A new algorithm of Natural Enhancement of Color Image (NECI) is proposed. It is inspired by multiscale Retinex model. There are four steps to realize this enhancement. At first, the image appearance is rendered by con...
详细信息
A new algorithm of Natural Enhancement of Color Image (NECI) is proposed. It is inspired by multiscale Retinex model. There are four steps to realize this enhancement. At first, the image appearance is rendered by content-dependent global mapping for light cast correction, and then a modified Retinex filter is applied to enhance the local contrast. Histogram rescaling is used afterwards for normalization purpose. At last, the texture details of image are enhanced by emphasizing the high-frequency components of image using multichannel decomposition of Cortex Transform. In the contrast enhancement step, luminance channel is firstly enhanced, and then a weighing map is calculated by collecting luminance enhancement information and applied to chrominance channel in color space CIELCh which enables a proportional enhancement of chrominance. It avoids the problem of unbalanced enhancement in classical RGB independent channel operation. In this work, it is believed that image enhancement should avoid dramatic modifications to image such as light condition changes, color temperature alteration, or additional artifacts introduced or amplified. Disregarding light conditions of the scene usually leads to unnaturally sharpened images or dramatic white balance changes. In the proposed method, the ambience of image (warm or cold color impression) is maintained after enhancement, and no additional light sources are added to the scene, and no halo effect and blocking effect are amplified due to overenhancement. It realizes a Natural Enhancement of Color Image. Different types of natural scene images have been tested and an encouraging performance is obtained for the proposed method.
This correction adds a necessary hypothesis in Proposition 2.4 of [1] . A counterexample to the previous version was pointed out to the author by Melda Görür and the author thanks her for bringing that to hi...
详细信息
This correction adds a necessary hypothesis in Proposition 2.4 of [1] . A counterexample to the previous version was pointed out to the author by Melda Görür and the author thanks her for bringing that to his attention. Theorem 3.2 and Corollary 3.3 are also reformulated so they do not refer to the new, more restricted Proposition 2.4.
Bernal et al. provided a necessary and sufficient condition for a linear code to be realized as an ideal in a finite group algebra and De La Cruz and Willems proved a similar result for ideals in twisted group algebra...
详细信息
Bernal et al. provided a necessary and sufficient condition for a linear code to be realized as an ideal in a finite group algebra and De La Cruz and Willems proved a similar result for ideals in twisted group algebras. In this paper, we extend this characterization to crossed products. Furthermore, we determine conditions for some crossed product codes to be self-dual.
A method is given for the construction of linear codes with prescribed minimum distance and also prescribed minimum distance of the dual code. This works for codes over arbitrary finite fields. In the case of binary c...
详细信息
A method is given for the construction of linear codes with prescribed minimum distance and also prescribed minimum distance of the dual code. This works for codes over arbitrary finite fields. In the case of binary codes Matsumoto et al. showed how such codes can be used to construct cryptographic Boolean functions. This new method allows to compute new bounds on the size of such codes, extending the table of Matsumoto et al..
Whilst common genetic variation in many non-coding genomic regulatory regions are known to impart risk of colorectal cancer (CRC), much of the heritability of CRC remains unexplained. To examine the role of recurrent ...
详细信息
Whilst common genetic variation in many non-coding genomic regulatory regions are known to impart risk of colorectal cancer (CRC), much of the heritability of CRC remains unexplained. To examine the role of recurrent coding sequence variation in CRC aetiology, we genotyped 12,638 CRCs cases and 29,045 controls from six European populations. Single-variant analysis identified a coding variant (rs3184504) in SH2B3 (12q24) associated with CRC risk (OR = 1.08, P = 3.9 x 10(-7)), and novel damaging coding variants in 3 genes previously tagged by GWAS efforts;rs16888728 (8q24) in UTP23 (OR = 1.15, P = 1.4 x 10(-7));rs6580742 and rs12303082 (12q13) in FAM186A (OR = 1.11, P = 1.2 x 10(-7) and OR = 1.09, P = 7.4 x 10(-8));rs1129406 (12q13) in ATF1 (OR = 1.11, P = 8.3 x 10(-9)), all reaching exome-wide significance levels. Gene based tests identified associations between CRC and PCDHGA genes (P < 2.90 x 10(-6)). We found an excess of rare, damaging variants in base-excision (P = 2.4 x 10(-4)) and DNA mismatch repair genes (P = 6.1 x 10(-4)) consistent with a recessive mode of inheritance. This study comprehensively explores the contribution of coding sequence variation to CRC risk, identifying associations with coding variation in 4 genes and PCDHG gene cluster and several candidate recessive alleles. However, these findings suggest that recurrent, low-frequency coding variants account for a minority of the unexplained heritability of CRC.
The concept of density in a free monoid can be generalized from the infix relation to arbitrary relations. Many of the properties known for density can be established over these more general notions of densities. In t...
详细信息
The concept of density in a free monoid can be generalized from the infix relation to arbitrary relations. Many of the properties known for density can be established over these more general notions of densities. In this paper, we investigate homomorphisms which preserve different types of density. We demonstrate a strict hierarchy between families of homomorphisms which preserve density over different types of relations. However, as with the case of endomorphisms, a similar hierarchy for weak-coding homomorphisms collapses. We also present an algorithm to decide whether a homomorphism preserves density over any relation which satisfies some natural conditions.
作者:
Yang, ZeTian, YouliangGuizhou Univ
Coll Comp Sci & Technol State Key Lab Publ Big Data Guiyang 550025 Peoples R China Guizhou Univ
Guizhou Prov Key Lab Cryptog & Blockchain Technol Guiyang 550025 Peoples R China
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic r...
详细信息
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.
We present a method for construction of application-specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying the properties of the C code in terms of operation types...
详细信息
We present a method for construction of application-specific processor cores from a given C code. Our approach consists of three phases. We start by quantifying the properties of the C code in terms of operation types, available parallelism, and other metrics. We then create an initial data path to exploit the available parallelism. We then apply designer-guided constraints to an interactive data path refinement algorithm that attempts to reduce the number of the most expensive components while meeting the constraints. Our experimental results show that our technique scales very well with the size of the C code. We demonstrate the efficiency of our technique on wide range of applications, from standard academic benchmarks to industrial size examples like the MP3 decoder. Each processor core was constructed and refined in under a minute, allowing the designer to explore several different configurations in much less time than needed for manual design. We compared our selection algorithm to the manual selection in terms of cost/performance and showed that our optimization technique achieves better cost/performance trade-off. We also synthesized our designs with programmable controller and, on average, the refined core have only 23% latency overhead, twice as many block RAMs and 36% fewer slices compared to the respective manual designs.
In recent years, many connections have been made between minimal codes, a classical object in coding theory, and other remarkable structures in finite geometry and combinatorics. One of the main problems related to mi...
详细信息
In recent years, many connections have been made between minimal codes, a classical object in coding theory, and other remarkable structures in finite geometry and combinatorics. One of the main problems related to minimal codes is to give lower and upper bounds on the length m(k, q) of the shortest minimal codes of a given dimension k over the finite field F-q. It has been recently proved that m(k, q) >= (q + 1)(k - 1).In this note, we prove that lim inf(k ->infinity) m(k,q)/k >= (q + epsilon(q)), where epsilon is an increasing function such that 1.52 < epsilon(2) <= epsilon(q) <= root 2 + 1/2. Hence, the previously known lower bound is not tight for large enough k. We then focus on the binary case and prove some structural results on minimal codes of length 3(k - 1). As a byproduct, we are able to show that, if k = 5 (mod 8) and for other small values of k, the bound is not tight.(c) 2023 Elsevier B.V. All rights reserved.
暂无评论