Registration of in vivo microscopy image sequences is important for tracking of cells. Registering a long sequence of in vivo microscopy images is particularly challenging for several reasons, which include motion art...
详细信息
ISBN:
(纸本)9781479957521
Registration of in vivo microscopy image sequences is important for tracking of cells. Registering a long sequence of in vivo microscopy images is particularly challenging for several reasons, which include motion artifacts created by the cardiac cycle and breathing movements of the living subject, occasional defocussing, illumination change, and noise in image acquisition. To accommodate these variations, we sample time points redundantly during microscopic image acquisition. Second, we use dynamic programming to select image frames with tolerable motion and eliminate those with large motion. Third, we employ a novel method based on the minimum spanning tree algorithm to register the selected image frames. Testing on actual in vivo image sequences reveals that our approach excels over three existing registration methods in terms of structural image similarity of the registered images.
A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work...
详细信息
Registration of in vivo microscopy image sequences is important for tracking of cells. Registering a long sequence of in vivo microscopy images is particularly challenging for several reasons, which include motion art...
详细信息
In this article a method for the detection of broken rotor bars in asynchronous machines operating under full load is presented. Unlike most Motor Current Signature Analysis (MCSA) approaches, which operate in the fre...
详细信息
ISBN:
(纸本)9781479940318
In this article a method for the detection of broken rotor bars in asynchronous machines operating under full load is presented. Unlike most Motor Current Signature Analysis (MCSA) approaches, which operate in the frequency domain, our method operates in the time domain. The scheme is based on the use of a Principal Component Analysis (PCA) fault/anomaly detector. PCA is applied on the three stator currents to subsequently calculate the Q statistic which is employed for detecting the presence/absence of a fault. The efficiency of the proposed scheme was experimentally evaluated using different fault severity levels, ranging from 1/4 of a broken bar to three broken bars. The obtained results indicate that the method can detect the caused asymmetry with a very restricted amount of data.
Slime mould Physarum polycephalum is a single cell that is visible by the unaided eye. When spanning sources of nutrients the slime mould builds a network of protoplasmic tubes which is sometimes considered to be opti...
详细信息
Slime mould Physarum polycephalum is a single cell that is visible by the unaided eye. When spanning sources of nutrients the slime mould builds a network of protoplasmic tubes which is sometimes considered to be optimal in terms of the minimization of metabolite transportation time and distance away from repellents. Previously we have shown that the slime mould is efficient in imitating the formation of man-made road networks in major countries, where major urban areas are sources of nutrients. We used a similar approach to grow slime mould on a three-dimensional template of the Moon to speculate on potential colonisation scenarios. The slime mould imitated the propagation of colonisation in an exploratory mode, i.e. without any definite targets. Additional transportation hubs/targets were added after the initial network was formed, to imitate the development of colonies in parallel with slime mould growth. We provide analyses of proximity graphs representing colonisation networks and support the findings with Physarum-inspired algorithms to inform supply chain design. We speculate on how living Physarum, or its incorporation into a polymer hybrid material, can be used as a wearable smart wetware based on laboratory experiments interacting with chemical components.
Interacting with a random environment, Learning Automata (LAs) are automata that, generally, have the task of learning the optimal action based on responses from the environment. Distinct from the traditional goal of ...
详细信息
ISBN:
(纸本)9781479938414
Interacting with a random environment, Learning Automata (LAs) are automata that, generally, have the task of learning the optimal action based on responses from the environment. Distinct from the traditional goal of Learning Automata to select only the optimal action out of a set of actions, this paper considers a multiple-action selection problem and proposes a novel class of Learning Automata for selecting an optimal subset of actions. Their objective is to identify the optimal subset: the top k out of r actions. Based on conventional continuous pursuit and discretized pursuit learning schemes, this paper introduces four pursuit learning schemes for selecting the optimal subset, called continuous equal pursuit, discretized equal pursuit, continuous unequal pursuit and discretized unequal pursuit learning schemes, respectively. In conjunction with a reward-inaction learning paradigm, the above four schemes lead to four versions of pursuit Learning Automata for selecting the optimal subset. The simulation results present a quantitative comparison between them.
RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless commu...
详细信息
RF fingerprinting aims to develop a unique RF fingerprint for a wireless device that can be used as an identity, in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. This is in contrast to the traditional bit-level algorithmic approaches to securing transmissions. In this work, we present a comprehensive overview of challenges in the deployment of RF fingerprinting in low-cost portable mobile devices including: the preliminary results showing the effect of channel impairments on RF fingerprinting accuracy and open research challenges associated with the deployment of RF fingerprinting.
In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical la...
详细信息
In conventional wireless networks, security issues are primarily considered above the physical layer and are usually based on bit-level algorithms to establish the identity of a legitimate wireless device. Physical layer security is a new paradigm in which features extracted from an analog signal can be used to establish the unique identity of a transmitter. Our previous research work into RF fingerprinting has shown that every transmitter has a unique RF fingerprint owing to imperfections in the analog components present in the RF front end. Generally, it is believed that the RF fingerprint of a specific transmitter is same across all receivers. That is, a fingerprint created in one receiver can be transported to another receiver to establish the identity of a transmitter. However, to the best of the author's knowledge, no such example is available in the literature in which an RF fingerprint generated in one receiver is used for identification in other receivers. This paper presents the results of experiments, and analyzing the feasibility of using an universal RF fingerprint of a transmitter for identification across different receivers.
We discuss pseudo Wigner-Ville distribution based phase derivative estimation techniques in digital holographic interferometry. These techniques address the major challenges associated with measuring phase derivatives...
详细信息
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and ...
详细信息
ISBN:
(纸本)9781479947164
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and probability intervals capture the probabilistic dependencies among multiple AUs. The structure of CN is designed based on prior knowledge. The parameters of CN are learned from both knowledge and ground-truth AU labels. The AU preliminary estimations are obtained by an existing image-driven recognition method. With the learned credal network, we infer the true AU labels by combining the relationships among labels with the previous obtained estimations. Experimental results on the CK+ database and MMI database demonstrate that with complete AU labels, our CN model is slightly better than the Bayesian Network (BN) model, demonstrating that credal sets learned from data can capture uncertainty more reliably;With incomplete and error-prone AU annotations, our CN model outperforms the BN model, indicating that credal sets can successfully capture qualitative knowledge.
暂无评论