In this paper, a novel filter model called extended adaptive weighted averaging (EAWA) filter model is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) an...
详细信息
ISBN:
(纸本)076952432X
In this paper, a novel filter model called extended adaptive weighted averaging (EAWA) filter model is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a weight distribution function for the filter according to some specified requirements. Based on the novel model, a fluorescein-angiogram-oriented filter, high-intensity preserving (HIP) filter is introduced to solve the problems of high-intensity preservation when filtering noise. The results of the experiments show that the HIP filter has the features of frame-averaging, which can achieve noise suppression efficiently, and the features of high-intensity preservation, which can keep the intensities of bright pixels from degrading via distributing the weights adoptively according to the intensity of each pixel
A new method is presented for robustly estimating fundamental matrix from matched points. The method comprises two parts. The first uses a robust technique - the random sample consensus (RANSAC) to discard outliers in...
详细信息
A new method is presented for robustly estimating fundamental matrix from matched points. The method comprises two parts. The first uses a robust technique - the random sample consensus (RANSAC) to discard outliers in an initial set of matched points. It adopts the sampling strategy to generate inliers from the initial set. The second part of the method is an algorithm for computing fundamental matrix, using the output of the RANSAC. This algorithm is based on the consistent fundamental matrix estimation in a quadratic measurement error model. An extended system for determining the estimator is proposed, and an efficient implementation for solving the system - a continuation method is developed. The proposed algorithm avoids solving total eigenvalue problems. Results for both synthetic and real images show the effectiveness of the proposed method.
Fourier-Mellin transform (FMT) is frequently used in content-based image retrieval and digital image watermarking. This paper extends the application of FMT into image registration and proposes an improved registratio...
详细信息
ISBN:
(纸本)076952432X
Fourier-Mellin transform (FMT) is frequently used in content-based image retrieval and digital image watermarking. This paper extends the application of FMT into image registration and proposes an improved registration algorithm based on FMT for the alignment of images differing in translation, rotation angle, and uniform scale factor. The proposed algorithm can eliminate the conversion from Cartesian to log-polar coordinates, avoid the process of interpolation required in the conversion, and obtain a more significant improvement than the conventional method using cross-correlation. Experiments show that the algorithm is accurate and robust regardless of white noise
A method for simultaneous analysis of the two components of compound paracetamol and diphenhydramine hydrochloride powdered drugs on near-infrared (NIR) spectroscopy is developed by using a Radial Basis Function (RBF)...
详细信息
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, ...
详细信息
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, it adopts the s-semantics approach, whose aim is to find notions of models which really capture the operational semantics. And it defines the program equivalence based on multiset answer constraint. Then it investigates the game semantics and proves that it is consistent with traditional operational semantics. On the basis of these two semantics, programmers can comprehend the programs deeply and develop more sound parallel constraint logic programming systems. Finally, it gives the conclusions and future work.
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house ...
详细信息
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house fashion, and need uniformed methodological foundations. In this paper, we propose a novel conceptual model for the modeling of ETL processes. We employ CommonCubes to represent the cubes in a target data warehouse. CommonCubes release the design of ETL processes from overdependence on the physical schema of the target data warehouse, and enable the designers to pay more efforts to data transforming than data loading when designing ETL processes. Based on the constraint functions on source attributes and the transforming operations on target attributes, we define ETL mappings 1:0 capture the semantics of various relationship cardinalities between source attributes and target attributes, which provide a good basis for the design of ETL processes.
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framewo...
详细信息
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framework of PBLW is proposed. Based on the time constraint directed graph, the workflow theory model in formalization is described in detail, and the time constraint problems are discussed in order to enhance the time management ability of the workflow model. Furthermore, in order to express the complicated secure access control constraint of the workflow, a conditioned RBAC model based on PKJ technology is presented, according to the traditional RBAC security access control model. Finally, the workflow engine driven algorithms for the workflow instance are given. By the actual inspection and users' feedback, it proves that this model can express the basic requirements of a majority of the process applications.
暂无评论