4.6 Article

An Image Fusion Method Based on Sparse Representation and Sum Modified-Laplacian in NSCT Domain

期刊

ENTROPY
卷 20, 期 7, 页码 -

出版社

MDPI
DOI: 10.3390/e20070522

关键词

image fusion; sparse representation; NSCT; SML

资金

  1. Common Key Technology Innovation Special of Key Industries [cstc2017zdcy-zdyf0252, cstc2017zdcy-zdyfX0055]
  2. Artificial Intelligence Technology Innovation Significant Theme Special Project [cstc2017rgzn-zdyf0073, cstc2017rgzn-zdyf0033]

向作者/读者索取更多资源

Multi-modality image fusion provides more comprehensive and sophisticated information in modern medical diagnosis, remote sensing, video surveillance, etc. Traditional multi-scale transform (MST) based image fusion solutions have difficulties in the selection of decomposition level, and the contrast loss in fused image. At the same time, traditional sparse-representation based image fusion methods suffer the weak representation ability of fixed dictionary. In order to overcome these deficiencies of MST- and SR-based methods, this paper proposes an image fusion framework which integrates nonsubsampled contour transformation (NSCT) into sparse representation (SR). In this fusion framework, NSCT is applied to source images decomposition for obtaining corresponding low- and high-pass coefficients. It fuses low- and high-pass coefficients by using SR and Sum Modified-laplacian (SML) respectively. NSCT inversely transforms the fused coefficients to obtain the final fused image. In this framework, a principal component analysis (PCA) is implemented in dictionary training to reduce the dimension of learned dictionary and computation costs. A novel high-pass fusion rule based on SML is applied to suppress pseudo-Gibbs phenomena around singularities of fused image. Compared to three mainstream image fusion solutions, the proposed solution achieves better performance on structural similarity and detail preservation in fused images.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

Structural Scheduling of Transient Control Under Energy Storage Systems by Sparse-Promoting Reinforcement Learning

Jian Sun, Guanqiu Qi, Neal Mazur, Zhiqin Zhu

Summary: With the rapid increase in data measurement from power grids, machine learning research in transient control has gained significant attention. This article proposes a sparse neural network based reinforcement learning scheme for optimizing the transient stability enhancement of power grids with energy storage systems. The simulation results confirm the feasibility, advantages, and adaptability of the proposed method.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Engineering, Electrical & Electronic

Joint Power Allocation and Placement Scheme for UAV-Assisted IoT With QoS Guarantee

Ruirui Chen, Yanjing Sun, Liping Liang, Wenchi Cheng

Summary: This paper investigates the use of unmanned aerial vehicles (UAVs) in assisting data acquisition for the Internet of Things (IoT). It proposes a deployment scheme with quality-of-service (QoS) guarantee to optimize the placement of UAVs and maximize their average data rate. The proposed algorithms minimize the number of UAVs while covering a large number of ground devices.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2022)

Article Computer Science, Software Engineering

X-Net: a dual encoding-decoding method in medical image segmentation

Yuanyuan Li, Ziyu Wang, Li Yin, Zhiqin Zhu, Guanqiu Qi, Yu Liu

Summary: This paper proposes a dual encoding-decoding structure of X-shaped network (X-Net) that integrates the characteristics of CNNs and Transformer. It can serve as a good alternative to the traditional pure convolutional medical image segmentation network.

VISUAL COMPUTER (2023)

Article Computer Science, Artificial Intelligence

Convex Neural Networks Based Reinforcement Learning for Load Frequency Control under Denial of Service Attacks

Fancheng Zeng, Guanqiu Qi, Zhiqin Zhu, Jian Sun, Gang Hu, Matthew Haner

Summary: This paper proposes a load-frequency control strategy based on ADES reinforcement learning, which uses convex neural networks to convert nonlinear optimization problems into convex optimization problems, avoiding local optimums, improving controller response, and effectively reducing the frequency deviation of power grids under DoS attacks.

ALGORITHMS (2022)

Article Computer Science, Artificial Intelligence

Discrepant mutual learning fusion network for unsupervised domain adaptation on person re-identification

Xiao Yun, Qunqun Wang, Xiaozhou Cheng, Kaili Song, Yanjing Sun

Summary: This paper proposes an improved dual-branch mutual learning fusion network to address the problems in domain adaptive pedestrian re-identification. By increasing the difference between dual networks and enhancing their feature expressiveness, the proposed method outperforms other methods in recognition accuracy.

APPLIED INTELLIGENCE (2023)

Article Telecommunications

Age of transmission-optimal scheduling for state update of multi-antenna cellular Internet of Things

Song Li, Min Li, Ruirui Chen, Yanjing Sun

Summary: This paper investigates the state update problem in a multi-antenna cellular IoT and introduces the concept of age of transmission. The problem is formulated as a restless multi-armed bandit problem, and a scheduling strategy based on the Whittle index and complete subgraph detection is proposed to avoid interference between nodes.

CHINA COMMUNICATIONS (2022)

Article Telecommunications

Physical-Layer Security for Cache-Enabled C-RANs via Rate Splitting

Jiasi Zhou, Yanjing Sun, Chintha Tellambura

Summary: This letter proposes a rate splitting-based secure transmit approach for cache-enabled cloud radio access networks. By optimizing message splitting, RRH clustering, and beamforming, the minimum secrecy rate is maximized and the transmit constraints are met, achieving significant gains.

IEEE COMMUNICATIONS LETTERS (2022)

Article Computer Science, Artificial Intelligence

Combining detailed appearance and multi-scale representation: a structure-context complementary network for human pose estimation

Kaiwen Dong, Yanjing Sun, Xiaozhou Cheng, Xiaolin Wang, Bin Wang

Summary: In this paper, the authors propose a structure-context complementary network (SCC-Net) for human pose estimation, which consists of an enhanced attention mechanism and an atrous convolution-based module. The proposed modules, namely cross-coordinate attention bottleneck (CCAB) and waterfall residual atrous pooling (WRAP), improve the performance of body joint detection by addressing challenges such as occlusion and background confusion. The experimental results on benchmark datasets demonstrate the effectiveness of the proposed modules and the holistic SCC-Net.

APPLIED INTELLIGENCE (2023)

Article Computer Science, Theory & Methods

Occluded Person Re-Identification via Defending Against Attacks From Obstacles

Shujuan Wang, Run Liu, Huafeng Li, Guanqiu Qi, Zhengtao Yu

Summary: Due to incomplete appearance features, matching occluded pedestrians under multiple cross-camera views is a long-term challenge. This paper introduces the idea of adversarial attack into occluded person re-ID and proposes an adversarial training framework to defend against obstacles and improve pedestrian identity matching. The proposed framework broadens research horizons in robust model design and achieves better performance on occluded re-ID datasets.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

Performance analysis and design of quasi-cyclic LDPC codes for underwater magnetic induction communications

Hua Xu, Wenjuan Shi, Yanjing Sun

Summary: This paper designs an underwater MI communication system based on Quasi-cyclic LDPC (QC-LDPC) codes. It proposes a novel algorithm named underwater magnetic induction protograph (UWMIP) extrinsic information transfer algorithm to evaluate the performance of the given QC-LDPC code. Additionally, a differential evolution UWMIP (DE-UWMIP) algorithm is presented to search for optimized QC-LDPC codes with the best distance threshold. Simulation results demonstrate the effectiveness of the proposed algorithm and its application in designing the underwater MI communication system.

PHYSICAL COMMUNICATION (2023)

Article Telecommunications

AUV-Aided Data Collection Considering Adaptive Ocean Currents for Underwater Wireless Sensor Networks

Yunyun Li, Yanjing Sun, Qingyan Ren, Song Li

Summary: Autonomous underwater vehicle (AUV)-assisted data collection is an efficient approach to implementing smart ocean. However, two critical issues, AUV yaw and sensor node movement, hinder data collection in time-varying ocean currents. To address these issues, we propose an adaptive AUV-assisted data collection strategy. This strategy considers the energy consumption of the AUV and the value of information (VoI) over sensor nodes, and maximizes the VoI-energy ratio through optimization. Furthermore, the AUV yaw problem is solved by determining the reachable region and optimal cruising direction in different ocean current environments.

CHINA COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Digital Twin-Enabled Computation Offloading in UAV-Assisted MEC Emergency Networks

Bowen Wang, Yanjing Sun, Haejoon Jung, Long D. Nguyen, Nguyen-Son Vo, Trung Q. Duong

Summary: In this paper, a method is proposed to optimize mobile edge computing using digital twin, and to make offloading decisions based on real-time predictions under uncertainty.

IEEE WIRELESS COMMUNICATIONS LETTERS (2023)

Article Telecommunications

Energy-efficient data collection over underwater MI-assisted acoustic cooperative MIMO WSNs

Qingyan Ren, Yanjing Sun, Song Li, Bin Wang, Zhengda Yu

Summary: This paper proposes an energy-efficient data collection method for underwater wireless sensor networks (WSNs) using underwater magnetic induction-assisted acoustic cooperative multiple-input-multiple-output (MIMO) technique. It focuses on forming cooperative MIMO and establishing relay links to improve network coverage and extend network lifetime.

CHINA COMMUNICATIONS (2023)

Article Biology

Drug-target affinity prediction method based on multi-scale information interaction and graph optimization

Zhiqin Zhu, Zheng Yao, Xin Zheng, Guanqiu Qi, Yuanyuan Li, Neal Mazur, Xinbo Gao, Yifei Gong, Baisen Cong

Summary: Drug-target affinity (DTA) prediction is an emerging and effective method in drug development research to evaluate the efficacy and safety of candidate drugs. However, existing DTA prediction models lack information on interactions between molecular substructures, impacting prediction accuracy and interpretability. Therefore, TDGraphDTA is introduced, using Transformer and Diffusion to predict drug-target interactions by incorporating multi-scale information interaction and graph optimization.

COMPUTERS IN BIOLOGY AND MEDICINE (2023)

Article Computer Science, Information Systems

Pyramid Feature Aggregation for Hierarchical Quality Prediction of Stitched Panoramic Images

Yu Zhou, Weikang Gong, Yanjing Sun, Leida Li, Jinjian Wu, Xinbo Gao

Summary: Panoramic image quality assessment (PIQA) is crucial for technologies providing immersive visual experience. Most existing PIQA methods ignore the special characteristics of stitching distortions caused by imperfect algorithms, resulting in unsatisfactory performance. To address this, we propose an effective stitched PIQA method consisting of an imaginary reference generation module and a hierarchical quality prediction module. Extensive experiments demonstrate the superiority of our method in evaluating the quality of stitched panoramic images.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

暂无数据