Reconstruction- and example-based super-resolution (SR) methods are promising for restoring a high-resolution (HR) image from low-resolution (LR) image(s). Under large magnification, reconstruction-based methods usually fail to hallucinate visual details while example-based methods sometimes introduce unexpected details. Given a generic LR image, to reconstruct a photo-realistic SR image and to suppress artifacts in the reconstructed SR image, we introduce a multi-scale dictionary to a novel SR method that simultaneously integrates local and non-local priors. The local prior suppresses artifacts by using steering kernel regression to predict the target pixel from a small local area. The non-local prior enriches visual details by taking a weighted average of a large neighborhood as an estimate of the target pixel. Essentially, these two priors are complementary to each other. Experimental results demonstrate that the proposed method can produce high quality SR recovery both quantitatively and perceptually.
标签: Super-resolution Multi-scale Dictionary Single Image for
上传时间: 2019-03-28
上传用户:fullout
pcie3.0标准规范 1. INTRODUCTION 2. TRANSACTION LAYER SPECIFICATION 3. DATA LINK LAYER SPECIFICATION 4. PHYSICAL LAYER SPECIFICATION 5. POWER MANAGEMENT 6. SYSTEM ARCHITECTURE 7. SOFTWARE INITIALIZATION AND CONFIGURATION
标签: pcie3
上传时间: 2019-07-05
上传用户:bingshi
1. 日语假名及其发音一览 平 片 罗 平 片 罗 平 片 罗 平 片 罗 平 片 罗 假 假 马 假 假 马 假 假 马 假 假 马 假 假 马 音 音 音 音 音 ______________________________________________________________________________ あ ア a い イ i う ウ u え エ e お オ o か カ ka き キ ki く ク ku け ケ ke こ コ ko さ サ sa し シ si/shi す ス su せ セ se そ ソ so た タ ta ち チ chi つ ツ tsu て テ te と ト to な ナ na に ニ ni ぬ ヌ nu ね ネ ne の ノ no は ハ ha ひ ヒ hi ふ フ fu へ ヘ he ほ ホ ho ま マ ma み ミ mi む ム mu め メ me も モ mo や ヤ ya ゆ ユ yu よ ヨ yo ら ラ ra り リ ri る ル ru れ レ re ろ ロ ro わ ワ wa を ヲ o/wo ん ン n が ガ ga ぎ ギ gi ぐ グ gu げ ゲ ge ご ゴ go ざ ザ za じ ジ zi/ji ず ズ zu ぜ ゼ ze ぞ ゾ zo だ ダ da ぢ ヂ ji/di づ ヅ zu/du で デ de ど ド do ば バ ba び ビ bi ぶ ブ bu べ ベ be ぼ ボ bo ぱ パ pa ぴ ピ pi ぷ プ pu ぺ ペ pe ぽ ポ po きゃ キャ kya きゅ キュ kyu きょ キョ kyo しゃ シャ sya しゅ シュ syu しょ ショ syo ちゃ チャ cya ちゅ チュ cyu ちょ チョ cyo にゃ ニャ nya にゅ ニュ nyu にょ ニョ nyo ひゃ ヒャ hya ひゅ ヒュ hyu ひょ ヒョ hyo みゃ ミャ mya みゅ ミュ myu みょ ミョ myo りゃ リャ rya りゅ リュ ryu りょ リョ ryo ぎゃ ギャ gya ぎゅ ギュ gyu ぎょ ギョ gyo じゃ ジャ zya/ja じゅ ジュ yu/ju じょ ジョzyo/jo びゃ ビャ bya びゅ ビュ byu びょ ビョ byo ぴゃ ピャ pya ぴゅ ピュ pyu ぴょ ピョ pyo
标签: 日语
上传时间: 2019-07-19
上传用户:sxc1997
The book you’re holding, physically or electronically, is the result of a very interesting, challenging but also rewarding research project. The research was carried out in different contexts and cooperations but it was centered around the following question: how can we make the RF transmitters of our modern com- munication systems (WiFi, GSM, LTE, and so on) more flexible and more efficient at the same time.
标签: Continuous-Time Front-Ends Digital
上传时间: 2020-05-27
上传用户:shancjb
Providing QoS while optimizing the LTE network in a cost efficient manner is very challenging. Thus, radio scheduling is one of the most important functions in mobile broadband networks. The design of a mobile network radio scheduler holds several objectives that need to be satisfied, for example: the scheduler needs to maximize the radio performance by efficiently distributing the limited radio re- sources, since the operator’s revenue depends on it.
标签: Communications Future Mobile LTE
上传时间: 2020-05-27
上传用户:shancjb
The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.
标签: Communications Physical Security Wireless Layer in
上传时间: 2020-05-31
上传用户:shancjb
To a quantum mechanic the whole universe is one godawful big interacting wavefunction ? but to the rest of us, it’s a world full of separate and distinguishable objects that hurt us when we kick them. At a few months of age, human children recognize objects, expect them to be permanent and move continuously, and display surprise when they aren’t or don’t. We associate visual, tactile, and in some cases audible and olfactory sensations with identifiable physical things. We’re hardwired to understand our environment as being composed of separable things with specific properties and locations. We understand the world in terms of what was where when.
上传时间: 2020-06-08
上传用户:shancjb
Although doing science is at the heart of discovery, the effort would have very limited consequence in the long term without writingscience. As a social enterprise that depends on collaboration, scientific inquiry requires its practi- tioners to write on a regular basis. From time to time, some members of the scientific community have been critical of the overall quality of writing by re- searchers.
标签: Goldbort_Writing Science for
上传时间: 2020-06-09
上传用户:shancjb
Fun. We (your authors) wanted a word to describe our ultimate goal for this book, as well as a word we hope you (our reader) will use to describe it, and that’s the one we chose. There are others goals, of course, but in the end, when you’ve finished the book, we’re hoping you’ll have enjoyed the activities described in these pages. Many books use the Introduction to explain exactly what the book is about, what the reader will learn, what the reader needs (a skill or maybe an item or piece of software), and what the reader will be left with when that last page is completed. And this Introduction will do those things, but … hopefully it’ll make you excited to get started.
标签: Adventures Arduino Station Escape Gemini from
上传时间: 2020-06-09
上传用户:shancjb
We’re living through exciting times. The landscape of what computers can do is changing by the week. Tasks that only a few years ago were thought to require higher cognition are getting solved by machines at near-superhuman levels of per- formance. Tasks such as describing a photographic image with a sentence in idiom- atic English, playing complex strategy game, and diagnosing a tumor from a radiological scan are all approachable now by a computer. Even more impressively, computers acquire the ability to solve such tasks through examples, rather than human-encoded of handcrafted rules.
标签: Deep-Learning-with-PyTorch
上传时间: 2020-06-10
上传用户:shancjb