首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   3篇
无线电   5篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2001年   2篇
排序方式: 共有5条查询结果,搜索用时 268 毫秒
1
1.
三维荧光显微镜图像的调整线性最小均方恢复算法研究   总被引:3,自引:0,他引:3  
荧光显微镜已在生物和医学的放多领域被广泛应用,人们对它所重建的三维图像的精度不断提出更高的要求,数字图像恢复的方法也被广泛应用于提高图像的清晰度。本文简要介绍了由C.Preza提出的调整的线性最小均方图像恢复算法的基本原理,并给出算法实现的流程图和初步的实验结果。  相似文献   
2.
三维反卷积显微成像技术   总被引:2,自引:0,他引:2  
三维宽场反卷积显微成像技术是应用光学切片方法获取三维标本的二维图像序列,然后通过反卷积图像处理方法进行图像恢复,进而进行三维重建的一种以光学技术和图像处理技术为核心的显微成像方法。本文讲述了光学切片的基本原理,给出了反卷积处理中点扩展函数的理论模型和实验测试方法,然后对现存的反卷积算法做了对比。最后,还对这一领域的发展趋势做了预测。  相似文献   
3.
李晓旭  李睿凡  冯方向  曹洁  王小捷 《电子学报》2014,42(10):2040-2044
本文主要关注多视图数据的分类问题.考虑到集成分类方法可组合多个弱分类器构成一个强分类器,以及主题模型能学习复杂数据的语义表示,本文试图将集成学习思想引入主题模型中,以便同时学习多视图数据的分类规则和预测性语义特征.具体地,结合概率主题模型LDA模型和集成分类方法Softmax混合模型,提出了一个多视图有监督的分类模型.基于变分EM方法,推导了该模型的参数估计算法.两个真实图像数据集上的实验结果表明了提出模型有较好的分类性能.  相似文献   
4.
A novel deterministic joint remote preparation scheme of arbitrary four-particle genuine entangled state from one sender to either of two receivers is proposed. Two three-particle Green-Horne-Zeilinger (GHZ) states and one four-particle GHZ state are used as the quantum channel. The presented scheme is realized through orthogonal projective measurement of the Hadamard transferred basis and recovery operation ijk U . Some useful and general measurement bases have been constructed. The classical communication cost of the presented scheme is also calculated. Our analysis confirms the feasibility and validity of the proposed method, and shows that it has a 100% probability of success in preparation of the target quantum state.  相似文献   
5.
In order to improve the recognition accuracy of keystroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the user's keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, the experimental result shows that the detector in this paper is more accurate than the other three.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号