26 results
Search Results
2. An aggressive reduction on the complexity of optimization for non-strongly convex objectives.
- Author
-
Luo, Zhijian, Chen, Siyu, Hou, Yueen, Gao, Yanzeng, and Qian, Yuntao
- Subjects
- *
REGULARIZATION parameter , *LOGISTIC regression analysis , *MACHINE learning , *LOGARITHMS , *ALGORITHMS - Abstract
Tremendous efficient optimization methods have been proposed for strongly convex objectives optimization in modern machine learning. For non-strongly convex objectives, a popular approach is to apply a reduction from non-strongly convex to a strongly convex case via regularization techniques. Reduction on objectives with adaptive decrease on regularization tightens the optimal convergence of algorithms to be independent on logarithm factor. However, the initialization of parameter of regularization has a great impact on the performance of the reduction. In this paper, we propose an aggressive reduction to reduce the complexity of optimization for non-strongly convex objectives, and our reduction eliminates the impact of the initialization of parameter on the convergent performances of algorithms. Aggressive reduction not only adaptively decreases the regularization parameter, but also modifies regularization term as the distance between current point and the approximate minimizer. Our aggressive reduction can also shave off the non-optimal logarithm term theoretically, and make the convergent performance of algorithm more compact practically. Experimental results on logistic regression and image deblurring confirm this success in practice. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Algorithm of adaptive Fourier decomposition in H2(ℂ+).
- Author
-
Mai, Weixiong and Qian, Tao
- Subjects
- *
HILBERT transform , *ALGORITHMS , *HARDY spaces , *SIGNALS & signaling - Abstract
In this paper, we propose an applicable algorithm of the so-called adaptive Fourier decomposition in H 2 (ℂ +) the Hardy H 2 space on the upper half-plane ℂ + , which provides a new method for decomposing real-valued signals and analytic signals on the real line. As a by-product, a new approach for computing the Hilbert transform on the real line is also given. Numerical experiments are used to demonstrate the performance of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Estimation of sub-endmembers using spatial-spectral approach for hyperspectral images.
- Author
-
Chetia, Gouri Shankar and Devi, Bishnulatpam Pushpa
- Subjects
- *
COMPUTATIONAL complexity , *EIGENVALUES , *ALGORITHMS - Abstract
In Blind Hyperspectral Unmixing, the accuracy of the estimated number of endmembers affects the succeeding steps of extraction of endmember signatures and acquiring their fractional abundances. The characteristics of endmember signature depend on the nature of the material on the ground and share similar characteristics for variants of the same material. In this paper, we introduce a new concept of sub-endmembers to identify similar materials that are variants of a global endmember. Identifying the sub-endmembers will provide a meaningful interpretation of the endmember variability along with increased unmixing accuracy. This paper proposes a new algorithm exploiting both the spatial and spectral information present in hyperspectral data. The hyperspectral data are segmented into homogenous regions (superpixels) based on the Simple Linear Iterative Clustering (SLIC) algorithm, and the mean spectral of each region is accounted for in finding the global endmembers. The difference of eigenvalues-based thresholding method is used to find the number of global and sub-endmembers. The method has been tested on synthetic and real hyperspectral data and has successfully estimated the number of global endmembers as well as sub-endmembers. The method is also compared with other state-of-the-art methods, and better performances are obtained at a reasonably lower computational complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. An algorithm for constructing the two-direction Armlet multiwavelet.
- Author
-
Wang, Gang and Zhou, Xiaohui
- Subjects
- *
ALGORITHMS , *WAVELET transforms , *SIGNS & symbols , *MATRICES (Mathematics) , *DEFINITIONS - Abstract
In this paper, an algorithm is discussed for constructing the two-direction Armlet multiwavelet. First, the definition of two-direction Armlet multiwavelet is presented in this paper. A two-direction multiwavelet can be changed to a special multi-wavelet. By Two-scale Similar Transform (TST), a transform can be taken on the two-scale matrix symbols of a two-direction multi-wavelets. This transform keeps the orthogonality of the two-direction multi-wavelets. However, the condition is discussed which the two-direction multi-wavelet corresponding to a two-direction multi-scaling function is an Armlet with order n. An approach is given for constructing the transform matrix. Finally, an example is given for discussing the two-direction Armlet multi-wavelet with order 2. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. An algorithm for Morlet wavelet transform based on generalized discrete Fourier transform.
- Author
-
Yi, Hua, Ouyang, Peichang, Yu, Tao, and Zhang, Tao
- Subjects
- *
DISCRETE Fourier transforms , *DISCRETE wavelet transforms , *WAVELET transforms , *SIGNAL convolution , *ALGORITHMS , *RUNNING speed - Abstract
Continuous wavelet transform (CWT) is a linear convolution of signal and wavelet function for a fixed scale. This paper studies the algorithm of CWT with Morlet wavelet as mother wavelet by using nonzero-padded linear convolution. The time domain filter, which is a non-causal filter, is the sample of wavelet function. By making generalized discrete Fourier transform (GDFT) and inverse transform for this filter, we can get a geometrically weighted periodic extension of the filter when evaluated outside its original support. From this extension of the time domain filter, we can get a causal filter. In this paper, GDFT-based algorithm for CWT, which has a more concise form than that of linear convolution proposed by Jorge Martinez, is constructed by using this causal filter. The analytic expression of the GDFT of this filter, which is essential for GDFT-based algorithm for CWT, is deduced in this paper. The numerical experiments show that the calculation results of GDFT-based algorithm are stable and reliable; the running speed of GDFT-based algorithm is faster than that of the other two algorithms studied in our previous work. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
7. Iterative gradient descent for outlier detection.
- Author
-
Zhuang Qi, Dazhi Jiang, and Xiaming Chen
- Subjects
- *
OUTLIER detection , *MATRIX inversion , *ALGORITHMS , *REGRESSION analysis , *CONVEX functions , *DATA analysis - Abstract
In linear regression, outliers have a serious effect on the estimation of regression model parameters and the prediction of final results, so outlier detection is one of the key steps in data analysis. In this paper, we use a mean shift model and then we apply the penalty function to penalize the mean shift parameters, which is conducive to get a sparse parameter vector. We choose Sorted L1 regularization (SLOPE), which provides a convex loss function, and shows good statistical properties in parameter selection. We apply an iterative process which using gradient descent method and parameter selection at each step. Our algorithm has higher computational efficiency since the calculation of inverse matrix is avoided. Finally, we use Cross-Validation rules (CV) and Bayesian Information Criterion (BIC) criteria to fine tune the parameters, which helps our program identify outliers and obtain more robust regression coefficients. Compared with other methods, the experimental results show that our program has a fantastic performance in all aspects of outlier detection. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Continuous-domain ant colony optimization algorithm based on reinforcement learning.
- Author
-
Zhang, Wenhui, Wang, Chenyu, Lin, Wenjie, and Lin, Jiming
- Subjects
- *
ANT algorithms , *ALGORITHMS , *REINFORCEMENT learning , *GEOGRAPHICAL perception - Abstract
Improved ant colony optimization (ACO) algorithms for continuous-domain optimization have been widely applied in recent years, but these improved methods have a weak perception of environmental information changes and only rely on the residues of the pheromones in the path to guide colony evolution. In this paper, we propose an ant colony algorithm based on the reinforcement learning model (RLACO). RLACO can acquire more environmental information by calculating the diversity of the ant colony, and, uses the diversity and other basic information of the ant colony to establish a reinforcement learning model. At different stages of evolution, the algorithm chooses an optimal strategy that can maximize the reward to improve the global search ability and convergence speed of the colony. The experimental results on CEC 2017 test functions show that the proposed algorithm is superior to other algorithms for continuous-domain optimization in convergence speed, accuracy and global search ability. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. The fast clustering algorithm for the big data based on K-means.
- Author
-
Xie, Ting and Zhang, Taiping
- Subjects
- *
ALGORITHMS , *DATABASES , *K-means clustering , *SINGULAR value decomposition - Abstract
As a powerful unsupervised learning technique, clustering is the fundamental task of big data analysis. However, many traditional clustering algorithms for big data that is a collection of high dimension, sparse and noise data do not perform well both in terms of computational efficiency and clustering accuracy. To alleviate these problems, this paper presents Feature K-means clustering model on the feature space of big data and introduces its fast algorithm based on Alternating Direction Multiplier Method (ADMM). We show the equivalence of the Feature K-means model in the original space and the feature space and prove the convergence of its iterative algorithm. Computationally, we compare the Feature K-means with Spherical K-means and Kernel K-means on several benchmark data sets, including artificial data and four face databases. Experiments show that the proposed approach is comparable to the state-of-the-art algorithm in big data clustering. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
10. An efficient novel color image encryption algorithm based on 3D Lü chaotic dynamical system and SHA-512.
- Author
-
Sundara Krishnan, K., Jaison, B., and Raja, S. P.
- Subjects
- *
IMAGE encryption , *ALGORITHMS , *DYNAMICAL systems , *SIGNAL-to-noise ratio , *STATISTICAL correlation , *PIXELS - Abstract
In this paper, an efficient novel dual permutation–substitution structure-based color image encryption algorithm is proposed. Initially, the Secure Hash Algorithm-512 (SHA-512) is applied to the input image to generate the initial values for the Lü system dynamically. In the first stage of permutation, inter-color-component pixel shuffling is carried out with a circular pixel-swapping mechanism. In the second stage, intra-color-component pixel shuffling is executed, based on pseudorandom positions generated by the Lü chaotic system. Pixel values are changed in the substitution stage, based on float-valued chaotic sequences generated by the Lü system. The performance of the proposed algorithm is evaluated with metrics such as key space, key sensitivity, histograms, correlation coefficients (vertical, horizontal and diagonal), information entropy, number of pixel changes rate (NPCR), unified average changing intensity (UACI), peak signal-to-noise ratio (PSNR), mean absolute error (MAE), contrast analysis, encryption time and the National Institute of Standards and Technology Special Publication 800-22 (NIST SP 800-22) statistical test. The experimental results obtained and performance assessment show that the proposed scheme has produced good results. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. Wavelet transform on regression trend curve and its application in financial data.
- Author
-
Zhou, Xiaohui
- Subjects
- *
ALGORITHMS , *CURVES , *WAVELET transforms , *DISCRETE wavelet transforms - Abstract
In this paper, wavelet transform on a regression curve is investigated by using length-preserving projection and its application in financial data is also discussed. First, properties of wavelet filters on the regression trend curves are studied and two-scale equation of wavelet function is deduced on the regression trend curves. Second, the decomposition and reconstruction algorithm of discrete wavelet transform on regression trend curves is derived. Finally, two examples in financial data are given for discussion, based on decomposition and reconstruction algorithms on regression trend curves. Some new research interpretations are presented in dealing with financial data such as "volatility on regression growth trend", "error on regression growth trend", and so on. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. Optimization of makespan and resource utilization in the fog computing environment through task scheduling algorithm.
- Author
-
Vijayalakshmi, R., Vasudevan, V., Kadry, Seifedine, and Lakshmana Kumar, R.
- Subjects
- *
RESOURCE allocation , *PRODUCTION scheduling , *ALGORITHMS , *INTERNET of things , *CLOUD computing , *RESOURCE dependence theory - Abstract
The Fog computing is rising as a dominant and modern computing model to deliver Internet of Things (IoT) computations, which is an addition to the cloud computing standard to get it probable to perform the IoT requests in the network of edge. In those above independent and dispersed environment, resource allocation is vital. Therefore, scheduling will be a test to enhance potency and allot resources properly to the tasks. This paper offers a distinct task scheduling algorithm in the fog computing environment that tries to depreciate the makespan and maximize resource utilization. This algorithm catalogues the task based on the mean Suffrage value. The suggested algorithm gives much resource utilization and diminishes makespan. Our offered algorithm is compared with different alive scheduling for performance investigation, and test results confirm that our algorithm has a more significant resource utilization rate and low makespan than other familiar algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Nonnegative matrix factorization with manifold structure for face recognition.
- Author
-
Chen, Wen-Sheng, Wang, Qian, Pan, Binbin, and Chen, Bo
- Subjects
- *
NONNEGATIVE matrices , *MATRIX decomposition , *HUMAN facial recognition software , *FACIAL expression , *ALGORITHMS - Abstract
Nonnegative matrix factorization (NMF) is a promising method to represent facial images using nonnegative features under a low-rank nonnegative basis-image matrix. The facial images usually reside on a low-dimensional manifold due to the variations of illumination, pose and facial expression. However, NMF has no ability to uncover the manifold structure of data embedded in a high-dimensional Euclidean space, while the manifold structure contains both local and nonlocal intrinsic features. These two kinds of features are of benefit to class discrimination. To enhance the discriminative power of NMF, this paper proposes a novel NMF algorithm with manifold structure (Mani-NMF). Two quantities related to adjacent graph and non-adjacent graph are incorporated into the objective function, which will be minimized by solving two convex suboptimization problems. Based on the gradient descent method and auxiliary function technique, we acquire the update rules of Mani-NMF and theoretically prove the convergence of the proposed Mani-NMF algorithm. Three publicly available face databases, Yale, pain expression and CMU databases, are selected for evaluations. Experiments results show that our algorithm achieves a better performance than some state-of-the-art algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. Infrared and visible image fusion with convolutional neural networks.
- Author
-
Liu, Yu, Chen, Xun, Cheng, Juan, Peng, Hu, and Wang, Zengfu
- Subjects
- *
INFRARED imaging , *IMAGE fusion , *INFRARED technology , *IMAGE quality analysis , *ALGORITHMS - Abstract
The fusion of infrared and visible images of the same scene aims to generate a composite image which can provide a more comprehensive description of the scene. In this paper, we propose an infrared and visible image fusion method based on convolutional neural networks (CNNs). In particular, a siamese convolutional network is applied to obtain a weight map which integrates the pixel activity information from two source images. This CNN-based approach can deal with two vital issues in image fusion as a whole, namely, activity level measurement and weight assignment. Considering the different imaging modalities of infrared and visible images, the merging procedure is conducted in a multi-scale manner via image pyramids and a local similarity-based strategy is adopted to adaptively adjust the fusion mode for the decomposed coefficients. Experimental results demonstrate that the proposed method can achieve state-of-the-art results in terms of both visual quality and objective assessment. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
15. Non-convex clustering via proximal alternating linearized minimization method.
- Author
-
Xie, Ting and Chen, Feiyu
- Subjects
- *
K-means clustering , *ALGORITHMS , *MATHEMATICAL optimization , *ACCURACY , *DATABASES - Abstract
Clustering is a fundamental learning task in a wide range of research fields. The most popular clustering algorithm is arguably the K-means algorithm, it is well known that the performance of K-means algorithm heavily depends on initialization due to its strong non-convexity nature. To overcome the initialization issue, in this paper, we first relax the K-means model as an optimization problem with non-convex constraints, then employ the Proximal Alternating Linearized Minimization (PALM) method to solve the relaxed non-convex optimization model. The convergence analysis of PALM algorithm for the clustering problem is also provided. Experimental results on several benchmark datasets are conducted to evaluate the efficiency of our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
16. Robust video-based face recognition via M-estimator and image set collaborative representation.
- Author
-
Deng, Lei, Shi, Jing, and Wang, Yulong
- Subjects
- *
IMAGE processing , *ALGORITHMS , *MATHEMATICAL optimization , *DATABASES , *BIOMETRIC identification - Abstract
This paper presents a novel method for video-based face recognition (VFR) based on M-estimator and image set collaborative representation. Since a video is essentially an image set, the VFR problem can be cast as a special case of the image set-based face recognition (FR) problem. To measure the distance between the query image set and the gallery image set, we develop an M-estimator-based image set collaborative representation (MISCR) model. To implement MISCR, we devise an efficient half-quadratic-based optimization algorithm to tackle the complicated optimization problem. We also establish the convergence property of the devised algorithm. Our other contribution is to propose an MISCR-based classifier for the general image set classification problem, including VFR as a special case. The experiments using real-world benchmark databases demonstrate the efficacy and robustness of the proposed method for VFR. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. Cross-device hand vein recognition based on improved SIFT.
- Author
-
Wang, Yiding and Zheng, Xuan
- Subjects
- *
ALGORITHMS , *DATABASES , *LIGHT emitting diodes , *IMAGE processing , *ELECTRONIC information resources - Abstract
The recognition rate of SIFT algorithm in single hand vein database has been as high as 99.5%. But with the development of Internet-plus technology, the demand for distributed systems becomes more and more significant. However, the problem of picture quality caused by cross-device makes the intraclass variations larger. For example, when gathering the dorsal hand vein images, subtle changes in relative distance and orientation among the imaging camera, the illumination LED arrays and the different location of users' hand, as well as shielding by the external housing box from ambient light sources and so on, these will make large difference to one person's hand images. So, including the contrast, the lightness, the shifting, the angle of rotation, the size and so on, these differences make it possible to use some traditional methods to recognize dorsal hand vein with a low recognition rate of less than 50%. Therefore, based on the traditional SIFT, this paper optimized the scale factor , extreme searching neighborhood structure and matching threshold . It can be seen that the cross-device hand vein feature is more robust, and the recognition rate reached an average of 88.5%. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
18. A semantic tree method for image classification and video action recognition.
- Author
-
Liu, Chongwen, Shang, Zhaowei, Lin, Bo, and Tang, Yuan Yan
- Subjects
- *
IMAGE processing , *INFORMATION processing , *ALGORITHMS , *LEARNING , *TASK performance - Abstract
The multi-task learning (MTL) methods consider learning a problem together with other related problems simultaneously. The major challenge of MTL is how to selectively screen the shared information. The information of each task must be related to the others, but when sharing information between two unrelated tasks it degenerates the performance of both tasks. To ensure the related problems are related to the main task is the most important point in MTL. In this paper, we will design a novel algorithm to calculate the degrees of relationship among tasks by using a semantical space of features in each task and then build semantical tree to achieve better learning performance. We propose an MTL method under this algorithm which achieves good experimental performance. Our experiments are taken on both image classification and video action recognition, compared with the state-of-the-art MTL methods. Our method proposes good performance in the four public datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
19. Necessary condition and sufficient conditions for nonuniform wavelet frames in.
- Author
-
Younus Bhat, M.
- Subjects
- *
WAVELETS (Mathematics) , *INTEGERS , *SPECTRAL theory , *DISCRETE systems , *ALGORITHMS , *FOURIER transforms - Abstract
A constructive algorithm based on the theory of spectral pairs for constructing nonuniform wavelet basis in was considered by Gabardo and Nashed [Nonuniform multiresolution analysis and spectral pairs, J. Funct. Anal. 158 (1998) 209-241]. In this setting, the associated translation set is a spectrum which is not necessarily a group nor a uniform discrete set, given where (an integer) and is an odd integer with such that and are relatively prime and is the set of all integers. The objective of this paper is to construct nonuniform wavelet frame on local fields. A necessary condition and four sufficient conditions for nonuniform wavelet frame on local fields are given. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
20. Probability comprehension of differential privacy for privacy protection algorithms: A new measure.
- Author
-
Nie, Weilin and Wang, Cheng
- Subjects
- *
PROBABILITY theory , *DIFFERENTIAL equations , *ALGORITHMS , *MATHEMATICAL analysis , *MATHEMATICAL bounds - Abstract
Differential privacy becomes a standard for evaluating the privacy protection performance for an algorithm these years. However, the definition of differential privacy seems not so easy to understand as the classical k-anonymity and etc. In this paper, we propose a new measure which is more comprehensible. Some properties of such measure are investigated and the relationship between our new definition and differential privacy is studied. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
21. Differential privacy preserving clustering using Daubechies-2 wavelet transform.
- Author
-
Dishabi, Mohammad Reza Ebrahimi and Azgomi, Mohammad Abdollahi
- Subjects
- *
WAVELET transforms , *ALGORITHMS , *CLUSTER analysis (Statistics) , *DIMENSION reduction (Statistics) , *UTILITY functions , *HEURISTIC programming - Abstract
Most of the existing privacy preserving clustering (PPC) algorithms do not consider the worst case privacy guarantees and are based on heuristic notions. In addition, these algorithms do not run efficiently in the case of high dimensionality of data. In this paper, to alleviate these challenges, we propose a new PPC algorithm, which is based on Daubechies-2 wavelet transform (D2WT) and preserves the differential privacy notion. Differential privacy is the strong notion of privacy, which provides the worst case privacy guarantees. On the other hand, most of the existing differential-based PPC algorithms generate data with poor utility. If we apply differential privacy properties over the original raw data, the resulting data will offer lower quality of clustering (QOC) during the clustering analysis. Therefore, we use D2WT for the preprocessing of the original data before adding noise to the data. By applying D2WT to the original data, the resulting data not only contains lower dimension compared to the original data, but also can provide differential privacy guarantee with high QOC due to less noise addition. The proposed algorithm has been implemented and experimented over some well-known datasets. We also compare the proposed algorithm with some recently introduced algorithms based on utility and privacy degrees. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
22. Convergence rate of semi-supervised gradient learning algorithms.
- Author
-
Sheng, Baohuai, Xiang, Daohong, and Ye, Peixin
- Subjects
- *
STOCHASTIC convergence , *SUPERVISED learning , *ALGORITHMS , *SMOOTHNESS of functions , *LEARNING ability , *MATHEMATICAL regularization - Abstract
Semi-supervised learning deals with learning with a small amount labeled sample and a large amount of unlabeled sample to improve the learning ability. The purpose of the semi-supervised gradient learning is to increase the smoothness of the solution using unlabeled gradient data. In this paper, we study the semi-supervised kernel-based regularization scheme involving function gradient value. We show that the learning rate can be bounded by a K-functional with gradients of the function, which verify how the unlabeled gradient data quantitatively influences the learning rate. Some approaches from convex analysis play a key role in our error analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
23. Vector-valued nonuniform multiresolution analysis on local fields.
- Author
-
Shah, Firdous Ahmad and Bhat, M. Younus
- Subjects
- *
VECTOR analysis , *DISCRETE systems , *WAVELETS (Mathematics) , *ALGORITHMS , *FOURIER transforms , *INTEGERS - Abstract
A multiresolution analysis (MRA) on local fields of positive characteristic was defined by Shah and Abdullah for which the translation set is a discrete set which is not a group. In this paper, we continue the study based on this nonstandard setting and introduce vector-valued nonuniform multiresolution analysis (VNUMRA) where the associated subspace V0 of L2(K, ℂM) has an orthonormal basis of the form {Φ (x - λ)}λ∈Λ where Λ = {0, r/N} + 풵, N ≥ 1 is an integer and r is an odd integer such that r and N are relatively prime and 풵 = {u(n) : n ∈ ℕ0}. We establish a necessary and sufficient condition for the existence of associated wavelets and derive an algorithm for the construction of VNUMRA on local fields starting from a vector refinement mask G(ξ) with appropriate conditions. Further, these results also hold for Cantor and Vilenkin groups. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
24. Biologically inspired small infrared target detection using local contrast mechanisms.
- Author
-
Xia, Tian and Tang, Yuan Yan
- Subjects
- *
INFRARED imaging , *CONTRAST sensitivity (Vision) , *LAPLACIAN matrices , *GAUSSIAN processes , *ALGORITHMS , *SIGNAL detection - Abstract
In order to obtain higher small target detection accuracy, this paper presents an effective algorithm inspired by the local contrast mechanism. The proposed method can enhance target signal and suppress background clutter simultaneously. In the first stage, a enhanced image is obtained using the proposed Weighted Laplacian of Gaussian. In the second stage, an adaptive threshold is adopted to segment the target. Experimental results on two challenging image sequences show that the proposed method can detect the bright and dark targets simultaneously, and is not sensitive to sea-sky line of the infrared (IR) image. So it is fit for small IR target detection. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
25. A parameterless scale-space approach to find meaningful modes in histograms - Application to image and spectrum segmentation.
- Author
-
Gilles, Jérôme and Heal, Kathryn
- Subjects
- *
HISTOGRAMS , *MATHEMATICAL statistics , *ALGORITHMS , *ALGEBRA , *MATHEMATICAL programming - Abstract
In this paper, we present an algorithm to automatically detect meaningful modes in a histogram. The proposed method is based on the behavior of local minima in a scale-space representation. We show that the detection of such meaningful modes is equivalent in a two classes clustering problem on the length of minima scale-space curves. The algorithm is easy to implement, fast and does not require any parameter. We present several results on histogram and spectrum segmentation, grayscale image segmentation and color image reduction. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
26. Rapid dehazing algorithm based on large-scale median filtering for high-resolution visible near-infrared remote sensing images.
- Author
-
Hu, Changmiao and Tang, Ping
- Subjects
- *
NEAR infrared radiation , *ALGORITHMS , *MEDIAN filters (Electronics) , *HIGH resolution imaging , *REMOTE sensing - Abstract
In recent years, China's demand for satellite remote sensing images increased. Thus, the country launched a series of satellites equipped with high-resolution sensors. The resolutions of these satellites range from 30 m to a few meters, and the spectral range covers the visible to the near-infrared band. These satellite images are mainly used for environmental monitoring, mapping, land surface classification and other fields. However, haze is an important factor that often affects image quality. Thus, dehazing technology is becoming a critical step in high-resolution remote sensing image processing. This paper presents a rapid algorithm for dehazing based on a semi-physical haze model. Large-scale median filtering technique is used to extract large areas of bright, low-frequency information from images to estimate the distribution and thickness of the haze. Four images from different satellites are used for experiment. Results show that the algorithm is valid, fast, and suitable for the rapid dehazing of numerous large-sized high-resolution remote sensing images in engineering applications. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.