A new denoising algorithm is proposed according to the characteristics of hyperspectral remote sensing image (HRSI) in the curvelet domain. Firstly, each band of HRSI is transformed into the curvelet domain, and the s...
详细信息
A new denoising algorithm is proposed according to the characteristics of hyperspectral remote sensing image (HRSI) in the curvelet domain. Firstly, each band of HRSI is transformed into the curvelet domain, and the sets of subband images are obtained from different wavelength of HRSI. And then the detail subband images in the same scale and same direction from different wavelengths of HRSI are stacked to obtain new 3-D datacubes of the curvelet domain. Again, the characteristics analysis of these 3-D datacubes is performed. The analysis result shows that each new 3-D datacube has the strong spectral correlation. At last, due to the strong spectral correlation of new 3-D datacubes, the multiple linear regression is introduced to deal with these new 3-D datacubes in the curvelet domain. The simulated and the real data experiments are performed. The simulated data experimental results show that the proposed algorithm is superior to the compared algorithms in the references in terms of SNR. Furthermore, MSE and MSSIM in each band are utilized to show that the proposed algorithm is superior. The real data experimental results show that the proposed algorithm effectively removes the common spotty noise and the strip noise and simultaneously maintains more fine features during the denoising process.
In this paper, a novel kernel-based limited-view computed tomography (CT) reconstruction model is proposed. First based on the classical Feldkamp-Davis-Kress (FDK) algorithm, the reconstruction kernel is derived. Then...
详细信息
In this paper, a novel kernel-based limited-view computed tomography (CT) reconstruction model is proposed. First based on the classical Feldkamp-Davis-Kress (FDK) algorithm, the reconstruction kernel is derived. Then according to the improved approximate inverse for limited view reconstruction, the FDK kernel is truncated to be compact, after which the ring artifacts is reduced. Finally an anisotropic diffusion governed by the Chambolle-Lions equation is introduced to suppress the other artifacts and noise. In the Chambolle-Lions equation, a threshold function is proposed to separate the regions with high or few features adaptively. The efficiency and accuracy of the method are shown in several numerical experiments. (C) 2012 Elsevier Ltd. All rights reserved.
The paper presents a new global three-dimensional model of the Earth thermosphere (for altitudes from 90 to 500 km) with a high spatial resolution. The model uses simple approximations for calculation of solar radiati...
详细信息
The paper presents a new global three-dimensional model of the Earth thermosphere (for altitudes from 90 to 500 km) with a high spatial resolution. The model uses simple approximations for calculation of solar radiation and ion-neutral interaction. A detailed description of the algorithm is presented. It is shown that the model represents the main features of the general thermospheric circulation with a satisfactory accuracy.
Bidirectional singleton arc consistency (BiSAC) which is an extended singleton arc consistency (SAC) has been proposed recently. The first contribution of this paper is to propose and prove two theorems of BiSAC theor...
详细信息
Bidirectional singleton arc consistency (BiSAC) which is an extended singleton arc consistency (SAC) has been proposed recently. The first contribution of this paper is to propose and prove two theorems of BiSAC theoretically (one is a property of BiSAC and the other is the property of allowing the deletion of some BiSAC-inconsistent values). Secondly, based on these properties we present two algorithms, denoted by BiSAC-DF and BiSAC-DP, to enforce BiSAC. Also, we prove their correctness and analyze the space and time complexity of them in detail. Besides, for special circumstances, we show that BiSAC-DF admits a worst-case time complexity in O(en(2)d(4)) and a best one in O(en(2)d(3)) when the problem is an already BiSAC, while BiSAC-DP also has the same best one when the tightness is small. Finally, experiments on a wide range of CSP instances show BiSAC-DF and BiSAC-DP are usually around one order of magnitude faster than the existing BiSAC-1. For some special instances, BiSAC-DP is about two orders of magnitude efficient.
To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, we present Osiris system which is a tool to capture behaviors of executable files in Windows system. It colle...
详细信息
To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, we present Osiris system which is a tool to capture behaviors of executable files in Windows system. It collects API calls invoked not only by main process of the analysis file, but also API calls invoked by child processes which are created by main process, injected processes if process injection happens, and service processes if the main process creates services. By modifying the source code of Qemu, Osiris is implemented at the virtual machine monitor layer and has the following advantages. First, it does not rewrite the binary code of analysis file or interfere with its normal execution, so that behavior data are obtained more stealthily and transparently. Second, it employs a multi-virtual machine framework to simulate the network environment for malware analysis, so that network behaviors of a malware are stimulated to a large extend. Third, besides network environment, it also simulates most common host events to stimulate potential malicious behaviors of a malware. The experimental results show that Osiris automates the malware analysis process and provides good behavior data for the following detection algorithm.
This paper proposes a scheme with innovation both in algorithm and method to construct and display three-dimensional (3D) objects. We reduce the number of needed images to establish the complete 3D objects by combinin...
详细信息
This paper proposes a scheme with innovation both in algorithm and method to construct and display three-dimensional (3D) objects. We reduce the number of needed images to establish the complete 3D objects by combining Wide Baseline Matching and 3D registration algorithm. We reduce the loss of edge and corner information by applying line detection and guided matching in Narrow Baseline Matching. We perform projective reconstruction with a dynamic threshold, and eliminate the ambiguity in Euclidean reconstruction by motion consistency constraint. We propose a fast linear method for motion calculation to recover the motion of key frames with a succinct method to obtain motion vector by solving linear equation set. We adopt a novel display system, which features high refresh rate, large size and high intensity screen, to provide live display of 3D objects. (C) 2012 Elsevier Ltd. All rights reserved.
The research aims to simulate feedback controlled nerve fiber stimulation where the behavior of the nerve fiber is manipulated by an electrical field generator. The feedback law varies the intensity of the electric fi...
详细信息
The research aims to simulate feedback controlled nerve fiber stimulation where the behavior of the nerve fiber is manipulated by an electrical field generator. The feedback law varies the intensity of the electric field across the membrane of the fiber according to the measured fiber membrane potential. The Hodgkin-Huxley nerve fiber model is used for modeling the membrane potential behavior. The introduced feedback control algorithm controls the bifurcation conditions of the fiber so that the repetitive firing events vanish as a result of stimulation. The feedback control law is based on a washout filter designed by projective control theory. (C) 2013 Elsevier Ltd. All rights reserved.
作者:
Liu, YanhengRen, AnSun, DayangWang, AiminJilin Univ
Coll Comp Sci & Technol Changchun 130012 Jilin Peoples R China Jilin Univ
Minist Educ Key Lab Symbol Computat & Knowledge Engn Changchun 130012 Jilin Peoples R China Jilin Univ
Coll Commun Engn Changchun 130012 Jilin Peoples R China
A proactive topology control algorithm named PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) is proposed for solving the problem of network partitioning. The algorithm controls the starting of BFS (...
详细信息
A proactive topology control algorithm named PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) is proposed for solving the problem of network partitioning. The algorithm controls the starting of BFS (Breadth-First Search) by recognizing the addition of invalid nodes, monitoring the network structure dynamically. The definition, 'Communication Quality', is proposed to measure the quality of communications link. Only after network partitioning happens does PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) start the link rebuilding mechanism to maintain the topology. The algorithm restrains isolated nodes generation and makes the energy be used efficiently. The results show that PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) not only improves the efficiency of the energy, but also constructs a robust topology. (C) 2013 Elsevier Ltd. All rights reserved.
The Jigsaw Distributed File System (JigDFS) aims to securely store and retrieve files on large scale networks. The design of JigDFS is driven by the privacy needs of its users. Files in JigDFS are sliced into small se...
详细信息
The Jigsaw Distributed File System (JigDFS) aims to securely store and retrieve files on large scale networks. The design of JigDFS is driven by the privacy needs of its users. Files in JigDFS are sliced into small segments using an Information Dispersal Algorithm (IDA) and distributed onto different nodes recursively. JigDFS provides fault-tolerance against node failures while assuring confidentiality, integrity, and availability of the stored data. Layered encryption is applied to each file segment with keys produced by a hashed-key chain algorithm. Recursive IDA and layered encryption enhance users' anonymity and provide a degree of plausible deniability. JigDFS is envisioned to be an ideal long-term storage solution for developing secure data archiving systems. (C) 2013 Elsevier Ltd. All rights reserved.
In this paper we develop efficient numerical schemes to solve ordinary differential equations. Our methods are of the Nordsieck type, adaptive and capable of automatically controlling the global error of a numerical s...
详细信息
In this paper we develop efficient numerical schemes to solve ordinary differential equations. Our methods are of the Nordsieck type, adaptive and capable of automatically controlling the global error of a numerical solution. A special feature of the new stepsize selection algorithms introduced here is the global error estimation quality control. Two different ways of attaining the preassigned accuracy of computation are examined in the paper. Namely, we implement the global error control mechanism based on reducing the maximum stepsize bound and the other one is based on reducing the local error tolerance. An accurate starting procedure for the adaptive Nordsieck methods is presented in full detail. Our intention here is to find the most effective strategy of stepsize selection. Theoretical investigation is supplied with numerical tests.
暂无评论