首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14篇
  国内免费   1篇
  完全免费   6篇
  综合类   21篇
  2019年   3篇
  2018年   6篇
  2017年   4篇
  2015年   2篇
  2013年   1篇
  2011年   1篇
  2010年   2篇
  2009年   1篇
  2008年   1篇
排序方式: 共有21条查询结果,搜索用时 281 毫秒
1.
一种新的基于图论的图像分割算法   总被引:2,自引:1,他引:1       下载免费PDF全文
传统的基于图论的图像分割方法计算复杂度大,对图像亮度变化比较敏感,且分割效果有待提高.针对传统算法的不足,提出一种新的基于人眼视觉特征的图像阈值分割算法.该算法基于图论和归一化划分准则,并把对数图像处理模型(LIP模型)应用到图像处理中.同时,该算法综合考虑像素的灰度信息和空间位置信息,具有全局性,使分割目标比现有方法更为准确,且时间复杂度适中.实验结果表明,该算法不仅有效地分割出目标来,而且在图像亮度小幅度变化时,效果稳定可靠.  相似文献
2.
空间内插是地理信息系统数据处理的常用方法之一。常用的空间插值方法存在难于客观地确定插值函数结构和参数的问题。基因表达式编程(GEP)是一种新型的遗传算法,具有极强的函数发现能力和很高的效率,并且在函数发现时不需要任何先验知识。将基因表达式编程技术应用到空间插值方法中,提出了移动拟合GEP算法(MF-GEP),无需预存函数模型的类型,避免了选择空间内插算法的盲目性。实验表明,新方法是有效、可行的,利用GEP算法能够自动准确地根据数据集找出变量间隐含的复杂函数关系,建立模型,具有广泛的应用前景。  相似文献
3.
本文介绍了基于H.264的,在linux系统下的视频监控系统,给出总体设计框图,重点阐述了在linux操作系统下,视频监控前端的硬件设计,监控终端的多线程操作。介绍了最新的视频压缩方法H.264/AVC,在IP网络平台上的运行表明,该系统能在带宽有限的情况下能够保证流畅清晰的图像。  相似文献
4.
Aiming at the high energy consumption of the heterogeneous multi-core system on the chip, an efficient two-level optimization algorithm for frame task assignment is proposed. The algorithm defines the problem of minimizing system energy consumption as a nonlinear integer programming problem. The first-level optimization is used to relax and solve the problem. The second-level optimization uses the rounding function with the decision threshold to update the assignment matrix, and then constructs a new planning problem and solves it. Finally, combining the two-level optimization results to formulate the final assignment matrix. Simulation shows that compared with some heuristic algorithms, the energy consumption of the algorithm is reduced by 20%50%, which is close to the theoretical optimal energy consumption. Compared with other optimization algorithms with similar energy consumption, the complete time is reduced by 54%75%.  相似文献
5.
For the sake of enabling the device-to-device (D2D) communication to impartially and effectively select the relay node, a prestige-based relay selection algorithm is proposed. From a social domain perspective,the prestige is used to describe the will and ability of an equipment to be selected as a relay. Meanwhile the data transmission of the equipment in different transmission modes is analyzed. Finally, a suitable relay is selected amongst the candidate relay equipments by the method of game theory. This algorithm avoids a device with a weak social relation and a low residual energy being selected as a relay. The results manifest that the proposed algorithm improves the throughput of the system, the coverage probability of D2D link, and the rationality of the relay selection, compared with the random selection algorithm and the maximum throughput algorithm.  相似文献
6.
In order to guarantee the reliability of the services and improve the resource utilization ratio of optical networks, the reliability-aware cross-layer protection strategy is proposed in optical inter-datacenter networks. In the architecture of the software defined IP over the elastic optical network, the optical layer could be aware of the services' real-time reliability through the cooperation of the controllers on the IP layer and optical layer. And then the optical controller could dynamically adjust the protected resources exploiting the release method of the minimal resource occupation block for the service according to the service' real-time reliability. Simulation results show that the proposed strategy can achieve a lower protection overbuild and blocking ratio while guaranteeing the reliability requirement of services.  相似文献
7.
For the limited-magnitude errors occurring in a flash memory system and the disadvantage that the information rates of rank-modulation permutation codes are not high enough, a simple construction method for regular multipermutation codes that can correct these errors is proposed by using the direct product operation on multipermutation sets which have the same minimum distance under the Chebyshev distance metric. Moreover, by using the projection operation on the known simple regular multipermutation codes, the multipermutation sets with different minimum distances are obtained. Based on the direct product of these multipermutation sets, a generalized construction method for regular multipermutation codes is proposed. Compared with the existing construction methods of multipermutation codes under the Chebyshev distance metric, the proposed construction methods of multipermutation codes based on direct product operation are more intuitive. Some calculation examples are provided to verify the validity of the proposed construction methods.  相似文献
8.
For the problem that the localized overload of the integrated networks and the equipment failure will make the business interruption, a virtualized multi path reliable transmission mechanism for the integrated fiber-wireless access networks is proposed. By establishing the virtualized hierarchical model and adopting the centralized management of resources of the virtualized network and the network overall visual superiority, we use the multi-path parallel transmission mechanism to design a recovery scheme after a breakdown so as to ensure the reliable transmission of the network. The results show that the performance of the proposed algorithm is better than the full backup and shared backup algorithm. In addition, the proposed algorithm can ensure the network reliability while the network load balancing is achieved and the resource utilization rate is improved.  相似文献
9.
Since the existing trust mechanism fails to tackle the problem that malicious nodes cooperate with each other, malicious collusion detection data forwarding in Opportunistic Sensing is proposed. First, the transient connection subnets are constructed according to the state of connection between nodes. At the same time, the anomalous interaction subsets with the maximum aggregation density are searched on the basis of analyzing the abnormal interaction behavior, and the malicious consonants are detected. Second, the transient trust relationship between nodes is evaluated through connection strength and collaboration willingness by establishing the transient trust subnet, so as to select the best relay node for completing data forwarding. Results show that the proposed mechanism can reduce adverse effects of collusion attacks effectively, and can achieve the purpose of accurate and efficient data forwarding.  相似文献
10.
In order to solve the problem that the traditional adaptive algorithms are not able to perform well under the impulsive noise case,this paper develops new adaptive filtering algorithms in the presence of impulsive noise. A close inspection of the impulsive noise reveals that the noise has the sparse property in the time domain because it contains few large values and lots of small values in amplitude.By reformulating the cost functions utilizing this feature of noise into traditional adaptive algorithms,joint sparse online estimation algorithms are developed.The proposed algorithms exploit the noise structure to better suppress the noise.The results demonstrate the superior performance of the proposed methods compared to the existing p-norm algorithms in terms of convergence speed and steady-state error.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号