This paper introduces the new qualitative and quantitative methods, which can diagnose breast tumors. Qualitative methods include blood vessel display inside and outside of pathological changes part of breast, display...
详细信息
This paper introduces the new qualitative and quantitative methods, which can diagnose breast tumors. Qualitative methods include blood vessel display inside and outside of pathological changes part of breast, display of equivalent pixel curves at the part of pathological changes and display of breast tumor image edge. Accordingly, three feature extraction operators are proposed, i.e. the combination operators of anisotropic gradient and smoothing operator, an improved Sobel operator and an edge sharpening operator. Furthermore, quantitative diagnostic approaches are discussed based on blood and oxygen contents according to abundant clinical data and pathological mechanism of breast tumors. The results of clinic show that the methods of combining qualitative and quantitative diagnose are effective for breast tumor images, especially for early and potential breast cancer
A novel Parallel-Based Lifting Algorithm (PBLA) for Discrete Wavelet Transform (DWT), exploiting the parallelism of arithmetic operations in all lifting steps, is proposed in this paper. It leads to reduce the cri...
详细信息
A novel Parallel-Based Lifting Algorithm (PBLA) for Discrete Wavelet Transform (DWT), exploiting the parallelism of arithmetic operations in all lifting steps, is proposed in this paper. It leads to reduce the critical path latency of computation, and to reduce the complexity of hardware implementation as well. The detailed derivation on the proposed algorithm, as well as the resulting Very Large Scale Integration (VLSI) architecture, is introduced, taking the 9/7 DWT as an example but without loss of generality. In comparison with the Conventional Lifting Algorithm Based Implementation (Clab.), the critical path latency of the proposed architecture is reduced by more than half from (4Tm + 8Ta)to Tm + 4Ta, and is competitive to that of Convolution-Based Implementation (CBI), but the new implementation will save significantly in hardware. The experimental results demonstrate that the proposed architecture has good performance in both increasing working frequency and reducing area.
We study the non-linear behavior of the KIII model for natural image classification. The KIII model is designed to be a dynamic computational model that simulates the sensory cortex. The KIII model has been explored f...
详细信息
We study the non-linear behavior of the KIII model for natural image classification. The KIII model is designed to be a dynamic computational model that simulates the sensory cortex. The KIII model has been explored for rudimentary pattern recognition and classification in noisy environment [1-3]. We extend the study of KIII models in understanding whether self-organized neural populations can be exploited into perceptual and memory producing systems such as in natural image classification. Our goal is to obtain a quantitative index on how well the KIII model behaves when it is assigned the task to identify and distinguish one class of natural image from the other based on color and texture features. For twenty training data, twenty validation data and eighty test data set for four image classes, we obtain 80% correct classification using the KIII. We compare a standard non linear neural network tools such as back propagation for the classification of the same set of natural images and obtain 65% correct classification. We conclude that dynamic neural computational models such as KIII may be suitable candidates for natural image classification.
We have developed a generic ontology of objects, and a knowledge base of everyday physical objects. Objects are represented as assemblies of functional features and their spatial relations. Generic shape information o...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection *** mechanism is transparent to application programs and can support th e building of *** the cooperation of some other security components,the mechanism guarantees the reso urce availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
Walsh-Haar function system that was first intruoduced by us is a new kind of function systems, and has a good global/local property. This function system is called Walsh ordering function system since its generation k...
详细信息
Walsh-Haar function system that was first intruoduced by us is a new kind of function systems, and has a good global/local property. This function system is called Walsh ordering function system since its generation kernel functions belong to Walsh ordering Walsh function system. We worked out a recursive property of the matrix WHKRm+1 corresponding to the first KR m+1 Walsh-Haar functions in Walsh-Haar function system, and we also proved that Walsh-Haar function system is perfect and orthogonal similar to Walsh function system and Haar function system. Thus, discrete Walsh-Haar transformation (DW-HT) is an orthogonal transformation that can be widely used in signal processing. In this paper, using the recursive property of the matrix WHKRm+1 and the fast algorithm of discrete Walsh transformation (DWT) in Walsh ordering, we have designed a fast algorithm of Walsh ordering DW-HT based on the bisection technique. The idea and method used in this paper can be used for designing fast algorithms of other ordering DW-HTs and other discrete orthogonal transformations.
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmissio...
详细信息
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system, in which the security-demanded transmission connections can switch smoothly among the multiple proxies by maintaining a coherent connection context. The mechanism is transparent to application programs and can support the building of VPN. With the cooperation of some other security components, the mechanism guarantees the resource availab.lity and reliability of the end system against some attacks to the specific ports or hosts.
Target detection techniques play an important role in automatic target recognition (ATR) systems because overall ATR performance depends closely on detection results. In this paper, a novel method for fusion detection...
详细信息
Target detection techniques play an important role in automatic target recognition (ATR) systems because overall ATR performance depends closely on detection results. In this paper, a novel method for fusion detection of infrared weak targets based on multifeature distance map (MFDM) in image sequences is proposed. As for small weak targets, there are many features, such as local entropy, average gradient strength. These features depict the characteristics of small infrared targets and can be extracted. Multifeature-based fusion techniques are applied to detect such weak targets. The problem of detecting small targets is converted to search peak values in specified feature space where multifeature vectors space (MFVS) is considered. Distance map (DM) can be derived according to feature vectors and target detection is performed in DM. In order to accumulate energy of targets deeply and suppress background and clutters to a great extent, five distance maps obtained by corresponding five consecutive frames are utilized to fuse with average weight, which results in the fact that the contrast between targets and background including clutters are enlarged and that the feature peaks of targets are obvious different from background and clutters. After these steps, a contrast segmentation method is used to extract targets from complicated background on the fused DM. Actual infrared image sequences in background of sea and sky are applied to validate the proposed approach. Experimental results demonstrate the robustness of the proposed method with high performance.
In this paper, we propose a new method integrating both a priori shape information and our knowledge about gray levels of the desired structure. We describe an approach inspired from tracking to deal with non-uniform ...
详细信息
ISBN:
(纸本)0889865183
In this paper, we propose a new method integrating both a priori shape information and our knowledge about gray levels of the desired structure. We describe an approach inspired from tracking to deal with non-uniform gray levels. We define focus region to consider both interior and exterior of the desired object. We utilize signed distance function to consider shape information. Embedding a priori shape and gray level knowledge in a statistical platform, we use correlation between changes in shape and histogram to improve the results. Our method successfully segments Thalamus and other brain structures.
Because of poor signal-to-noise ratio (SNR) of the fMRI time series and confounding effects, the results of fMRI analysis are often unsatisfactory. Existence of significant noise and artifacts in fMRI time-series as w...
详细信息
ISBN:
(纸本)0889865183
Because of poor signal-to-noise ratio (SNR) of the fMRI time series and confounding effects, the results of fMRI analysis are often unsatisfactory. Existence of significant noise and artifacts in fMRI time-series as well as their unknown structure, complicates the problem of activation detection in the time domain. This makes the fMRI noise suppression a challenging problem. Based on some assumptions, different parametric denoising methods such as wavelet based denoising methods have been introduced in the literature. But these assumptions may not necessarily hold for the fMRI data. To remedy this problem, using randomization analysis, we propose a novel wavelet-based denoising method for fMRI analysis. The proposed denoising method is employed to build a feature space for fMRI cluster analysis and its efficiency is shown using simulated and experimental datasets.
暂无评论