is lower in the network environment, an improved algorithm...
In the Ultrasonic detection of welding defects, the defect echo signal carries the important feature information of sampling object. To solve the problem of accurate extraction of defect signal in the Ultrasonic detection of welding defects, the ICA algorithm based on Particle Swarm Optimization is proposed to extract the ultrasonic signal of welding defects, and using this algorithm to denoising...
Doppler radar real-time signal processing is one of the core equipment in the speed measuring system. The working principle is presented in this paper, and an efficient real sequence FFT algorithm is proposed based on the Fast Fourier Transform, which can reduce the computation complexity effectively. The design with low cost FPGA implementation, high performance, high flexibility, speed and other...
Pseudorandom sequences have important applications in information security, and the generation method of pseudorandom sequence is an important hotspot of research. Because of owning the large amount of the Knight-tour Hamilton cycles in large size Knight-tour graph, a method based on SemiHam algorithm to generate pseudorandom sequence is proposed in this paper. Firstly, use SemiHam algorithm to produce...
Analysis dictionary learning (ADL) aims to design dictionaries from training data based on an analysis sparse representation model. Sparse analysis model is an alternative model to the sparse synthesis model used in a variety of signal processing areas. This paper introduces a new ADL method called MAX-ADL algorithm used to estimate the dictionary directly from the noisy measurements. The algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.