A new multi-spectral image super-resolution reconstruction algorithm based on B-spline interpolation is presented. In
order to take the advantages of both multi-frame and single-frame SR methods, B-spline interpolation SR method is
proposed by considering sub-pixels of the images which have half-pixel difference with each other. Four B-spline curves
are formed by the 12 points which are in the scope of the interpolation point, it take the mean of the midpoints as the
value of the interpolation point. Furthermore, uniform B-spline has convexity-preserving property, the curve doesn't
interpolate any control points, while two new control points are inserted between two adjacent control points, the points
merge the old points to form a new set of control points. The B-spline curve generated by the new set of points includes
all old control points, and the interpolating curve is convexity-preserving. This B-spline interpolation SR method can
remove blurring and noise produced by the finite detector size and optic and add the image detail. The effectiveness of
the proposed method is verified by comparing it against some conventional methods.
KEYWORDS: Solid state lighting, Databases, Internet, Wireless broadband, Information security, Network security, Standards development, Local area networks, Computer security, Cryptography
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
This paper firstly introduces the basic framework and the character and then makes analysis and design to the WDM network's management, which is using optical control channel to transmit network management information on the basis of comparing several existing transport methods of network management information.
Resilient Packet Ring is a new technology being standardized by IEEE 802.17 working group. This paper describes the ways to accomplish uniform traffic handling and spatial traffic handling by comparison. Since uniform shaping cannot avoid head of line blocking or decrease the jitter of bandwidth utilization on multiple chock point ringlet, this paper proposes a solution for shaping of spatial traffic handling. Virtual destination queues are introduced to the shaper to avoid HOL, and a special kind of dynamic priority is added to the scheduler to optimize bandwidth utilization. A simulation model is set up to exam the performance of VDQ aware shaper, which is the first phase to accomplish spatial shaping.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.