The 3S (Shrinking-Search-Space) multi-thresholding method which have been used for segmentation of medical images according to their intensities, now have been implemented and compared with FCM method in terms of segm...
详细信息
The 3S (Shrinking-Search-Space) multi-thresholding method which have been used for segmentation of medical images according to their intensities, now have been implemented and compared with FCM method in terms of segmentation quality and segmentation time as a benchmark in thresholding. The results show that 3S method produced almost the same segmentation quality or in some occasions better quality than FCM, and the computation time of 3S method is much lower than FCM. This is another superiority of this method with respect to others. Also, the performance of C-means has been compared with two other methods. This comparison shows that, C-means is not a reliable clustering algorithm and it needs several run to give us a reliable result.
This paper describes about an automated microscopic imaging system for supporting asbestos qualitative analysis. By JIS (Japanese Industrial Standards), the dispersion staining method is designated as a visual qualita...
详细信息
This paper describes about an automated microscopic imaging system for supporting asbestos qualitative analysis. By JIS (Japanese Industrial Standards), the dispersion staining method is designated as a visual qualitative analysis for asbestos in the construction materials. In the analysis process using the microscope, the expert monitors the particles including asbestos fibers and count them. For supporting such observation process, we developed an automated microscopic image collecting system. It realizes to take the images of the target area and store them to the database automatically. In this paper, we introduce and report the prototype system and its performance.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modif...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modified *** propose a novel approach of substitution technique of audio *** genetic algorithm,message bits are embedded into multiple,vague and higher LSB layers,resulting in increased *** robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Various cryptosystems use exhaustive techniques to search the key space. Such search techniques should be guided in order to be computationally adequate. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysi...
详细信息
Various cryptosystems use exhaustive techniques to search the key space. Such search techniques should be guided in order to be computationally adequate. Here, a Genetic Algorithm, GA, is proposed for the cryptanalysis of DES-like systems to find out the underlying key. The genetic algorithm approach is adopted, for obtaining the exact key by forming an initial population of keys that belong to the key subspace. In the proposed algorithms the premature convergence could be avoided by dynamic variation of control parameters that can affect the fitness function. In this paper a new method has been developed for the first time to break DES-like examples. These ex-amples include both DES and FEAL with eight rounds. The performance of the propsed method, as such, is con-siderably faster than exhaustive search and differential cryptanalysis, DC. Therefore, it can be directly applied to a variety of DES-like systems instead of the current DC techniques.
In a wireless LAN, since two or more terminals in a service area do the random access in a signal channel, it is necessary to achieve an efficient access that reduces the frame collision. Under the standard IEEE 802.1...
详细信息
Plane gratings with small periodicity must be approximated by equivalent surface resistive sheet. In this paper, uniform approximation of equivalent surface resistance is considered for electromagnetic scattering prob...
详细信息
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC...
详细信息
ISBN:
(纸本)9781424423149
Due to environmental mismatch, speech recognition systems often exhibit drastic performance degradation in noisy conditions. This paper presents a model-based technique termed Adaptive Parallel Model Combination (APMC) which compensates the initial acoustic models to reduce the discrepancy. APMC used the well-known PMC technique to composite a set of corrupted speech models, while fine tuning the mean parameter of the models using a transformation-based adaptation technique called Maximum Likelihood Spectral Transformation (MLST). Evaluated on a context-independent phone recognition task, APMC was found to be superior to both PMC and MLST, especially in non-stationary noisy conditions. On average, APMC has achieved 48.81% improvement over the initial models, whereas PMC and MLST have improved the accuracy by 34.12% and 35.23% respectively.
There have been proposed several dynamic load-balancing methods for web server clusters. In order to realize an effective load-balancing, they have required an almost real-time server load information which could be o...
详细信息
Producing software that is adaptable to the rapid environmental changes and the dynamic nature of the business life-cycle is extensively becoming a topical issue in the software evolution. In this context, change prop...
详细信息
We propose an intuitive computer graphics authoring method based on interactive evolutionary computation (IEC). Our previous systems employed genetic algorithm (GA) and mainly focused on rapid exploration of a single ...
详细信息
暂无评论