期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Effects of Normalised SSIM Loss on Super-Resolution Tasks
1
作者 Adéla Hamplová TomášNovák +1 位作者 MiroslavŽácek JiríBrožek 《Computer Modeling in Engineering & Sciences》 2025年第6期3329-3349,共21页
This study proposes a new component of the composite loss function minimised during training of the Super-Resolution(SR)algorithms—the normalised structural similarity index loss LSSIMN,which has the potential to imp... This study proposes a new component of the composite loss function minimised during training of the Super-Resolution(SR)algorithms—the normalised structural similarity index loss LSSIMN,which has the potential to improve the natural appearance of reconstructed images.Deep learning-based super-resolution(SR)algorithms reconstruct high-resolution images from low-resolution inputs,offering a practical means to enhance image quality without requiring superior imaging hardware,which is particularly important in medical applications where diagnostic accuracy is critical.Although recent SR methods employing convolutional and generative adversarial networks achieve high pixel fidelity,visual artefacts may persist,making the design of the loss function during training essential for ensuring reliable and naturalistic image reconstruction.Our research shows on two models—SR and Invertible Rescaling Neural Network(IRN)—trained on multiple benchmark datasets that the function LSSIMN significantly contributes to the visual quality,preserving the structural fidelity on the reference datasets.The quantitative analysis of results while incorporating LSSIMN shows that including this loss function component has a mean 2.88%impact on the improvement of the final structural similarity of the reconstructed images in the validation set,in comparison to leaving it out and 0.218%in comparison when this component is non-normalised. 展开更多
关键词 SUPER-RESOLUTION convolutional neural networks composite loss function structural similarity normalisation training optimisation
在线阅读 下载PDF
Piecewise linear detection for direct superposition modulation 被引量:1
2
作者 Martin Damrath Peter Adam Hoeher Gilbert J.M. Forkel 《Digital Communications and Networks》 SCIE 2018年第2期98-105,共8页
Considering high-order digital modulation schemes, the bottleneck in consumer products is the detector rather than the modulator. The complexity of the optimal a posteriori probability (APP) detector increases expon... Considering high-order digital modulation schemes, the bottleneck in consumer products is the detector rather than the modulator. The complexity of the optimal a posteriori probability (APP) detector increases exponentially with respect to the number of modulated bits per data symbol. Thus, it is necessary to develop low-complexity detection algorithms with an APP-like performance, especially when performing iterative detection, for example in conjunction with bit interleaved coded modulation. We show that a special case of superposition modulation, dubbed Direct Superposition Modulation (DSM), is particularly suitable for complexity reduction at the receiver side. As opposed to square QAM, DSM achieves capacity without active signal shaping. The main contribution is a low-cost detection algorithm for DSM, which enables iterative detection by taking a priori information into account. This algorithm exploits the approximate piecewise linear behavior of the soft outputs of an APP detector over the entire range of detector input values. A theoretical analysis and simulation results demonstrate that at least max-log APP performance can be reached, while the complexity is significantly reduced compared to classical APP detection. 展开更多
关键词 Digital modulation DEMODULATION Detection algorithms Linear approximation
在线阅读 下载PDF
Distributed Energy Saving Mechanism Based on CoMP in LTE-A System 被引量:1
3
作者 Fei Zheng Wenjing Li +2 位作者 Luoming Meng Peng Yu Lei Peng 《China Communications》 SCIE CSCD 2016年第7期39-47,共9页
To reduce the energy consumption of the LTE-A system,a distributed energy-saving mechanism based on Co MP(Co MPDESM) is proposed to solve the inadequate coverage problem under the dormant cells.First,the network is di... To reduce the energy consumption of the LTE-A system,a distributed energy-saving mechanism based on Co MP(Co MPDESM) is proposed to solve the inadequate coverage problem under the dormant cells.First,the network is divided into clusters based on the equivalent cell principle.Then,we transfer global optimization into a group of subproblems.Second,a joint processing-based cooperative cell selection model is constructed to determine cooperative cells and dormant cells.Third,the compensative cells with a determined threshold are selected to control users' access.Finally,a simulation is implemented in Matlab.Results show that the energy-saving rate can reach 36.4% and that the mechanism meets the network coverage requirement.Thus,joint processing can be effectively applied in an energy saving mechanism and used to improve the network performance of edge users without increasing transmission power. 展开更多
关键词 LTE-A distributed energy-saving mechanism CoMP equivalent cell principle energy-saving rate
在线阅读 下载PDF
A Study on Hovering Control of Small Aerial Robot by Sensing Existing Floor Features 被引量:1
4
作者 Chinthaka Premachandra Dang Ngoc Hoang Thanh +1 位作者 Tomotaka Kimura Hiroharu Kawanaka 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1016-1025,共10页
Since precise self-position estimation is required for autonomous flight of aerial robots, there has been some studies on self-position estimation of indoor aerial robots. In this study, we tackle the self-position es... Since precise self-position estimation is required for autonomous flight of aerial robots, there has been some studies on self-position estimation of indoor aerial robots. In this study, we tackle the self-position estimation problem by mounting a small downward-facing camera on the chassis of an aerial robot. We obtain robot position by sensing the features on the indoor floor.In this work, we used the vertex points(tile corners) where four tiles on a typical tiled floor connected, as an existing feature of the floor. Furthermore, a small lightweight microcontroller is mounted on the robot to perform image processing for the onboard camera. A lightweight image processing algorithm is developed. So, the real-time image processing could be performed by the microcontroller alone which leads to conduct on-board real time tile corner detection. Furthermore, same microcontroller performs control value calculation for flight commanding. The flight commands are implemented based on the detected tile corner information. The above mentioned all devices are mounted on an actual machine, and the effectiveness of the system was investigated. 展开更多
关键词 Hovering control light weight algorithm development image processing self-position estimation small aerial robot tile corner sensing
在线阅读 下载PDF
Anonymous Authentication Scheme Based on Smart Card and Biometrics in the Electronic Medical Environment
5
作者 PU Guangning YIN Fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期183-190,共8页
With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the ele... With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the electronic medical environment, it is also necessary to consider that the patient may access multiple hospital servers. Based on three factors of smart card, random number and biometrics, an anonymous authentication scheme in the electronic medical environment is proposed. In order to reduce the burden of the medical registration and certification center(HC), in the proposed anonymous authentication scheme, the patient only needs to register with HC once, then he/she can apply for visiting each hospital that has joined the medical servers. Security analysis shows that the proposed scheme has anonymity and dual authentication, and can resist various types of attacks, such as insider attack, modification attack, replay attack and smart card loss attack. Efficiency analysis shows that the calculation cost of the proposed scheme in the registration and login phase is lower, and it is slightly higher than Lei's scheme and Khan et al's scheme in the authentication phase. The proposed scheme can not only resist various types of attacks, but also support dual authentication and multi-server environment. With a little modification, the proposed scheme can also be used to other application scenarios requiring anonymous authentication. 展开更多
关键词 AUTHENTICATION ANONYMITY key agreement smart card MULTI-SERVER
原文传递
An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability
6
作者 PU Guangning YIN Fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第4期317-323,共7页
In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authenticati... In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes. 展开更多
关键词 anonymous authentication TRACEABILITY THRESHOLD ring signature linkability
原文传递
A new algorithm based on metaheuristics for data clustering
7
作者 Tsutomu SHOHDOHJI Fumihiko YANO Yoshiaki TOYODA 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2010年第12期921-926,共6页
This paper presents a new algorithm for clustering a large amount of data.We improved the ant colony clustering algorithm that uses an ant’s swarm intelligence,and tried to overcome the weakness of the classical clus... This paper presents a new algorithm for clustering a large amount of data.We improved the ant colony clustering algorithm that uses an ant’s swarm intelligence,and tried to overcome the weakness of the classical cluster analysis methods.In our proposed algorithm,improvements in the efficiency of an agent operation were achieved,and a new function "cluster condensation" was added.Our proposed algorithm is a processing method by which a cluster size is reduced by uniting similar objects and incorporating them into the cluster condensation.Compared with classical cluster analysis methods,the number of steps required to complete the clustering can be suppressed to 1% or less by performing this procedure,and the dispersion of the result can also be reduced.Moreover,our clustering algorithm has the advantage of being possible even in a small-field cluster condensation.In addition,the number of objects that exist in the field decreases because the cluster condenses;therefore,it becomes possible to add an object to a space that has become empty.In other words,first,the majority of data is put on standby.They are then clustered,gradually adding parts of the standby data to the clustering data.The method can be adopted for a large amount of data.Numerical experiments confirmed that our proposed algorithm can theoretically applied to an unrestricted volume of data. 展开更多
关键词 Metaheuristics Ant colony clustering Data clustering Swarm intelligence
原文传递
Symbol detection based on Voronoi surfaces with emphasis on superposition modulation
8
作者 Martin Damrath Peter Adam Hoeher Gilbert J.M. Forkel 《Digital Communications and Networks》 SCIE 2017年第3期141-149,共9页
A challenging task when applying high-order digital modulation schemes is the complexity of the detector. Particularly, the complexity of the optimal a posteriori probability (APP) detector increases exponentially w... A challenging task when applying high-order digital modulation schemes is the complexity of the detector. Particularly, the complexity of the optimal a posteriori probability (APP) detector increases exponentially with respect to the number of bits per data symbol. This statement is also true for the Max-Log-APP detector, which is a common simplification of the APP detector. Thus it is important to design new detection algorithms which combine a sufficient performance with low complexity. In this contribution, a detection algorithm for two- dimensional digital modulation schemes which cannot be split-up into real and imaginary parts (like phase shift keying and phase-shifted snperposition modulation (PSM)) is proposed with emphasis on PSM with equal power allocation. This algorithm exploits the relationship between Max-Log-APP detection and a Voronoi diagram to determine planar surfaces of the soft outputs over the entire range of detector input values. As opposed to state-of-the-art detectors based on Voronoi surfaces, a priori information is taken into account, enabling iterative processing. Since the algorithm achieves Max-Log-APP performance, even in the presence of a priori information, this implies a great potential for complexity reduction compared to the classical APP detection. 展开更多
关键词 Digital modulation Demodulation Detection algorithms Linear approximation
在线阅读 下载PDF
The Puzzle of the La I Lines 6520.644 A and 6519.869 A
9
作者 Laurentius Windholz Bettina Gamper +1 位作者 Przemyslaw Glowacki Jerzy Dembczyński 《Spectral Analysis Review》 2014年第3期10-18,共9页
The strong La line 6520.644 ? is present in a Fourier Transform Spectrum (signal to noise ratio of 240), but its wavelength in commonly used tables (e.g. [1]) is given as 6520.770 ?, while in [2] the wavelength is giv... The strong La line 6520.644 ? is present in a Fourier Transform Spectrum (signal to noise ratio of 240), but its wavelength in commonly used tables (e.g. [1]) is given as 6520.770 ?, while in [2] the wavelength is given as 6520.74 ?, unclassified, with the remark “h” (hazy). The line could not be classified using known energy levels of the La atom (La I) and its first ion (La II). It appears as a single broadened peak. By a combination of laser optogalvanic spectroscopy, laser-induced fluorescence and Doppler-reduced saturation spectroscopy we could introduce a new even parity La I energy level, 35449.041 cm -1, J = 13/2, with hyperfine (hf) constants A = ?8.0(5) MHz, B = 10(10) MHz. For a second, up to now unknown neighbouring La I line (wavelength 6519.869 ?) we introduced another even parity energy level involved in the formation of the line, 41207.994 cm?-1, J = 13/2, A = 91.6(5) MHz, B = 170(50) MHz. We tried also to explain why in old tables the wavelength given was so different. 展开更多
关键词 LANTHANUM Energy Levels Laser Spectroscopy
暂未订购
上一页 1 下一页 到第
使用帮助 返回顶部