We propose a branch and bound reduced algorithm for quadratic programming problems with quadratic constraints. In this algorithm, we determine the lower bound of the optimal value of original problem by constructing a...
详细信息
We propose a branch and bound reduced algorithm for quadratic programming problems with quadratic constraints. In this algorithm, we determine the lower bound of the optimal value of original problem by constructing a linear relaxation programming problem. At the same time, in order to improve the degree of approximation and the convergence rate of acceleration, a rectangular reduction strategy is used in the algorithm. Numerical experiments show that the proposed algorithm is feasible and effective and can solve small-and medium-sized problems.
In this paper, a novel kernel-based limited-view computed tomography (CT) reconstruction model is proposed. First based on the classical Feldkamp-Davis-Kress (FDK) algorithm, the reconstruction kernel is derived. Then...
详细信息
In this paper, a novel kernel-based limited-view computed tomography (CT) reconstruction model is proposed. First based on the classical Feldkamp-Davis-Kress (FDK) algorithm, the reconstruction kernel is derived. Then according to the improved approximate inverse for limited view reconstruction, the FDK kernel is truncated to be compact, after which the ring artifacts is reduced. Finally an anisotropic diffusion governed by the Chambolle-Lions equation is introduced to suppress the other artifacts and noise. In the Chambolle-Lions equation, a threshold function is proposed to separate the regions with high or few features adaptively. The efficiency and accuracy of the method are shown in several numerical experiments. (C) 2012 Elsevier Ltd. All rights reserved.
A new denoising algorithm is proposed according to the characteristics of hyperspectral remote sensing image (HRSI) in the curvelet domain. Firstly, each band of HRSI is transformed into the curvelet domain, and the s...
详细信息
A new denoising algorithm is proposed according to the characteristics of hyperspectral remote sensing image (HRSI) in the curvelet domain. Firstly, each band of HRSI is transformed into the curvelet domain, and the sets of subband images are obtained from different wavelength of HRSI. And then the detail subband images in the same scale and same direction from different wavelengths of HRSI are stacked to obtain new 3-D datacubes of the curvelet domain. Again, the characteristics analysis of these 3-D datacubes is performed. The analysis result shows that each new 3-D datacube has the strong spectral correlation. At last, due to the strong spectral correlation of new 3-D datacubes, the multiple linear regression is introduced to deal with these new 3-D datacubes in the curvelet domain. The simulated and the real data experiments are performed. The simulated data experimental results show that the proposed algorithm is superior to the compared algorithms in the references in terms of SNR. Furthermore, MSE and MSSIM in each band are utilized to show that the proposed algorithm is superior. The real data experimental results show that the proposed algorithm effectively removes the common spotty noise and the strip noise and simultaneously maintains more fine features during the denoising process.
The paper presents a new global three-dimensional model of the Earth thermosphere (for altitudes from 90 to 500 km) with a high spatial resolution. The model uses simple approximations for calculation of solar radiati...
详细信息
The paper presents a new global three-dimensional model of the Earth thermosphere (for altitudes from 90 to 500 km) with a high spatial resolution. The model uses simple approximations for calculation of solar radiation and ion-neutral interaction. A detailed description of the algorithm is presented. It is shown that the model represents the main features of the general thermospheric circulation with a satisfactory accuracy.
To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, we present Osiris system which is a tool to capture behaviors of executable files in Windows system. It colle...
详细信息
To perform behavior based malware analysis, behavior capturing is an important prerequisite. In this paper, we present Osiris system which is a tool to capture behaviors of executable files in Windows system. It collects API calls invoked not only by main process of the analysis file, but also API calls invoked by child processes which are created by main process, injected processes if process injection happens, and service processes if the main process creates services. By modifying the source code of Qemu, Osiris is implemented at the virtual machine monitor layer and has the following advantages. First, it does not rewrite the binary code of analysis file or interfere with its normal execution, so that behavior data are obtained more stealthily and transparently. Second, it employs a multi-virtual machine framework to simulate the network environment for malware analysis, so that network behaviors of a malware are stimulated to a large extend. Third, besides network environment, it also simulates most common host events to stimulate potential malicious behaviors of a malware. The experimental results show that Osiris automates the malware analysis process and provides good behavior data for the following detection algorithm.
The research aims to simulate feedback controlled nerve fiber stimulation where the behavior of the nerve fiber is manipulated by an electrical field generator. The feedback law varies the intensity of the electric fi...
详细信息
The research aims to simulate feedback controlled nerve fiber stimulation where the behavior of the nerve fiber is manipulated by an electrical field generator. The feedback law varies the intensity of the electric field across the membrane of the fiber according to the measured fiber membrane potential. The Hodgkin-Huxley nerve fiber model is used for modeling the membrane potential behavior. The introduced feedback control algorithm controls the bifurcation conditions of the fiber so that the repetitive firing events vanish as a result of stimulation. The feedback control law is based on a washout filter designed by projective control theory. (C) 2013 Elsevier Ltd. All rights reserved.
The Jigsaw Distributed File System (JigDFS) aims to securely store and retrieve files on large scale networks. The design of JigDFS is driven by the privacy needs of its users. Files in JigDFS are sliced into small se...
详细信息
The Jigsaw Distributed File System (JigDFS) aims to securely store and retrieve files on large scale networks. The design of JigDFS is driven by the privacy needs of its users. Files in JigDFS are sliced into small segments using an Information Dispersal Algorithm (IDA) and distributed onto different nodes recursively. JigDFS provides fault-tolerance against node failures while assuring confidentiality, integrity, and availability of the stored data. Layered encryption is applied to each file segment with keys produced by a hashed-key chain algorithm. Recursive IDA and layered encryption enhance users' anonymity and provide a degree of plausible deniability. JigDFS is envisioned to be an ideal long-term storage solution for developing secure data archiving systems. (C) 2013 Elsevier Ltd. All rights reserved.
This study proposes a new method for the detection of local invariant features with contour. This method differs from traditional methods that use image intensity. Image contours can be extracted stably with changes i...
详细信息
This study proposes a new method for the detection of local invariant features with contour. This method differs from traditional methods that use image intensity. Image contours can be extracted stably with changes in viewpoint, scale, illumination and other factors. The proposed algorithm first extracts the stable corner from the contour, then it fits the supporting region of the contour near the corner to an angle, and uses its bisector as the direction of the feature. Next, it searches the contour for the tangent point in the direction of the angle bisector. Finally, with the corner as the centre, and in combination with the tangent point and the feature direction, an elliptic invariant region is constructed. The feasibility of the algorithm was verified experimentally by comparing its repetition rate. Test images obtained from actual scenes include several types of transformations, such as rotation, scaling, affinity, illumination and noise. The results of the experiment show the feasibility of the proposed method for use in local invariant features detection.
作者:
Liu, YanhengRen, AnSun, DayangWang, AiminJilin Univ
Coll Comp Sci & Technol Changchun 130012 Jilin Peoples R China Jilin Univ
Minist Educ Key Lab Symbol Computat & Knowledge Engn Changchun 130012 Jilin Peoples R China Jilin Univ
Coll Commun Engn Changchun 130012 Jilin Peoples R China
A proactive topology control algorithm named PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) is proposed for solving the problem of network partitioning. The algorithm controls the starting of BFS (...
详细信息
A proactive topology control algorithm named PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) is proposed for solving the problem of network partitioning. The algorithm controls the starting of BFS (Breadth-First Search) by recognizing the addition of invalid nodes, monitoring the network structure dynamically. The definition, 'Communication Quality', is proposed to measure the quality of communications link. Only after network partitioning happens does PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) start the link rebuilding mechanism to maintain the topology. The algorithm restrains isolated nodes generation and makes the energy be used efficiently. The results show that PMD (Proactive Maintaining Algorithm for Dynamic Topology Control) not only improves the efficiency of the energy, but also constructs a robust topology. (C) 2013 Elsevier Ltd. All rights reserved.
This paper proposes a scheme with innovation both in algorithm and method to construct and display three-dimensional (3D) objects. We reduce the number of needed images to establish the complete 3D objects by combinin...
详细信息
This paper proposes a scheme with innovation both in algorithm and method to construct and display three-dimensional (3D) objects. We reduce the number of needed images to establish the complete 3D objects by combining Wide Baseline Matching and 3D registration algorithm. We reduce the loss of edge and corner information by applying line detection and guided matching in Narrow Baseline Matching. We perform projective reconstruction with a dynamic threshold, and eliminate the ambiguity in Euclidean reconstruction by motion consistency constraint. We propose a fast linear method for motion calculation to recover the motion of key frames with a succinct method to obtain motion vector by solving linear equation set. We adopt a novel display system, which features high refresh rate, large size and high intensity screen, to provide live display of 3D objects. (C) 2012 Elsevier Ltd. All rights reserved.
暂无评论