Meshed surfaces are ubiquitous in digital geometry processing and computer graphics. The set of attributes associated with each vertex such as the vertex locations, curvature, temperature, pressure or saliency, can be...
详细信息
Meshed surfaces are ubiquitous in digital geometry processing and computer graphics. The set of attributes associated with each vertex such as the vertex locations, curvature, temperature, pressure or saliency, can be recognized as data living on mani- fold surfaces. So interpolation and approximation for these data are of general interest. This paper presents two approaches for mani- fold data interpolation and approximation through the properties of Laplace-Beltrami operator (Laplace operator defined on a mani- fold surface). The first one is to use Laplace operator minimizing the membrane energy of a scalar function defined on a manifold. The second one is to use bi-Laplace operator minimizing the thin plate energy of a scalar function defined on a manifold. These two approaches can process data living on high genus meshed surfaces. The approach based on Laplace operator is more suitable for manifold data approximation and can be applied manifold data smoothing, while the one based on bi-Laplace operator is more suit- able for manifold data interpolation and can be applied image extremal envelope computation. All the application examples demon- strate that our procedures are robust and efficient.
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting, tracking and recognizing. The Otsu scheme, a widely used ima...
详细信息
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting, tracking and recognizing. The Otsu scheme, a widely used image thresholding technique, provides approving results for segmenting a gray level image with only one modal distribution in gray level histogram. However, it provides poor results if the histogram of a gray level is non-bimodal. For enhancing the performance of the Otsu algorithm further, in this work, an improved median-based Otsu image thresholding algorithm is presented. Finally extensive tests are performed and the experiments show that our method obtain more satisfactory results than the original Otsu thresholding algorithm.
This paper proposes a novel method for breast cancer diagnosis using the features generated by genetic programming (GP). We developed a new individual combination pattern (Composite individual genetic programming) whi...
详细信息
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relatio...
详细信息
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relational database, which help to remove extraneous attributes and build the initial network structure. The final classification model named FM-NB inherits the simplicity of Naive Bayes (NB) and the ability to maintain inter-dependencies among attributes of Tree augmented NB(TAN). The inter-dependencies are expressed by Functional dependencies (FDs) and Local Multivalued dependencies (LMVDs), which relaxed the precondition about attribute sets of Multivalued dependency (MVD) and solved the problem related to conditional independence of Embedded Multivalued dependencies (EMVDs). Experimental results are presented to show the effectiveness and efficiency of the proposed approach.
Convex evidence theory model is the only method to fuse ordered proposition, in this paper we proposed a novel convex evidence theory model based on Gaussian function, we modified Gaussian function and used it to comb...
详细信息
Convex evidence theory model is the only method to fuse ordered proposition, in this paper we proposed a novel convex evidence theory model based on Gaussian function, we modified Gaussian function and used it to combine mass function of ordered propositions, we presented the calculation of the parameters of this function, and proposed a more accurate method to find the most likely true proposition. Theoretical analysis and experimental results demonstrate that the proposed method has lower time complexity and higher accuracy in some cases than existing methods.
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance,...
详细信息
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance, VIS depends on the translator vl2mv to compile Verilog into the intermediate format BLIF-MV first, and then extracts the FSM (Finite State Models) from it instead of the direct Verilog source code. However, Verilog and VHDL are the most common used hardware description languages for large scale integrated circuits. It is necessary if the source code could be used directly, rather than an intermediate format. We notice that synthesizable Verilog is well-structured which can be represented in SSA (Static Single Assignment) form. In this paper, we describe a method that extracts formal model directly from Verilog source code by converting the code to SSA form. With this method, we have implemented a prototype system that extracts formal model of Verilog programs. We also prove the conversion function-preserving by translating SSA back to Verilog and checking its equivalence with the primary design. To ensure correctness and robustness, we have tested our system with ISCAS and picoJava-II, a specification of microprocessor, and the experimental results on these realistic circuits show that the conversion procedure is function-preserving. Moreover, we take it as the front-end of CEC (Combinational Equivalence Checking) and demonstrate the formal model extracted with our method can be exploited efficiently in CEC.
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a...
详细信息
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a case study, this protocol only requires O(1) work to identify and authenticate a tag in the server and only one-way hash function, XOR operation are needed in tags. In addition, we give formal reasoning for this protocol by using GNY logic;the security properties of this protocol are analyzed as well by comparing with the related RFID protocols.
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporti...
详细信息
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporting tag ownership transfer is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the backend server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,...
详细信息
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions, and prove that these topological relations are exclusive and complete. Moreover, we obtained 32406 topological relations in practice by programs, and we illustrate that the 16-intersections matrix model has stronger expressive ability than the topological relations given by RCC-5 in pairs.
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortio...
详细信息
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortion spherical parameterization approach based on symmetry analysis of 3D meshes. This signal is then sampled on the sphere with the help of an adaptive sampling scheme. Finally, the sampled signal is transformed into the wavelet domain according to spherical wavelet transform where many 3D mesh processing operations can be implemented such as smoothing, enhancement, compression, and so on. Our main contribution lies in incorporating a fast low distortion spherical parameterization approach and an adaptive sampling scheme into the frame for pro- cessing 3D meshed surfaces by spherical wavelets, which can handle surfaces with complex shapes. A number of experimental ex- amples demonstrate that our algorithm is robust and efficient.
暂无评论