期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
A Low-Cost Smart Office Design Framework Using Arduino
1
作者 Ssemwogerere Rajab Nabagesera Veronica Kawalya +10 位作者 Melese Alemsra Tsehayu Logose Masitula Wamwoyo Faruk Rahman Shiddiqur Ekwaro Dominic Mbalyowere Pasis Maritah Nambobi Mutwalibi Sayo Nakeleh Turay Mugerwa Derrick Kasagga Usama Seguya Asad 《Advances in Internet of Things》 2023年第3期83-108,共26页
The main motive of our research work is security enhancement and light energy conservation. This paper describes a study investigating the potential of a controlled office solution by integrating the Internet of Thing... The main motive of our research work is security enhancement and light energy conservation. This paper describes a study investigating the potential of a controlled office solution by integrating the Internet of Things (IoT) with wireless sensor networks (WSNs). A prototype of a smart office is developed using a global system of mobile Bluetooth and Radio Frequency Identification (RFID) technology. The user can turn on and off the fan remotely at any time. This prototype focuses on security and provides human-friendly assistance when in or out of the Office by integrating a mobile application platform. The innovative automated smart Office is designed with intelligent Security doors, lights, alarms, temperature humidifiers, and bright Liquid Crystal Display (LCD) screens for viewing. Our study has opened up virtual possibilities for producing cheap innovative frameworks in this Generation of IoT and the fifth Generation (5G) technology. Therefore, when implemented, this innovation will ease and improve human quality of life. So, this paper aims to provide a low-cost, effective Internet of the things-based automated smart Office. 展开更多
关键词 Intelligent Office Automation System Wireless Sensor Networks Internet of Things ULTRASONIC Radio Frequency Identification ARDUINO
下载PDF
Design and analysis of a network coding algorithm for ad hoc networks
2
作者 王远 徐华 贾培发 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第4期1358-1365,共8页
Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobilit... Network coding is proved to have advantages in both wireline and wireless networks. Especially, appropriate network coding schemes are programmed for underlined networks. Considering the feature of strong node mobility in aviation communication networks, a hop-by-hop network coding algorithm based on ad hoc networks was proposed. Compared with COPE-like network coding algorithms, the proposed algorithm does not require overhearing from other nodes, which meets confidentiality requirements of aviation communication networks. Meanwhile, it does save resource consumption and promise less processing delay. To analyze the performance of the network coding algorithm in scalable networks with different traffic models, a typical network was built in a network simulator, through which receiving accuracy rate and receiving delay were both examined.The simulation results indicate that, by virtue of network coding, the proposed algorithm works well and improves performance significantly. More specifically, it has better performance in enhancing receiving accuracy rate and reducing receiving delay, as compared with any of the traditional networks without coding. It was applied to both symmetric and asymmetric traffic flows and, in particular, it achieves much better performance when the network scale becomes larger. Therefore, this algorithm has great potentials in large-scale multi-hop aviation communication networks. 展开更多
关键词 无线网络 编码算法 AD 设计 通信网络 网络编码 网络模拟器 编码方案
下载PDF
New Mathematical Modelling on BMR and Weight Prediction for Ghanaians
3
作者 Ian Yaw Asare Ezer Osei Yeboah-Boateng 《E-Health Telecommunication Systems and Networks》 2023年第4期78-90,共13页
Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of indi... Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of individuals. Many scholastic projects have led to the establishment of mathematical models and inventions that measure the BMR and other body composition parameters. However, existing computations have limitations as they do not offer accurate results for Ghanaians. Aim: The purpose of the study was to model BMR metrics that are most suitable for Ghanaians and to investigate the effect of caloric difference on weight, Lean Body Mass (LBM) and % fat composition that can be implemented with Information Technology. Research Methods and Procedures: This was an experimental study that adopted a quantitative approach. BMR and body composition were measured in a sample of 242 Ghanaian adults (141 males and 101 females) from 19 to 30 years of age. Body composition was measured using bioelectrical impendence analysis (BIA) in all participants. Each participant was under study for 7 days. A simple linear regression model was used to examine associations between BMR/calorie intake and total body weight and LBM. Results: There was a significant statistical relation between BMR and LBM and between BMR and weight of both men and women. Equations for BMR and weight were established for males and females. Furthermore, caloric intake differences affected changes in total weight as well as differences in % fat composition. Caloric intake however did not affect the difference in LBM. Conclusion: Caloric difference had an impact on total body weight and Lean Body Mass. The model derived from the study predicts weight change and BMR of Ghanaians from 19 to 30 years of age. It is termed the Health and Age Monitoring System (HAMS). 展开更多
关键词 Basal Metabolic Rate (BMR) Lean Body Mass (LBM) WEIGHT CALORIES
下载PDF
BulkTree: an overlay network architecture for live media streaming
4
作者 GONG An DING Gui-guang DAI Qiong-hai LIN Chuang 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期125-130,共6页
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h... Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure. 展开更多
关键词 PEER-TO-PEER (P2P) Overlay networks Scalability LIVE media Distributed HASH tables (DHT) Hierarchical clustering
下载PDF
DETERMINING POSE PARAMETERS WITHOUT PRIMITIVE-TO-PRIMITIVE CORRESPONDENCE
5
作者 曹钧 何振亚 《Journal of Electronics(China)》 1995年第2期113-123,共11页
The problem of determining the pose of an object in 3-D space is essential in many computer vision applications. In this paper, a model-based approach for solving this problem is proposed. This approach does not requi... The problem of determining the pose of an object in 3-D space is essential in many computer vision applications. In this paper, a model-based approach for solving this problem is proposed. This approach does not require the knowledge of point-to-point correspondences between 3-D points on the model and 2-D points in the observed image. The spatial location of the object is iteratively estimated and updated from the values globally defined over the model image and the observed image. 展开更多
关键词 POSE determination OBJECT localization Image processing Computer VISION
下载PDF
Applying a semantic information Petri Net modeling method to AUV systems design
6
作者 冯晓宁 王朔 +1 位作者 王卓 刘群 《Journal of Marine Science and Application》 2008年第4期273-277,共5页
This paper informally introduces colored object-oriented Petri Nets(COOPN) with the application of the AUV system.According to the characteristic of the AUV system's running environment,the object-oriented method ... This paper informally introduces colored object-oriented Petri Nets(COOPN) with the application of the AUV system.According to the characteristic of the AUV system's running environment,the object-oriented method is used in this paper not only to dispart system modules but also construct the refined running model of AUV system,then the colored Petri Net method is used to establish hierarchically detailed model in order to get the performance analyzing information of the system.After analyzing the model implementation,the errors of architecture designing and function realization can be found.If the errors can be modified on time,the experiment time in the pool can be reduced and the cost can be saved. 展开更多
关键词 水下运载体 建模语言 取代转换 语义信息
下载PDF
Virtual temporal bone
7
作者 邱明国 张绍祥 +4 位作者 刘正津 谭立文 王欲甦 邓俊辉 唐泽圣 《Journal of Medical Colleges of PLA(China)》 CAS 2002年第4期290-292,303,共4页
Objective:To provide the virtual model of the temporal bone for improving 3-dimension (3D) visualization of the inner ear. Methods: Plastination technique was used to make equidistant serial thin sections 1.0 mm in th... Objective:To provide the virtual model of the temporal bone for improving 3-dimension (3D) visualization of the inner ear. Methods: Plastination technique was used to make equidistant serial thin sections 1.0 mm in thickness. On SGI workstation, a Contours+Marching Cubes algorithm was selected to reconstruct the temporal bone and intratemporal structures in 3D, then to view the middle ear, inner ear, and intratemporal structures which imitate the scenes observed by the traditional endoscopy. Results: The virtual model of the temporal bone was successfully constructed, with all reconstructed structures being represented individually or jointly and being rotated continuously in any plane. Virtual endoscopy improved 3D visualization of the middle ear, inner ear, and intratemporal structures. Conclusion: The reconstructed model can be used for the medical students to rehearse or review the surgeries on this part and for the surgeons to develop a new approach for operation. Virtual otoscopy stands as a promising new visualization technique for elucidating the structure and relation of the middle ear, inner ear, and intratemporal structures. 展开更多
关键词 内耳 中耳 手术学 三维重建 模型
下载PDF
SEISMIC PROPAGATION SIMULATION IN COMPLEX MEDIA WITH NON-RECTANGULAR IRREGULAR-GRID FINITE-DIFFERENCE
8
作者 孙卫涛 杨慧珠 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2004年第3期299-306,共8页
This paper presents a finite-difference(FD)method with spatially non-rectangular irregular grids to simulate the elastic wave propagation.Staggered irregular grid finite difference oper- ators with a second-order time... This paper presents a finite-difference(FD)method with spatially non-rectangular irregular grids to simulate the elastic wave propagation.Staggered irregular grid finite difference oper- ators with a second-order time and spatial accuracy are used to approximate the velocity-stress elastic wave equations.This method is very simple and the cost of computing time is not much.Complicated geometries like curved thin layers,cased borehole and nonplanar interfaces may be treated with non- rectangular irregular grids in a more flexible way.Unlike the multi-grid scheme,this method requires no interpolation between the fine and coarse grids and all grids are computed at the same spatial iteration.Compared with the rectangular irregular grid FD,the spurious diffractions from'staircase' interfaces can easily be eliminated without using finer grids.Dispersion and stability conditions of the proposed method can be established in a similar form as for the rectangular irregular grid scheme.The Higdon's absorbing boundary condition is adopted to eliminate boundary reflections.Numerical simu- lations show that this method has satisfactory stability and accuracy in simulating wave propagation near rough solid-fluid interfaces.The computation costs are less than those using a regular grid and rectangular grid FD method. 展开更多
关键词 seismic propagation non-rectangular grid FINITE-DIFFERENCE
下载PDF
Indirect Watermarking
9
作者 钟计东 黄上腾 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期26-29,共4页
Watermarking system is a complex system requiring both expertise and specialized techniques with security concerns.Thus to relieve the multimedia manufacturers of the complexities of designing complicated watermarking... Watermarking system is a complex system requiring both expertise and specialized techniques with security concerns.Thus to relieve the multimedia manufacturers of the complexities of designing complicated watermarking systems, this paper presents a new watermarking model in which watermarking is provided as a kind of service by the specialized watermarking companies. In order to make this service model work, a simple permutation scheme to hide the true contents is proposed. The paper also proves the security of the scheme against the attacks from the watermarking companies. Finally, the effectiveness of the scheme is demonstrated through experiments. 展开更多
关键词 直接水印技术 排列 多媒体 信息安全
下载PDF
Super-service-oriented Architecture in Large-scale Pervasive Computing Environments
10
作者 蔡学明 贺樑 段新娥 《Journal of Donghua University(English Edition)》 EI CAS 2008年第3期269-272,共4页
This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments.The multiformity of device(or peer)services and network types in such environments is ap... This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments.The multiformity of device(or peer)services and network types in such environments is apt to result in notable service isomorphs.And moreover,as the environment cannot assure the stability of network communication and device services,the situation gets worse.Therefore,it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments.Super-Service-Oriented Architecture(SSOA)is an Serrice-Oriented Architecture(SOA)-based architecture for service management and organization in pervasive environments.With combining one kind of isomorphic services into a super service,SSOA provides better scalability and quick,convenient service invocations.Also,the complexity and instability of services,and network types are transparent,and system performance is highly promoted under the architecture. 展开更多
关键词 建筑技术 计算机技术 技术性能 环境检测
下载PDF
An Efficient Fair Electronic Cash System
11
作者 郭涛 Li Zhitang +1 位作者 Tan Yunmeng Wu Shizhong 《High Technology Letters》 EI CAS 2003年第3期1-5,共5页
In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in norm... In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in normal transactions. Authorized by the judges, the government can remove the identity of an illegal user with the help of the bank. So such misuse as blackmailing or money laundering can be prevented. Therefore, this scheme is more efficient, more suitable for adopting pre-processing and post-processing and more practical. In the paper, the details of the scheme are described, its security is proved, and its efficiency is analyzed. 展开更多
关键词 有效公平电子货币系统 电子支付 电子商务 INTERNET 交易安全
下载PDF
Deep Packet Inspection Based on Many-Core Platform
12
作者 Ya-Ru Zhan Zhao-Shun Wang 《Journal of Computer and Communications》 2015年第5期1-6,共6页
With the development of computer technology, network bandwidth and network traffic continue to increase. Considering the large data flow, it is imperative to perform inspection effectively on network packets. In order... With the development of computer technology, network bandwidth and network traffic continue to increase. Considering the large data flow, it is imperative to perform inspection effectively on network packets. In order to find a solution of deep packet inspection which can appropriate to the current network environment, this paper built a deep packet inspection system based on many-core platform, and in this way, verified the feasibility to implement a deep packet inspection system under many-core platform with both high performance and low consumption. After testing and analysis of the system performance, it has been found that the deep packet inspection based on many-core platform TILE_Gx36 [1] [2] can process network traffic of which the bandwidth reaches up to 4 Gbps. To a certain extent, the performance has improved compared to most deep packet inspection system based on X86 platform at present. 展开更多
关键词 MANY-CORE PLATFORM Deep PACKET Inspection Application LAYER PROTOCOL TILE_Gx36
下载PDF
Google Maps Security Concerns
13
作者 Aqil Burney Muhammad Asif +1 位作者 Zain Abbas Shamaila Burney 《Journal of Computer and Communications》 2018年第1期275-283,共9页
Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, ... Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place. 展开更多
关键词 Google Maps ANONYMOUS USERS CYBERCRIME SECURITY Issues SECURITY CONCERNS Spatial Information Signup Mechanism Potential Threats
下载PDF
Forensics Issues in Cloud Computing
14
作者 Aqil Burney Muhammad Asif Zain Abbas 《Journal of Computer and Communications》 2016年第10期63-69,共7页
Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical sk... Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be ad-dressed. Traditional “Computer Forensics” deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation. 展开更多
关键词 Computer Forensics Cloud Computing Cybercrimes Cloud Security Cloud Service Provider
下载PDF
Continuity of non-uniform recursive subdivision surfaces 被引量:2
15
作者 秦开怀 王华维 《Science China(Technological Sciences)》 SCIE EI CAS 2000年第5期461-472,共12页
Since Doo-Sabin and Catmull-Clark surfaces were proposed in 1978, eigenstructure, convergence and continuity analyses of stationary subdivision have been performed very well, but it has been very difficult to prove th... Since Doo-Sabin and Catmull-Clark surfaces were proposed in 1978, eigenstructure, convergence and continuity analyses of stationary subdivision have been performed very well, but it has been very difficult to prove the convergence and continuity of non-uniform recursive subdivision surfaces (NURSSes, for short) of arbitrary topology. In fact, so far a problem whether or not there exists the limit surface as well as G1 continuity of a non-uniform Catmull-Clark subdivision has not been solved yet. Here the concept of equivalent knot spacing is introduced. A new technique for eigenanaly-sis, convergence and continuity analyses of non-uniform Catmull-Clark surfaces is proposed such that the convergence and G1 continuity of NURSSes at extraordinary points are proved. In addition, slightly improved rules for NURSSes are developed. This offers us one more alternative for modeling free-form surfaces of arbitrary topologies with geometric features such as cusps, sharp edges, creases and darts, while elsewhere 展开更多
关键词 CATMULL-CLARK NON-UNIFORM RECURSIVE SUBDIVISION surface CONVERGENCE continuity.
原文传递
Polynomial-time Hierarchies on Some Classes of Functions (Ⅱ)
16
作者 张立昂 《Science China Mathematics》 SCIE 1994年第9期1135-1143,共9页
This paper continues to study these hierarchies, the probably impossible relationships within and between them, and gives some complete functions for the classes.
关键词 computational complexity POLYNOMIAL-TIME HIERARCHIES optimization PROBLEMS COUNTING PROBLEMS completeness.
原文传递
Launch of the NSFC Excellent Young Scholars Forum
17
作者 Zhi-Hua ZHOU 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第1期1-1,共1页
In 2012, the National Natural Science Foundation of China (NSFC) launched the Excellent Young Scholars (EYS) Pro- gram. As its name suggests, this program aims to recognize and support excellent young scholars in ... In 2012, the National Natural Science Foundation of China (NSFC) launched the Excellent Young Scholars (EYS) Pro- gram. As its name suggests, this program aims to recognize and support excellent young scholars in the fields of science and engineering. This program is similar to the NSF Career Award in the United States, and the competition is very tough: only a very limited number of applicants can get through. Each awardee will receive a fund of one million CNY for a three-year term.With such generous support, awardees are expected to do more excellent research and grow up quickly as distinguished young scholars. 展开更多
原文传递
Blind noisy image separation based on a new robust independent component analysis network 被引量:3
18
作者 纪建 田铮 《Chinese Optics Letters》 SCIE EI CAS CSCD 2006年第10期573-575,共3页
The separation of noisy image is a very exciting area of research, especially when no prior information is available about the noisy image. In this paper, we propose a robust independent component analysis (ICA) net... The separation of noisy image is a very exciting area of research, especially when no prior information is available about the noisy image. In this paper, we propose a robust independent component analysis (ICA) network for separation images contaminated with high-level additive noise or outliers. We reduce the power of additive noise by adding outlier rejection rule in ICA. Extensive computer simulations confirm robustness and the excellent performance of the resulting algorithms. 展开更多
关键词 ALGORITHMS Computer simulation Independent component analysis
原文传递
Physiognomy: Personality Traits Prediction by Learning 被引量:1
19
作者 Ting Zhang Ri-Zhen Qin +3 位作者 Qiu-Lei Dong Wei Gao Hua-Rong Xu Zhan-Yi Hu 《International Journal of Automation and computing》 EI CSCD 2017年第4期386-395,共10页
Evaluating individuals' personality traits and intelligence from their faces plays a crucial role in interpersonal relationship and important social events such as elections and court sentences. To assess the possibl... Evaluating individuals' personality traits and intelligence from their faces plays a crucial role in interpersonal relationship and important social events such as elections and court sentences. To assess the possible correlations between personality traits (also measured intelligence) and face images, we first construct a dataset consisting of face photographs, personality measurements, and intelligence measurements. Then, we build an end-to-end convolutional neural network for prediction of personality traits and intelligence to investigate whether self-reported personality traits and intelligence can be predicted reliably from a face image. To our knowledge, it is the first work where deep learning is applied to this problem. Experimental results show the following three points: 1) "Rule-consciousness" and "Tension" can be reliably predicted from face images. 2) It is difficult, if not impossible, to predict intelligence from face images, a finding in accord with previous studies. 3) Convolutional neural network (CNN) features outperform traditional handcrafted features in predicting traits. 展开更多
关键词 Personality traits PHYSIOGNOMY face image deep learning convolutional neural network (CNN).
原文传递
基于梯度的压缩感知图像融合(英文)
20
作者 Yang CHEN Zheng QIN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第3期227-237,共11页
目的:面向多传感器图像融合,实现基于梯度的压缩感知图像融合,使其具有传输量小,计算复杂度低的特点。创新点:提出一种基于梯度的融合规则(图1),对压缩感知系数进行融合,并对融合后的压缩感知系数进行反变换得到原图像,提高压缩感知融... 目的:面向多传感器图像融合,实现基于梯度的压缩感知图像融合,使其具有传输量小,计算复杂度低的特点。创新点:提出一种基于梯度的融合规则(图1),对压缩感知系数进行融合,并对融合后的压缩感知系数进行反变换得到原图像,提高压缩感知融合质量。方法:首先,对多传感器捕获的图像进行压缩感知分解以提高传感器传输速率。然后在融合阶段,基于压缩感知系数梯度进行融合得到融合后的压缩感知系数,并对融合后的系数进行压缩感知反变换得到融合后图像。通过两种融合场景的应用实验(图2-7,表1-6),证明所提算法相比于其他传统压缩感知图像融合方法,在人眼视觉及客观融合标准中均更优。结论:针对多种融合场景,提出一种高效的基于梯度的压缩感知的图像融合方法,提高图像融合精度。 展开更多
关键词 压缩感知 图像融合 基于梯度的图像融合 压缩感知图像融合
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部