首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Two binary encoding schemes which lead to bandwidth and power saving are proposed. The binary source is encoded into digrams, which then undergo certain restrictions prior to transmission. Resultant ambiguity at the decoder is avoided by predictive feedback at the encoder. The specific examples proposed belong to a wide class of such adaptive encoding schemes.  相似文献   

2.
This paper presents a new target recognition scheme via adaptive Gaussian representation, which uses adaptive joint time-frequency processing techniques. The feature extraction stage of the proposed scheme utilizes the geometrical moments of the adaptivity spectrogram. For this purpose, we have derived exact and closed form expressions of geometrical moments of the adaptive spectrogram in the time, frequency, and joint time-frequency domains. Features obtained by this method can provide substantial savings of computational resources, preserving as much essential information for classifying targets as possible. Next, a principal component analysis is used to further reduce the dimension of feature space, and the resulting feature vectors are passed to the classifier stage based on the multilayer perceptron neural network. To demonstrate the performance of the proposed scheme, various thin-wire targets are identified. The results show that the proposed technique has a significant potential for use in target recognition  相似文献   

3.
Efficient fine granularity scalability using adaptive leaky factor   总被引:1,自引:0,他引:1  
Fine Granularity Scalability (FGS) video coding has been adopted by the MPEG-4 standard for video streaming applications. In this paper, we propose a novel FGS coding scheme, which applied adaptive leaky factors for the enhancement layer prediction to further improve the coding efficiency of FGS. A flexible method that can dynamically determine the leaky factors according to the network conditions is also presented. With the proposed method, a better trade-off between the coding efficiency and drifting reduction can be achieved, and the coding performance is further improved compared with using a fixed leaky factor. Experimental results show that the proposed method can further improve the coding efficiency over a wide range of bitrate and packet loss ratio, and still keep the original characteristics, such as fine granularity, and bandwidth adaptation.  相似文献   

4.
Scalable adaptive hierarchical clustering   总被引:1,自引:0,他引:1  
We propose a new application-level clustering algorithm capable of building an overlay spanning tree among participants of large multicast sessions, without any specific help from the network routers. The algorithm and associated protocol are shown to exhibit scalable properties  相似文献   

5.
The explosive growth of the Web requires servers to be extensible and configurable. This article describes our adaptive Web server, OpenWebServer, which uses the Reflection architectural pattern. The server supports the dynamic adoption of functionality, such as introducing additional protocols, modifying execution policies, and tuning system performance. This is achieved by specifying and coordinating metaobjects that represent various aspects within the Web server. We present a Java version of OpenWebServer, and describe its design using Reflection and other design patterns: Singleton, Bridge, Mediator, Observer, and Decorator. These patterns provide a better-factored design and allow the Web server to evolve continually beyond static and monolithic servers  相似文献   

6.
Efficient web content delivery using proxy caching techniques   总被引:4,自引:0,他引:4  
Web caching technology has been widely used to improve the performance of the Web infrastructure and reduce user-perceived network latencies. Proxy caching is a major Web caching technique that attempts to serve user Web requests from one or a network of proxies located between the end user and Web servers hosting the original copies of the requested objects. This paper surveys the main technical aspects of proxy caching and discusses recent developments in proxy caching research including caching the "uncacheable" and multimedia streaming objects, and various adaptive and integrated caching approaches.  相似文献   

7.
Object detection and tracking is a fundamental, challenging task in computer vision because of the difficulties in tracking. Continuous deformation of objects during movement and background clutter leads to poor tracking. In this paper, a method of multiple moving object detection and tracking by combining background subtraction and K-means clustering is proposed. The proposed method can handle objects occlusion, shadows and camera jitter. Background subtraction filters irrelevant information, and K-means clustering is employed to select the moving object from the remaining information, and it is capable of handling merging and splitting of moving objects using spatial information. Experimental results show that the proposed method is robust when compared to other techniques.  相似文献   

8.
Scalable Web server clustering technologies   总被引:3,自引:0,他引:3  
The exponential growth of the Internet, coupled with the increasing popularity of dynamically generated content on the World Wide Web, has created the need for more and faster Web servers capable of serving the over 100 million Internet users. Server clustering has emerged as a promising technique to build scalable Web servers. We examine the seminal work, early products, and a sample of contemporary commercial offerings in the field of transparent Web server clustering. We broadly classify transparent server clustering into three categories  相似文献   

9.
Efficient adaptive linear predictor   总被引:2,自引:0,他引:2  
Martinelli  G. 《Electronics letters》1982,18(14):617-618
Linear predictors with the capability of exactly updating their internal parameters in correspondence to each time step have been recently introduced. It is shown in the present letter that their computational cost can be noticeably reduced by suitable simplifications without impairing their performance.  相似文献   

10.
An adaptive clustering algorithm for image segmentation   总被引:12,自引:0,他引:12  
The problem of segmenting images of objects with smooth surfaces is considered. The algorithm that is presented is a generalization of the K-means clustering algorithm to include spatial constraints and to account for local intensity variations in the image. Spatial constraints are included by the use of a Gibbs random field model. Local intensity variations are accounted for in an iterative procedure involving averaging over a sliding window whose size decreases as the algorithm progresses. Results with an 8-neighbor Gibbs random field model applied to pictures of industrial objects, buildings, aerial photographs, optical characters, and faces show that the algorithm performs better than the K-means algorithm and its nonadaptive extensions that incorporate spatial constraints by the use of Gibbs random fields. A hierarchical implementation is also presented that results in better performance and faster speed of execution. The segmented images are caricatures of the originals which preserve the most significant features, while removing unimportant details. They can be used in image recognition and as crude representations of the image  相似文献   

11.
在图像处理领域,基于稀疏表示理论的图像超分辨力算法、高低分辨力字典与稀疏编码之间的映射关系是其中的2个关键环节。由于丰富多样的图像类型,单一字典并不能很好地表示图像。而在稀疏编码之间的映射关系上,严格相等的约束关系也限制了图像重建的效果。针对上述两个方面,采用包容性更强的多个字典与约束条件更为宽松的全耦合稀疏关系进行图像的超分辨力重建。在图像非局部自相似性的基础上,进行多次自适应聚类;挑选出最优的聚类,通过全耦合稀疏学习的图像超分辨力算法,得到多个字典;最后,对输入的低分辨力图像进行分类重建,得到高分辨力图片。实验结果表明,在图像Leaves,Barbara,Room上,本文的聚类算法比原全耦合稀疏学习算法在峰值信噪比(PSNR)上分别提升了0.51 dB,0.21 dB,0.15 dB。  相似文献   

12.
《现代电子技术》2016,(1):148-152
考虑到传统Web文档聚类算法聚类效果差、速度慢等问题,针对Web文档聚类算法进行深入研究,使用目标优化策略将Web文档聚类认为是最佳划归文档集合的范畴,并通过引入优化算法进行聚类划分。针对使用SVD表示的Web文档向量存在高维稀疏性等问题,使用LDA对Web文档簇的潜在语义子空间进行重构,从而降低Web文档向量空间的维数,最后在低维空间使用遗传算法进行寻优。常规的GA算法通常存在算法早熟以及局部寻优能力弱等问题。故提出一种改进型GA算法,通过引入自适应对偶种群、自适应终止规则以及新的生成子代规则来保证种群在迭代过程中的多样性以解决算法早熟问题,并且要提高算法的搜索效率以提高算法对局部寻优的能力。最后通过实验验证提出的基于改进型GA算法的Web文档聚类算法的聚类有效性。  相似文献   

13.
Two techniques for efficient computation of filters that support time-varying coefficients are developed. These methods are forms of distributed arithmetic that encode the data, rather than the filter coefficients. The first approach efficiently computes scalar-vector products, with which a digital filter is easily implemented in a transpose-form structure. This method, based on digital coding, supports time-varying coefficients with no additional overhead. Alternatively, distributed-arithmetic schemes that encode the data stream in sliding blocks support efficient direct-form filter computation with time-varying coefficients. A combination of both of these techniques greatly reduces the computation required to implement LMS adaptive filters  相似文献   

14.
Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean‐slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP‐based Internet. Hence, the transition from contemporary IP‐based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in‐network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC‐based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured.  相似文献   

15.
Das  M. 《Electronics letters》1997,33(15):1302-1304
An efficient, lossless, predictive image compression scheme is introduced, based on suboptimal, adaptive multiplicative autoregressive models. The results of a comparative experimental study indicate that the proposed scheme achieves better compression than other predictive/interpolative lossless image coding techniques considered  相似文献   

16.
A radar cross section (RCS) interpolation technique in both frequency and aspect is proposed for the efficient prediction of radar signatures from computational electromagnetics data. Our approach is based on a multiple-arrival model for the induced current on the target. The model parameters are determined by an adaptive feature extraction (AFE) algorithm, which uses an iterative search-and-extract procedure to find the individual model features. Random frequency and aspect sampling is used to circumvent the ambiguity in selecting the features. Numerical examples are presented to test the interpolation algorithm. It is found that sufficient accuracy in the predicted radar features can be achieved even when the original computed data is sampled at 5:1 below the Nyquist criterion in either frequency or aspect. The algorithm is also applied to efficiently predict the radar images of the benchmark VFY218 airplane at UHF band with good results  相似文献   

17.
Two efficient adaptive algorithmic families are developed for multichannel combiners characterized by unequal memory lengths for each input channel. The prewindowed, the covariance, and the sliding window case are addressed. The difference between the proposed methods lies in the way the Kalman gain vector is order-updated in each case. The first algorithm operates on both inputs simultaneously and thus utilizes block multichannel structured order recursions. The resulting scheme is called the diagonal-update algorithm. The second approach updates the Kalman gain in a two-step procedure by first reducing the size of one input and then the other input. The resulting method is called stairwise-update algorithm. Both algorithms are applicable to adaptive ARX (autoregressive exogenous) system identification, to adaptive control, and to the design of decision-feedback equalizers. Simulations are included  相似文献   

18.
为了避免能量较少节点当选为群首而过早死亡,对Leach协议群首的选取进行改进。采用结合节点剩余能量重新设置阈值的方法,选取剩余能量较多的节点作为群首,解决了能量较少节点当选为群首和群首负担载过重的问题。仿真结果表明,采用改进后的算法可以有效减少网络能量的消耗,延长网络生存时间。  相似文献   

19.
一种自适应遗传算法的聚类分析及应用   总被引:1,自引:0,他引:1  
舒祥波 《信息技术》2011,35(4):190-192,196
针对传统的聚类算法在聚类划分问题上还存在着划分效果能力较差等问题,在确保GA算法全局性能和收敛速度的前提下,设计了一种与进化代数相关联的交叉概率和与个体适应度相关联的变异概率。将该算法应用到图像聚类,实验仿真结果表明,对比于k均值聚类算法,该算法具有较好的聚类划分效果。  相似文献   

20.
Lord  R.T. Inggs  M.R. 《Electronics letters》1999,35(8):629-630
Radio frequency interference (RFI) suppression in SAR images often requires a great amount of computation. The authors describe how significant computational savings can be achieved by integrating the RFI suppression stage, implemented with a least-mean-squared (LMS) adaptive filter, with the range compression stage of the range/Doppler SAR processing algorithm  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号