The purpose of this study is to present an application of a novel enhancement technique for enhancing medical images generated from X-rays. The method presented in this study is based on a nonlinear partial differenti...
详细信息
The purpose of this study is to
present an application of a novel enhancement technique for enhancing medical images generated from X-rays. The method presented in this study is based on a nonlinear partial differential equation (PDE) model, Kramer's PDE model. The usefulness of this method is investigated by experimental results. We apply this method to a medical X-ray image. For comparison, the X-ray image is also processed using classic Perona-Malik PDE model and Catte PDE model. Although the Perona-Malik model and Catte PDE model could also enhance the image, the quality of the enhanced images is considerably inferior compared with the enhanced image using Kramer's PDE model. The study suggests that the Kramer's PDE model is capable of enhancing medical X-ray images, which will make the X-ray images more reliable.
The purpose of this study is to present an application of a novel enhancement technique for enhancing medical images generated from X-rays. The method presented in this study is based on a nonlinear partial differenti...
详细信息
The purpose of this study is to present an application of a novel enhancement technique for enhancing medical images generated from X-rays. The method presented in this study is based on a nonlinear partial differential equation (PDE) model, Kramer’s PDE model. The usefulness of this method is investigated by experimental results. We apply this method to a medical X-ray image. For comparison, the X-ray image is also processed using classic Perona-Malik PDE model and Catte PDE model. Although the Perona-Malik model and Catte PDE model could also enhance the image, the quality of the enhanced images is considerably inferior compared with the enhanced image using Kramer’s PDE model. The study suggests that the Kramer’s PDE model is capable of enhancing medical X-ray images, which will make the X-ray images more reliable.
Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization sp...
详细信息
The multifractal spectrum of protein feature sequences was computed and analyzed with the multifractal. The parameters of multifractal spectra were used to describe hierarchically refined structure of protein feature ...
详细信息
ISBN:
(纸本)7900719229
The multifractal spectrum of protein feature sequences was computed and analyzed with the multifractal. The parameters of multifractal spectra were used to describe hierarchically refined structure of protein feature sequences and pop out the singularity of local sequences. And with using quotient space granularity computing theory power gene a of multifractal was chosen wilder. Constructing 2D space, and it presented good efficiency in structure classing, which is favor of predicting protein structure class.
Engineering optimization in the intelligence swarm remains to be a challenge. Recently, a novel optimization method based on number-theory and particle swarm, good lattice swarm optimization algorithm(GLSO), is introd...
详细信息
Engineering optimization in the intelligence swarm remains to be a challenge. Recently, a novel optimization method based on number-theory and particle swarm, good lattice swarm optimization algorithm(GLSO), is introduced, which intends to produce faster and better global search ability and more accurate convergence because it has a solid theoretical basis. In this paper, four models of constructing good point set are introduced and the GLSO based on new models is rewritten. Some applications of the new model on constrained engineering via employing a penalty function approach suggest that the presented algorithm is potentially a powerful search technique for solving complex engineering design optimization problems.
In this paper, we introduce the sub-Gaussian random projection into compressed sensing (CS) theory and present two new kinds of CS measurement matrices: sparse projection matrix and very sparse projection matrix. By t...
详细信息
In this paper, we introduce the sub-Gaussian random projection into compressed sensing (CS) theory and present two new kinds of CS measurement matrices: sparse projection matrix and very sparse projection matrix. By the tail bounds for sub-Gaussian random projection, we present the proof of how these new matrices satisfying the necessary condition for CS measurement matrix. Further, we expatiate that owe to their sparsity, new matrices greatly simplify the projection operation during images reconstruction, which greatly improves the speed of reconstruction. The results of simulated and real experiments show that with a certain number of measurements, new matrices both achieve good measurement effect and can acquire exact reconstruction by them. Last, the comparison of reconstruction results respectively adopting new matrices and Gaussian measurement matrix is conducted.
We demonstrate a new algorithm named FlexStem to predict RNA secondary structures with pseudoknots. Our approach is based on the free energy minimization criterion, and utilizes a sophisticated energy model that is mo...
详细信息
A novel image content authentication algorithm based on Laplace spectra was proposed. Outstanding feature points are extracted from the original image and a cipher point is inserted. A relational graph is then built, ...
详细信息
ISBN:
(纸本)7900719229
A novel image content authentication algorithm based on Laplace spectra was proposed. Outstanding feature points are extracted from the original image and a cipher point is inserted. A relational graph is then built, and the Laplace spectra of the graph are calculated to serve as image features. The Laplace spectra are quantized then embedded into the original image as a watermark. In the authentication step, the Laplace spectra of the authenticating image are calculated and compared with that of the watermark embedded in the authenticating image. If both of the spectra are identical, the image passes the authentication test. Otherwise, the tamper is found. The experimental results show that the proposed authentication algorithm can effectively detect the event and the location when the original image content is tampered viciously.
This paper describes a new algorithm for image semi-supervised clustering. In particular, the proposed approach introduces corner-oriented attributed graphs(COAG) constructed based on modified Harris corner extraction...
详细信息
Nowadays, the efficient representation of a given shape plays a significant role in pattern recognition field. In this paper, we introduce a novel method to represent 2-D shape as a relation graph which using affine-i...
详细信息
暂无评论