This paper presents an unsupervised range image segmentation based on Kohonen neural network. At first, the derivative and partial derivative of each point are calculated and the normal in each points is gotten. With ...
详细信息
This paper presents an unsupervised range image segmentation based on Kohonen neural network. At first, the derivative and partial derivative of each point are calculated and the normal in each points is gotten. With the character vectors including normal and range value, self-organization map is introduced to cluster. The normal analysis is used to eliminate over-segmentation and the last result is gotten. This method avoid selecting original seeds and uses fewer samples, moreover computes rapidly. The experiment shows the better performance.
Cancer-associated biomarker genes play an indispensable role in the intricate tapestry of cancer development and manifestation. The expression of biomarkers in different types of tumor cells has beneficial implication...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection *** mechanism is transparent to application programs and can support th e building of *** the cooperation of some other security components,the mechanism guarantees the reso urce availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
Sleep Electroencephalogram(Sleep EEG) detection and treatment can provide the basis for clinical diagnosis and treatment. According to the non-stationary random character of EEG itself, the paper proposed multiscale s...
详细信息
ISBN:
(纸本)9781510806450
Sleep Electroencephalogram(Sleep EEG) detection and treatment can provide the basis for clinical diagnosis and treatment. According to the non-stationary random character of EEG itself, the paper proposed multiscale sign series entropy(MSSE) method and applied it to the state of sleep EEG analysis. Numerical results showed that, MSSE method can effectively differentiate awake period β wave and sleep stage β wave even if under the influence of the noise. The results show that the algorithm can aid in clinical diagnosis of sleep EEG.
This paper presents a new combined local and global transform domain-based feedback image enhancement algorithm for medical diagnosis, treatment, and clinical research. The basic idea in using local alfa-rooting metho...
详细信息
This paper presents a new method for segmenting medical images is based on Hamiltonian quaternions and the associative algebra, method of the active contour model and LPA-ICI (local polynomial approximation - the inte...
详细信息
Color correlogram for content-based image retrieval (CBIR) characterizes not only the color distribution of pixels, but also the spatial correlation of pairs of colors. Color not only reflects the material of surface,...
详细信息
image gradient, as a preprocessing step is an essential tool in image processing in many research areas such as edge detection, segmentation, smoothing, inpainting, etc. In the present paper, we develop a new gradient...
详细信息
This paper describes a novel 3D needle segmentation algorithm for 3DUS data. The algorithm includes the 3D Gray-level Hough Transform (3DGHT), which is based on the representation (ψ, θ, ρ, α) of straight lines in...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmission connections can switch smoothly among the multiple proxies by maintaining a coherent connection context. The mechanism is transparent to application programs and can support the building of VPN. With the cooperation of some other security components, the mechanism guarantees the resource availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
暂无评论