All Articles

Non-Linear Signal Processing Methods for UAV Detections from a Multi-Function X-Band Radar

This article develops the applicability of non-linear processing techniques such as Compressed Sensing (CS), Principal Component Analysis (PCA), Iterative Adaptive Approach (IAA), and Multiple-input-multiple-output (MIMO) for the purpose of enhanced UAV detections using portable radar systems. The c...
More

Posted 10 months ago

Laser-Visible Face Image Translation and Recognition Based on CycleGAN and Spectral Normalization

The range-gated laser imaging instrument can capture face images in a dark environment, which provides a new idea for long-distance face recognition at night. However, the laser image has low contrast, low SNR and no color information, which affects observation and recognition. Therefore, it becomes...
More

Posted 10 months ago

Flood-Related Multimedia Benchmark Evaluation: Challenges, Results and a Novel GNN Approach

This paper discusses the importance of detecting breaking events in real time to help emergency response workers, and how social media can be used to process large amounts of data quickly. Most event detection techniques have focused on either images or text, but combining the two can improve perfor...
More

Posted 10 months ago

Panchromatic and multispectral image fusion for remote sensing and earth observation: Concepts, taxonomy, literature review, evaluation methodologies and challenges ahead

Panchromatic and multispectral image fusion, termed pan-sharpening, is to merge the spatial and spectral information of the source images into a fused one, which has a higher spatial and spectral resolution and is more reliable for downstream tasks compared with any of the source images. It has been...
More

Posted 10 months ago

A multi-strategy contrastive learning framework for weakly supervised semantic segmentation

Weakly supervised semantic segmentation (WSSS) has gained significant popularity as it relies only on weak labels such as image level annotations rather than the pixel level annotations required by supervised semantic segmentation (SSS) methods. Despite drastically reduced annotation costs, typical ...
More

Posted 10 months ago

Feature weighting in DBSCAN using reverse nearest neighbours

DBSCAN is arguably the most popular density-based clustering algorithm, and it is capable of recovering non-spherical clusters. One of its main weaknesses is that it treats all features equally. In this paper, we propose a density-based clustering algorithm capable of calculating feature weights rep...
More

Posted 10 months ago

Statistical hypothesis testing as a novel perspective of pooling for image quality assessment

Image quality assessment is usually achieved by pooling local quality scores. However, commonly used pooling strategies, based on simple sample statistics, are not always sensitive to distortions. In this short communication, we propose a novel perspective of pooling: reliable pooling through statis...
More

Posted 10 months ago

Arbitrary Order Total Variation for Deformable Image Registration

In this work, we investigate image registration in a variational framework and focus on regularization generality and solver efficiency. We first propose a variational model combining the state-of-the-art sum of absolute differences (SAD) and a new arbitrary order total variation regularization term...
More

Posted 10 months ago

Utilizing support vector and kernel ridge regression methods in spectral reconstruction

Two regression methods, namely, Support Vector Regression (SVR) and Kernel Ridge Regression (KRR), are used to reconstruct the spectral reflectance curves of samples of Munsell dataset from the corresponding CIE XYZ tristimulus values. To this end, half of the samples (i.e., the odd ones) were used ...
More

Posted 10 months ago

Object tracking and detection techniques under GANN threats: A systemic review

Current developments in object tracking and detection techniques have directed remarkable improvements in distinguishing attacks and adversaries. Nevertheless, adversarial attacks, intrusions, and manipulation of images/ videos threaten video surveillance systems and other object-tracking applicatio...
More

Posted 10 months ago

Showing Page 2 to 17