Home / Journals / JIHPP / Vol.1, No.3, 2019
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Study on Initial Alignment Under Large Misalignment Angle

    Qi Wang1,2,*, Changsong Yang2,4, Shaoen Wu3
    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 95-108, 2019, DOI:10.32604/jihpp.2019.06054
    Abstract Misalignment angle error model describing the SINS mathematical platform error is presented in this paper following the idea of small misalignment angle error model and large azimuth misalignment angle error model. It can be considered that the three misalignment angles are independent of the rotational sequence in the misalignment error model, but not suitable in the large misalignment error model. The error angle of Euler platform is used to represent the three misalignment angles from theoretical navigation coordinate system to computational navigation coordinate system. The Euler platform error angle is utilized to represent the mathematical platform error and its physical… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Scale Network with the Encoder-Decoder Structure for CMR Segmentation

    Chaoyang Xia1, Jing Peng1, Zongqing Ma2, Xiaojie Li1,*
    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 109-117, 2019, DOI:10.32604/jihpp.2019.07198
    Abstract Cardiomyopathy is one of the most serious public health threats. The precise structural and functional cardiac measurement is an essential step for clinical diagnosis and follow-up treatment planning. Cardiologists are often required to draw endocardial and epicardial contours of the left ventricle (LV) manually in routine clinical diagnosis or treatment planning period. This task is time-consuming and error-prone. Therefore, it is necessary to develop a fully automated end-to-end semantic segmentation method on cardiac magnetic resonance (CMR) imaging datasets. However, due to the low image quality and the deformation caused by heartbeat, there is no effective tool for fully automated end-to-end… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism

    Lei Wang1, Jian Liu1,*, Alan Yang2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 119-133, 2019, DOI:10.32604/jihpp.2019.07296
    Abstract In this paper, we study the state-dependent interference channel, where the Rayleigh channel is non-causally known at cognitive network. We propose an active secondary transmission mechanism with interference cancellation technique according to the ON-OFF status of primary network. the secondary transmission mechanism is divided into four cases according to the active state of the primary user in the two time slots. For these interference cases, numerical results are provided to show that active interference cancellation mechanism significantly reduces the secondary transmission performance in terms of secondary outage probability and energy efficiency. More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Nonlocal Self-Similarity Technique for Fabric Defect Detection

    Boheng Wang1, Li Ma1, Jielin Jiang1,2,*
    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 135-142, 2019, DOI:10.32604/jihpp.2019.07432
    Abstract Fabric defect detection has been an indispensable and important link in fabric production, many studies on the development of vision based automated inspection techniques have been reported. The main drawback of existing methods is that they can only inspect a particular type of fabric pattern in controlled environment. Recently, nonlocal self-similarity (NSS) based method is used for fabric defect detection. This method achieves good defect detection performance for small defects with uneven illumination, the disadvantage of NNS based method is poor for detecting linear defects. Based on this reason, we improve NSS based defect detection method by introducing a gray… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Resource Scheduling in Emergency Environment

    Yuankun Yan1,*, Yan Kong1, Zhangjie Fu1,2
    Journal of Information Hiding and Privacy Protection, Vol.1, No.3, pp. 143-155, 2019, DOI:10.32604/jihpp.2019.07772
    Abstract Nowadays, emergency accidents could happen at any time. The accidents occur unpredictably and the accidents requirements are diversely. The accidents happen in a dynamic environment and the resource should be cooperative to solve the accidents. Most methods are focusing on minimizing the casualties and property losses in a static environment. However, they are lack in considering the dynamic and unpredictable event handling. In this paper, we propose a representative environmental model in representation of emergency and dynamic resource allocation model, and an adaptive mathematical model based on Genetic Algorithm (GA) to generate an optimal set of solution domain. The experimental… More >

Per Page:

Share Link