首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
JPEG2000中不同小波基的图像压缩性能分析   总被引:6,自引:0,他引:6  
主要讨论了用JPEG2000标准进行静态图像压缩时,小波基的选择对图像压缩性能的影响.我们根据JPEG2000标准,比较了各类图像在不同小波基下的压缩结果,发现在JPEG2000中,小波基的选择在一定程度上影响了图像的压缩性能.对于某些图像,JPEG2000标准的缺省小波基并不能取得较优的压缩结果.文中分析了影响图像压缩性能的小波基与图像的特性,在此基础上,给出JPEG2000进行图像压缩时小波基的选择方法.  相似文献   

2.
JPEG2000压缩算法研究   总被引:4,自引:4,他引:0  
由于JPEG2000采用零树编码方式实现压缩,编码过程中零树的形成个数与压缩效率CE密切相关;对小波滤波器及JPEG2000零树熵编码进行研究,发现高的小波变换层数和5/3滤波器的使用有利于增加零树个数,从而提高压缩率;实现基于拼接块小波变换的JPEG2000压缩算法,结果显示图像分成拼接块会影响编码效率和解码保真度;对JPEG和JPEG2000进行比较,得出在超低码率下,JPEG2000解码图像虽然没有采用JPEG时出现的“方块”效应,但有“飞萤”效应。  相似文献   

3.
基于零树小波与分形图像的编码算法结合研究   总被引:1,自引:0,他引:1  
张剑 《计算机工程》2004,30(19):35-37
通过有机结合零树小波编码、分形图像编码,提出了一种基于零树小波和分形图像的小波图像压缩算法,讨论了基于零树小波图像压缩的编码算法机理,提高了算术编码的性能,并对JPEG2000与JPEG效果图像的测试实验结果进行了比较,实验结果表明,JPEG2000的压缩效果优于目前已有的小波图像压缩算法。  相似文献   

4.
黎红 《福建电脑》2007,(8):174-175
对Delphi实现基于小波变换的JPEG2000压缩进行了研究.从Delphi的一般应用方法入手,给出了实现基于小波变换的JPEG2000压缩方法,对小波变换的理论进行了详细的阐述,对实现过程中的技巧给予了详细的论述.  相似文献   

5.
图象数据压缩是当前研究的热点之一.本文针对现在流行的JPEG 2000标准和提升小波算法进行分析.首先介绍了第一代和第二代小波变换以及整数小波变换,并就JPEG 2000对两种小波压缩方法实验效果和效率进行比较,从实验结果可知,Daubechies 9/7小波压缩效果最好.  相似文献   

6.
提出了一种基于零树小波和分形图像的小波图像压缩算法,讨论了基于零树小波图像压缩的编码算法机理及JPEG2000静态图像压缩算法,对JPEG2000与JPEG效果图像的测试实验结果进行了比较。  相似文献   

7.
介绍了JPEG2000的主要特点和基本架构,以及JPEG2000编码器的两个重要部分:小波变换和熵编码.简明分析了小波变换DWT与离散余弦变换DCT的区别和小渡变换的优点.详细介绍了JPEG2000的核心编码算法EBCOT.着重介绍了JPEG2000在图像低比特率情况下的应用,并进行了实际应用的实验:在图像压缩比很高时,JPEG2000与JPEG的压缩效果对比图.  相似文献   

8.
针对静态医学图像压缩,介绍了两种压缩标准JPEG与JPEG2000,通过对它们的比较,突出JPEG2000的优势,诠释了JPEG2000的基本结构与编码、解码技术,描述了基于DSP的图像压缩设计方案。系统采用CCD采集数字图像,用16位定点DSP进行小波压缩,主要为了减小传输费用,试验结果表明JPEG2000对图像重现与压缩比率效果较优。  相似文献   

9.
通过研究SPIHT和EBCOT(JPEG2000核心算法)编码算法,分析它们所用的小波系数的不同性质,本文提出了把SPIHT算法用到的小波系数父子关系特性也用在EBCOT编码中的思想,并提出一种上下文关系的改进方法。在JPEG2000框架下对改进算法进行了仿真实验。理论分析和实验结果显示,改进的上下文关系优于JPEG2000中采用的上下文关系。  相似文献   

10.
JPEG2000的Le Gall(5,3)有损压缩重构优化   总被引:1,自引:0,他引:1  
JPEG2000定义了一种标准的可逆的整数提升小波:Le Gall(5,3)小波.对JPEG2000进行了研究,介绍了一种方法,在使用Le Gall(5,3)小波进行有损压缩时,可以求得一个在解压缩时使用的参数,使用该参数可以在保持压缩比完全不变的情况下,保留更多的图像细节.  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号