Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm...
Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm. Finally, in order to eliminate the influence, the closed operation of mathematical morphology is used to correct the segmented image. The results show that it can segment the road from the remote sensing image in lab mode, by using K-means clustering algorithm. Moreover, Lab mode is more suitable for k-mean than other modes.
作者:
Chang, RuiLin, ZhaowenSun, YiXu, JieNetwork and Information Center
Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory National Engineering Laboratory for Mobile Network Security (No. 【2013】 2685) Network and Information Center Institute of Network Technology / Institute of Sensing Technology and Business Beijing University of Posts and Telecommunications. Beijing 100876 China
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN c...
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN control layer to limit the capabilities of the upper-layer applications, thereby improving the security of the SDN. In addition, considering the performance and management requirements of SDN, access control features including cross-domain support should be considered. In this paper, we proposed an MD-UCON access control model with role mechanism extension based on UCON and role-based access control mechanism. At the same time, we introduced a cross-domain role mapping method to support cross-domain access authorization, thereby enabling the model to be applied to the application of access control for the SDN northbound interface.
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key...
详细信息
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers.
Empirical privacy evaluation in OSNs may provide a better under standing of the effectiveness and the efficiency of the default privacy controls and those customized by the users. Proper user perception of the privacy...
详细信息
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet flow (Tor network). Different from previous work, we assume there are two different kinds of receivers, cellular receivers and D2D receivers, each D2D receiver with its D2D trunking constitutes a D2D pair. We assume that the traffic can be generated in the transmission between a BS and a cellular receiver and that between a D2D trunking and a D2D receiver if and only if the received power is larger than a threshold and the rate in the transmission is above a specified rate. The framework is tractable and able to help us analyze how different parameters influence the network traffic. What's more, we can give the optimal scheme to achieve the maximal network traffic. At the same time, if the results calculated by this paper proposed or traditional formula is not matched, we think that the flow rate may be heterogeneous traffic, such as darknet flow(Tor).
Sign information is the key to overcoming the inevitable saturation error in compressive sensing systems, which causes information loss and results in bias. For sparse signal recovery from saturation, we propose to us...
详细信息
We establish a connection between an arbitrary Hermitian tight-binding model with chiral (C) symmetry and its non-Hermitian counterpart with chiral-time (CT) symmetry. We show that such a non-Hermitian Hamiltonian is ...
详细信息
We establish a connection between an arbitrary Hermitian tight-binding model with chiral (C) symmetry and its non-Hermitian counterpart with chiral-time (CT) symmetry. We show that such a non-Hermitian Hamiltonian is pseudo-Hermitian. The eigenvalues and eigenvectors of the non-Hermitian Hamiltonian can be easily obtained from those of its parent Hermitian Hamiltonian. It provides a way to generate a class of non-Hermitian models with a tunable full real band structure by means of additional imaginary potentials. We also present an illustrative example that could achieve a cone structure from the energy band of a two-layer Hermitian square lattice model.
暂无评论