首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   0篇
电工技术   1篇
无线电   21篇
自动化技术   9篇
  2013年   1篇
  2012年   2篇
  2011年   3篇
  2009年   2篇
  2008年   3篇
  2007年   1篇
  2006年   4篇
  2005年   3篇
  2004年   2篇
  2003年   4篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   2篇
排序方式: 共有31条查询结果,搜索用时 15 毫秒
1.
Particle filtering is frequently used for visual tracking problems since it provides a general framework for estimating and propagating probability density functions for nonlinear and non-Gaussian dynamic systems. However, this algorithm is based on a Monte Carlo approach and the cost of sampling and measurement is a problematic issue, especially for high-dimensional problems. We describe an alternative to the classical particle filter in which the underlying density function has an analytic representation for better approximation and effective propagation. The techniques of density interpolation and density approximation are introduced to represent the likelihood and the posterior densities with Gaussian mixtures, where all relevant parameters are automatically determined. The proposed analytic approach is shown to perform more efficiently in sampling in high-dimensional space. We apply the algorithm to real-time tracking problems and demonstrate its performance on real video sequences as well as synthetic examples.  相似文献   
2.
Mean shift: a robust approach toward feature space analysis   总被引:49,自引:0,他引:49  
A general non-parametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure: the mean shift. For discrete data, we prove the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and, thus, its utility in detecting the modes of the density. The relation of the mean shift procedure to the Nadaraya-Watson estimator from kernel regression and the robust M-estimators; of location is also established. Algorithms for two low-level vision tasks discontinuity-preserving smoothing and image segmentation - are described as applications. In these algorithms, the only user-set parameter is the resolution of the analysis, and either gray-level or color images are accepted as input. Extensive experimental results illustrate their excellent performance  相似文献   
3.
Quality-of-service (QoS) guarantees for multiclass code division multiple access networks are provided by means of cross-layer optimization across the physical and network layers. At the physical layer, the QoS requirements are specified in terms of a target signal-to-interference ratio (SIR) requirement, and optimal target powers are dynamically adjusted according to the current number of users in the system. At the network layer, the QoS requirements are the blocking probabilities and the call connection delays. The network layer guarantees that both physical layer and network layer QoS are met by employing admission control. An optimal admission control policy is proposed based on a semi-Markov decision process formulation. The tradeoff between blocking and delay is discussed for various buffer configurations. The advantage of advanced signal processing receivers is established using a comparative capacity analysis and simulation with the classical scenario in which the system uses matched filter receivers.  相似文献   
4.
We propose a wireless access mechanism for web traffic packets in an integrated wireless code-division multiple-access system that has both voice and Web traffic. The proposed scheme is a medium-access control layer/link layer (MAC/LL) scheduling algorithm that consists of a two level control: admission control and packet scheduling. The admission control restricts the number of users in the system such that quality-of-service requirements [target signal-to-interference ratio (SIR) and delay] for both voice and Web traffic can be met. The packet scheduling balances the system interference on a slot-by-slot basis such that the target SIRs can be achieved for all users (voice and Web browsing sessions) with a higher scheduling priority for voice. Designing admission control for Web users based on the average offered rate per session is difficult due to the high variations in the offered load generated by heavy tailed distributions for Web traffic. To overcome this problem, we propose an admission control algorithm that adaptively estimates the aggregate average load based on load measurements using a sliding observation window.  相似文献   
5.
Call admission control (CAC) is a mechanism used in networks to administer quality of service (QoS). Whereas the CAC problem in time-division multiple access (TDMA)-based cellular networks is simply related to the number of physical channels available in the network, it is strongly related to the physical layer performance in code-division multiple access (CDMA) networks since the multi-access interference in them is a function of the number of users and is a limiting factor in ensuring QoS. In this article, the CAC issues in multimedia DS-CDMA systems are reviewed by illustrating the basic principles underlying various schemes that have been proposed progressively from the simplest to the complex. The article also introduces SIR as a measure of QoS and describes the relatively simple schemes to administer CAC. The expression for SIR resulting from linear minimum mean-squared error processing is also presented. This article illustrates how CAC for multiple class service can be casted into an optimality framework and then discuss the recent work addressing self-similar multiple access interference.  相似文献   
6.
Lymph nodes are assessed routinely in clinical practice and their size is followed throughout radiation or chemotherapy to monitor the effectiveness of cancer treatment. This paper presents a robust learning-based method for automatic detection and segmentation of solid lymph nodes from CT data, with the following contributions. First, it presents a learning based approach to solid lymph node detection that relies on marginal space learning to achieve great speedup with virtually no loss in accuracy. Second, it presents a computationally efficient segmentation method for solid lymph nodes (LN). Third, it introduces two new sets of features that are effective for LN detection, one that self-aligns to high gradients and another set obtained from the segmentation result. The method is evaluated for axillary LN detection on 131 volumes containing 371 LN, yielding a 83.0% detection rate with 1.0 false positive per volume. It is further evaluated for pelvic and abdominal LN detection on 54 volumes containing 569 LN, yielding a 80.0% detection rate with 3.2 false positives per volume. The running time is 5-20 s per volume for axillary areas and 15-40 s for pelvic. An added benefit of the method is the capability to detect and segment conglomerated lymph nodes.  相似文献   
7.
On the capacity of mobile ad hoc networks with delay constraints   总被引:4,自引:0,他引:4  
Previous work on ad hoc network capacity has focused primarily on source-destination throughput requirements for different models and transmission scenarios, with an emphasis on delay tolerant applications. In such problems, network capacity enhancement is achieved as a tradeoff with transmission delay. In this paper, the capacity of ad hoc networks supporting delay sensitive traffic is studied. First, a general framework is . proposed for characterizing the interactions between the physical and the network layer in an ad hoc network. Then, CDMA ad hoc networks, in which advanced signal processing techniques such as multiuser detection are relied upon to enhance the user capacity, are analyzed. The network capacity is characterized using a combination of geometric arguments and large scale analysis, for several network scenarios employing matched filters, decorrelators and minimum-mean-square-error receivers. Insight into the network performance for finite systems is also provided by means of simulations. Both analysis and simulations show a significant network capacity gain for ad hoc networks employing multiuser detectors, compared with those using matched filter receivers, as well as very good performance even under tight delay and transmission power requirements.  相似文献   
8.
Kernel-based object tracking   总被引:47,自引:0,他引:47  
A new approach toward target representation and localization, the central component in visual tracking of nonrigid objects, is proposed. The feature histogram-based target representations are regularized by spatial masking with an isotropic kernel. The masking induces spatially-smooth similarity functions suitable for gradient-based optimization, hence, the target localization problem can be formulated using the basin of attraction of the local maxima. We employ a metric derived from the Bhattacharyya coefficient as similarity measure, and use the mean shift procedure to perform the optimization. In the presented tracking examples, the new method successfully coped with camera motion, partial occlusions, clutter, and target scale variations. Integration with motion filters and data association techniques is also discussed. We describe only a few of the potential applications: exploitation of background information, Kalman tracking using motion models, and face tracking.  相似文献   
9.
Distribution Free Decomposition of Multivariate Data   总被引:6,自引:0,他引:6  
We present a practical approach to nonparametric cluster analysis of large data sets. The number of clusters and the cluster centres are automatically derived by mode seeking with the mean shift procedure on a reduced set of points randomly selected from the data. The cluster boundaries are delineated using a k-nearest neighbour technique. The proposed algorithm is stable and efficient, a 10,000 point data set being decomposed in only a few seconds. Complex clustering examples and applications are discussed, and convergence of the gradient ascent mean shift procedure is demonstrated for arbitrary distribution and cardinality of the data. Received: 7 October 1998?Accepted: 9 October 1998  相似文献   
10.
In this paper, we propose access control protocols for integrated voice/data code division multiple access (CDMA) systems that are based on estimating the residual capacity available for data users. The data model considered in the analysis is suitable for non-transparent services (e.g., e-mail, file transfer, store-and-forward facsimile, etc.). The residual capacity is derived from the feasibility condition for power control using an adaptive prediction technique based on delta modulation. The analysis is extended for the case of imperfect power control. Two access control protocols are considered: modified delta modulation with scheduled access (MDM-S) and modified delta modulation with random access (MDM-R). Comparisons with earlier proposed protocols reveal a better performance in terms of average throughput for data for a given system capacity and outage probability  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号