A new multidimensional data structure, multidimensional tree (MD-tree), is proposed. The MD-tree is developed by extending the concept of the B-tree to the multidimensional data, so that the MD-tree is a height balanc...
详细信息
A new multidimensional data structure, multidimensional tree (MD-tree), is proposed. The MD-tree is developed by extending the concept of the B-tree to the multidimensional data, so that the MD-tree is a height balanced tree similar to the B-tree. The theoretical worst-case storage utilization is guaranteed to hold more than 66.7%(2/3) of full capacity. In this paper, the structure of the MD-tree and the algorithms to perform the insertion, deletion, and spatial searching am described. By the series of simulation tests, the performances of the MD-tree and conventional methods are compared. The results indicate that storage utilization is more than 80% in practice, and that retrieval performance and dynamic characteristics are superior to conventional methods.
This work addresses the problem of fingerprint retrieval in a large database. Traditional approaches adopt exclusive classification of fingerprints;the paper shows that a continuous classification can improve the perf...
详细信息
This work addresses the problem of fingerprint retrieval in a large database. Traditional approaches adopt exclusive classification of fingerprints;the paper shows that a continuous classification can improve the performance of fingerprint retrieval tasks significantly. The proposed approach is based on the extraction of numerical vectors from the directional images of the fingerprints;the retrieval is thus performed in a multidimensional space by using similarity criteria. (C) 1997 Elsevier Science B.V.
In this paper, a level compression-based image representation (LCBIR) is presented. This new image representation method improves the bintree representation for compressing digital binary images. Then we present a fas...
详细信息
In this paper, a level compression-based image representation (LCBIR) is presented. This new image representation method improves the bintree representation for compressing digital binary images. Then we present a fast search algorithm on the LCBIR, which can support fast search and query in pictorial database. Experimental results show that our search algorithm on the LCBIR is faster than the one on the bintree representation.
Remotely sensed measures of productivity are frequently used to characterize global agriculture and vegetated ecosystems, and are often downscaled to describe local, remote areas where finer spatial and temporal resol...
详细信息
Remotely sensed measures of productivity are frequently used to characterize global agriculture and vegetated ecosystems, and are often downscaled to describe local, remote areas where finer spatial and temporal resolution data are regularly unavailable. While data errors may propagate throughout any analytical procedure, those that are missed during delivery and preliminary data mining require more attention. Here, a collection of formerly and presently available global remote sensing products are compiled to demonstrate the temporal and geographic breadth of remote sensing uncertainty. Vegetation productivity measures are invaluable for monitoring global health, but erroneous estimates that go unrecognized may result in serious policy mistakes. It is eminently clear that generalizable and accessible a priori methods for anomaly detection are lacking and urgently needed so that data errors are recognized before public delivery and before widespread use. Simple yet effective statistics such as the modified Z-score, Tukey's outliers, and Geary's C are leveraged here to identify, locate, and visualize the types of outliers that remote sensing data users may elect to omit or correct. Contributing to the growing ensemble of Google Earth Engine methodologies, we propose this generalizable method of detecting spatial outliers for remote sensing error management by users across scientific domains.
The Growing Neural Gas algorithm (GNG) is a well-known classification algorithm that is capable of capturing topological relationships that exist in the input data. Unfortunately, simple implementations of the GNG alg...
详细信息
The Growing Neural Gas algorithm (GNG) is a well-known classification algorithm that is capable of capturing topological relationships that exist in the input data. Unfortunately, simple implementations of the GNG algorithm have time complexity O(n(2)), where n is the number of nodes in the graph. This fact makes these implementations impractical for use in production environments where large data sets are used. This paper aims to propose an optimized implementation that breaks the O(n(2)) barrier and that addresses data in high-dimensional spaces without changing the GNG semantics. The experimental results show speedups of over 50 times for graphs with 200,000 nodes. (C) 2013 Elsevier B.V. All rights reserved.
Traffic-monitoring systems (TMSs) are vital for safety and traffic optimization. However, these systems may compromise the privacy of drivers once they track the position of each driver with a high degree of temporal ...
详细信息
Traffic-monitoring systems (TMSs) are vital for safety and traffic optimization. However, these systems may compromise the privacy of drivers once they track the position of each driver with a high degree of temporal precision. In this paper, we argue that aggregated data can protect location privacy while providing accurate information for traffic monitoring. We identify a range of aggregate query types. Our proposed privacy-aware monitoring system (PAMS) works as an aggregate query processor that protects the location privacy of drivers as it anonymizes the IDs of cars. Our experiments show that PAMS answers queries with high accuracy and efficiency.
A storing of spatialdata and processing of spatial queries are important tasks for modern data-bases. The execution efficiency of spatial query depends on underlying index structure. R-tree is a well-known spatial in...
详细信息
A storing of spatialdata and processing of spatial queries are important tasks for modern data-bases. The execution efficiency of spatial query depends on underlying index structure. R-tree is a well-known spatial index structure. Currently there exist various versions of R-tree, and one of the most common variations between them is node splitting algorithm. The problem of node splitting in one-dimensional R-tree may seem to be too trivial to be considered separately. One-dimensional intervals can be split on the base of their sorting. Some of the node splitting algorithms for R-tree with two or more dimensions comprise one-dimensional split as their part. However, under detailed consideration, existing algorithms for one-dimensional split do not perform ideally in some complicated cases. This paper introduces a novel one-dimensional node splitting algorithm based on two sortings that can handle such complicated cases better. Also this paper introduces node splitting algorithm for R-tree with two or more dimensions that is based on the one-dimensional algorithm mentioned above. The tests show significantly better behavior of the proposed algorithms in the case of highly overlapping data.
Advances in computational methods and hardware platforms provide efficient processing of medical-imaging datasets for surgical planning. For neurosurgical interventions employing a straight access path, planning entai...
详细信息
Advances in computational methods and hardware platforms provide efficient processing of medical-imaging datasets for surgical planning. For neurosurgical interventions employing a straight access path, planning entails selecting a path from the scalp to the target area that's of minimal risk to the patient. A proposed GPU-accelerated method enables interactive quantitative estimation of the risk for a particular path. It exploits acceleration spatial data structures and efficient implementation of algorithms on GPUs. In evaluations of its computational efficiency and scalability, it achieved interactive rates even for high-resolution meshes. A user study and feedback from neurosurgeons identified this methods' potential benefits for preoperative planning and intraoperative replanning.
Using bincodes to represent binary images is shown to be very simple and storage-saving. Given a set of bincodes, this paper presents two improved codes, namely, the logicodes and the restricted logicodes to represent...
详细信息
Using bincodes to represent binary images is shown to be very simple and storage-saving. Given a set of bincodes, this paper presents two improved codes, namely, the logicodes and the restricted logicodes to represent binary images. We first transform the given bincodes into a set of logical expressions. Then a minimization technique is employed to reduce the storage space required for these logical expressions, thus obtaining the logicodes, on which set operations can be applied directly. Further, we put some restrictions into these logicodes to make each resulting logicode, called the restricted logicode, representing a connected black block. Given 20 different-type real images, experimental results show that our logicodes (restricted logicodes) present a saving of 29% to 44% (12% to 34%) with respect to bincodes. When compared to Sarkar's method, except spending a little more space, our proposed codes do have three advantages: (1) it is easier to extract the related geometrical coordinates;(2) the bincodes can be used as direct input;i.e., they do compress the bincodes further;and (3) each restricted logicode represents a connected block block. (C) 1997 Academic Press.
This paper advocates protecting software copyright through hiding watermarks in various datastructures used by the code, e.g., B+-trees, R-trees, linked lists, etc. Prior proposals hide the watermarks in dummy data s...
详细信息
This paper advocates protecting software copyright through hiding watermarks in various datastructures used by the code, e.g., B+-trees, R-trees, linked lists, etc. Prior proposals hide the watermarks in dummy datastructures, e.g., linked lists and graphs that are created, solely for this reason, during the execution of the hosting software. This makes them vulnerable to subtractive attacks, because the attacker can remove the dummy datastructures without altering the functionality or the semantic of the software program. We argue that hiding watermarks in one or more datastructures that are used by the program would make the watermark more robust because disturbing the watermark would affect the semantic and the functionality of the underlying software. The challenge is that the insertion of the watermark should have a minimal effect on the operations and performance of the data structure. This paper proposes a novel method for watermarking R-tree data structure and its variants. The proposed watermarking technique does not change the values of the stored data objects. It takes advantage of the redundancy in the order of entries inside the R-tree nodes. Entries are arranged relative to a "secret" initial order, known only to the software owner, using a technique based on a numbering system that uses variable radix with factorial base. The addition of the watermark in the R-tree data structure does not affect the performance nor does it increase the size of the R-tree. The paper provides a detailed security analysis and performance evaluation to show that the embedded watermarks are robust and can withstand various types of attacks. (C) 2009 Elsevier Ltd. All rights reserved.
暂无评论