Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is...
详细信息
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is used to realize normalizing of the face image. Secondly, a determination criterion of eye location is established by the priori knowledge of geometrical facial features. Thirdly, a range of threshold values that would separate eye blocks from others in a segmented face image is estimated. With the progressive increase of the threshold by an appropriate step in that range, once two eye blocks appear from the segmented image, they will be detected by the determination criterion of eye location. Finally, the 2-D correlation coefficient is used as a symmetry similarity measure to check the factuality of the two detected eyes. The experimental results demonstrate the high efficiency of the algorithm in runtime and correct localization rate.
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use case...
详细信息
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use cases of SON and has been intensively studied in 3GPP working groups. In this paper, we take the user equipment (UE) speed into account to solve the MRO problem. We propose a US-MRO algorithm, which assigns different Hysteresis parameters to UEs with different speed. The simulation results show that the success rate of Handover (HO) is improved and user experience is enhanced by the US-MRO algorithm.
Randí et al. proposed a significant graphical representation for DNA sequences, which is very compact and avoids loss of information. In this paper, we build a fast algorithm for this graphical representation wit...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. That is, a polygon is divided into two parts by a line: S 1 and S 2 . Furthermore, we analyze the security and computational complexity, as well as the comparison of these two protocols. The results of analysis show that the proposed protocols are secure and efficient. We believe the two protocols will be useful in other geometric and combinatorial problems.
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by nume...
详细信息
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by numerical dispersion effectively. To absorb waves reflected from edges we implement convolutional perfectly matched layer (CPML) absorbing boundaries. It can efficiently absorb the reflections and greatly increase the computation efficiency. The surface-based reflection and cross-hole GPR modeling are simulated, and numerical results show the efficiency of the method.
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their bioche...
详细信息
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their biochemical functions characterized. Recently, many different methods have been used to predict protein functions including those based on Protein-Protein Interaction (PPI), structure, sequence relationship, gene expression data, etc. Among these approaches, methods based on protein interaction data are very promising. In this paper, we studied a network-based method using locally linear embedding (LLE). LLE is a robust learning algorithm that manipulates dimensionality reduction, neighborhood-preserving embedding for high-dimensional data. We first embed both annotated and unannotated proteins in a low dimensional Euclidean space;then, we apply semi-supervised learning techniques to classify unannotated proteins into different functional groups. Finally, we made predictions to the unknown functional proteins in yeast. 5-fold cross validation is then applied to the GO terms to compare the performance of different approaches, and the proposed method performs significantly better than the others.
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign the...
详细信息
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign these newly proteins with a biological function that can be verified by experiment. On the basis of thorough analysis of existing protein function prediction, we take double direction enumeration method combined with the distance constrains to find protein pathway, and propose a new predicting model based on topological structural of protein-protein interaction (PPI) network and protein pathway, which greatly increases the speed of the algorithm. To validate the method, the Yeast Saccharomyces cerevisiae protein-protein interaction network and corresponding protein pathways are analyzed. Comparing with other methods, our results can substantially improve the accuracy and robustness of functional annotation.
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th...
详细信息
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of the course "Digital Image processing Experiments" is discussed in this paper. The combined platform of experiments includes TI DSP experimental box and three different kinds of programming languages. The six experimental projects cover the basic theories of digital image processing. The result can offer a significant reference for the teaching innovations in the other related specialties.
Roadmap methods were widely used in route planning fields, both for robots and unmanned aircrafts. Traditional roadmap is constituted by connecting the vertexes of convex obstacle, which is related to the locations of...
详细信息
暂无评论