In this paper, a technique for the extraction of roads in a high resolution synthetic aperture radar (SAR) image is presented. And a three-step method is developed for the extraction of road network from space borne S...
详细信息
ISBN:
(纸本)9780819469540
In this paper, a technique for the extraction of roads in a high resolution synthetic aperture radar (SAR) image is presented. And a three-step method is developed for the extraction of road network from space borne SAR image: the process of the feature points, road candidate detection and connection. Roads in a high resolution SAR image can be modeled as a homogeneous dark area bounded by two parallel boundaries. Dark areas, which represent the candidate positions for roads, are extracted from the image by a Gaussian probability iteration segmentation. Possible road candidates are further processed using the morphological operators. And the roads are accurately detected by Hough Transform, and the extraction of lines is achieved by searching the peak values in Hough Space. In this process, to detect roads more accurately, post-processing, including noisy dark regions removal and false roads removal is performed. At last, Road candidate connection is carried out hierarchically according to road established models. Finally, the main road network is established from the SAR image successfully. As an example, using the ERS-2SAR image data, automatic detection of main road network in Shanghai Pudong area is presented.
Image matching is the first step in almost any 3D computer vision task, and hence has received extensive attention. In this paper, the problem is addressed from a novel perspective, which is different from the classic...
详细信息
ISBN:
(纸本)9780819469502
Image matching is the first step in almost any 3D computer vision task, and hence has received extensive attention. In this paper, the problem is addressed from a novel perspective, which is different from the classic stereo matching paradigm. Two images with different resolutions, that is high resolution versus low resolution are matched. Since the high resolution image only corresponds to a small region of the low resolution one, the matching task therefore consists in finding a small region in the low resolution image that can be assigned to the whole high resolution image under the plane similarity transformation, which can be defined by the local area correlation coefficient to match the interest points and rectified by similarity transform. Experiment shows that our matching algorithm can be used for scale changing up to a factor of 6. And it is successful to deal with the point matching between two images under large scale.
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, w...
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, we propose a cryptanalysis of A. M. Barmawi's protocol and show that every valid participating party can recover the factorization of the RSA modulus N with the computational complexity O(log 3 N). Therefore, the secret RSA key parameters p, q, d axe exposed to all the participating parties and A. M. Barmawi' s protocol is totally broken.
The k-nearest neighbour (kNN) method is simple but effective for classification. The bottleneck of kNN is it needs a good similarity measure which could be problematic in some cases especially for datasets containing ...
详细信息
The k-nearest neighbour (kNN) method is simple but effective for classification. The bottleneck of kNN is it needs a good similarity measure which could be problematic in some cases especially for datasets containing categorical data. In this paper, a partial coverage based classificaiton (PCC) method is proposed which works without similarity measure and conversion for categorical data. Moreover, the PCC method is easy to be implemented. Experiments were carried out on some public datasets collected from the UCI machine learning repository. The experimental results show that the proposed method is better than some classical classificaiton algorithms in terms of classification accuracy. The PCC is a quite promising method for classification.
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape...
详细信息
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The paper analyses the behaviors of delegation in UCON based on OM-AM engineering principles, presents a formalized usage control model with delegation features using BNF Extensions, called as UCON D , and further articulates its hybrid architecture based on Client & Server Delegation Reference Monitors and relative key protocol functions. UCON D is an extension model of UCON ABC in the aspect of delegation authorization, and it resolves the delegation question of Usage Control Model. Moreover, we specify delegation procedure of an application for Digital Medium Resource Distribution System.
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante...
详细信息
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarantees the secure and reliable command on disaster recovery. Its self-supervision capability can monitor the integrality and security of disaster recovery system itself. By 2D and 3D rea-time visible platform provided by GIS, GPS and RS, the model makes the using, management and maintenance of disaster recovery system easier. RDRSM possesses predominant features of security, robustness and controllability. And it can be applied to highly security-critical environments such as E-government and bank. Conducted by RDRSM, an important E-government disaster recovery system has been constructed successfully. The feasibility of this model is verified by practice. We especially emphasize the significance of some components of the model, such as risk assessment, disaster recovery planning, system supervision and robust communication support.
The measurements based on flow characteristics are playing more and more important roles in the analysis of network Behavior. As one of main methods for flow recognition, the timeout strategies have a significant impa...
详细信息
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret...
详细信息
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ...
详细信息
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ...
详细信息
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.
暂无评论