At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in...
详细信息
ISBN:
(纸本)9781728146188
At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in fundus images is very effective for early diagnosis of diseases such as the hypertension and diabetes. In this paper, we utilize the U-shaped structure to exploit the local features of the retinal vessels and perform retinal vessel segmentation in an end-to-end manner. Inspired by the recently DropBlock, we propose a new method called Structured Dropout U-Net (SD-Unet), which abandons the traditional dropout for convolutional layers, and applies the structured dropout to regularize U-Net. Compared to the state-of-the-art methods, we demonstrate the superior performance of the proposed approach.
When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, w...
When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, which uses the real-time generation of similar trajectories to protect the user's personal location privacy. The false location set is established by initial anonymous location selection, similar trajectory location calculation and generated location selection. The false location is used to form a false trajectory similar to the real location trajectory, which reduces the probability of attacker identification and achieves real-time trajectory anonymity based on location service. Finally, the effectiveness of the scheme is verified by performance analysis and experimental results.
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign...
详细信息
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the signing-verifying of one-bit modality. So, their signature efficiency is very low. In this paper, we propose a scheme based on an application of Fibonacci-, Lucas-and Fibonacci-Lucas matrix coding to quantum digital signatures based on a recently proposed quantum key distribution(QKD) system. Our scheme can sign a large number of digital messages every time. Moreover, these special matrices provide a method to verify the integration of information received by the participants, to authenticate the identity of the participants, and to improve the efficiency for signing-verifying. Therefore, our signature scheme is more practical than the existing schemes.
Clustering stocks by their time series data is a significant but challenging task in computer supported financial decision systems. In this paper, we propose an effective stocks clustering method based on hybrid corre...
详细信息
Clustering stocks by their time series data is a significant but challenging task in computer supported financial decision systems. In this paper, we propose an effective stocks clustering method based on hybrid correlation coefficient called SLU correlation coefficient which is a weighted combination of Spearman rank correlation, upper tail correlation and lower tail correlation. The upper and lower tail correlation is defined by Copula function and estimates parameters by EM algorithm. The similarity matrix is defined by SLU and inputs into Affinity Propagation algorithm for clustering. The experiment shows the effectiveness of the SLU, compared to Pearson correlation and DTW distance.
Emerging Non-Volatile Memory (NVM) technologies are promised to revolutionize storage systems by providing fast, persist data accesses on memory bus. However, the limited capacity of NVM devices calls for multi-layer ...
详细信息
ISBN:
(纸本)9781538674048
Emerging Non-Volatile Memory (NVM) technologies are promised to revolutionize storage systems by providing fast, persist data accesses on memory bus. However, the limited capacity of NVM devices calls for multi-layer storage topology that is able to combine fast, expensive NVM with slower, cheaper block devices to harness the characteristics of both technologies. This paper proposes an efficient file system named NBFS for hybrid in-memory NVM and block devices. NBFS can distribute the data pages of a single file to multiple memory nodes in NUMA architecture and multiple block devices. To take full advantages of NVM, NBFS provides a mechanism to migrate file data between NVM and block devices according to the data access features. Besides, we design a resource pool for block devices to minimize additional storage and performance overhead. Experimental results show that in write-intensive workloads, our design performs well and has a high bandwidth.
Malicious and selfish behaviors represent a serious security threat against routing in Mobile Social Network (MSN). Due to the unique network characteristics, it is a challenge to design a misbehavior detection scheme...
ISBN:
(纸本)9781538680988;9781538680971
Malicious and selfish behaviors represent a serious security threat against routing in Mobile Social Network (MSN). Due to the unique network characteristics, it is a challenge to design a misbehavior detection scheme in MSN. In this paper, a trust-based security routing mechanism is presented, i.e. a malicious behavior detection mechanism with identity verification scheme. The main idea is to introduce the behavior trust and identity trust to guide the routing. Firstly, we judge the node's behavior based on both comprehensive trust and social relationship strength. And then, we forward messages according to the different measurement within and outside of the friend groups. Besides, we also propose a distributed key management scheme to further improve the efficiency of the proposed mechanism via verifying the identity trust of the node. The simulation results indicate that the proposed routing mechanism can lower the impact of malicious behavior of nodes effectively and it has greater security performance than some classical routing algorithms.
Mobile offloading is a platform that facilitates the distribution of computationally intensive tasks from mobile devices to the cloud or other devices in order to conserve energy and improve performance. The concept i...
详细信息
Mobile offloading is a platform that facilitates the distribution of computationally intensive tasks from mobile devices to the cloud or other devices in order to conserve energy and improve performance. The concept is practically based on the idea of exchanging relatively low communication energy for high computation power utilization. Efforts have been channeled towards energy conservation by clusters using Dynamic Power Management (DPM). This paper is a review for green energy sources for reducing energy and using energy consumption to manage sources by stating the latest studies of energy consumption and energy consumptions.
Recently, the connection between p-measures of asymmetry and the L_p-mixed volumes for convex bodies was found soon after the p-measure of asymmetry was proposed, and the Orlicz-measures of asymmetry was proposed insp...
详细信息
Recently, the connection between p-measures of asymmetry and the L_p-mixed volumes for convex bodies was found soon after the p-measure of asymmetry was proposed, and the Orlicz-measures of asymmetry was proposed inspired by such a kind of connection. In this paper, by a similar way the dual p-measures of asymmetry for star bodies(naturally for convex bodies) is introduced first. Then the connection between dual p-measures of asymmetry and Lp-dual mixed volumes is established. Finally, the best lower and upper bounds of dual p-measures and the corresponding extremal bodies are discussed.
Over the past few years, dictionary learning (DL)-based methods have been successfully used in various image reconstruction problems. However, traditional DL-based computed tomography (CT) reconstruction methods are p...
详细信息
This paper introduces a new type-2 intuitionistic exponential triangular fuzzy number. Basic generalized exponential triangular intuitionistic fuzzy numbers are formulated by (α,β)-cuts. Some of properties and theor...
详细信息
This paper introduces a new type-2 intuitionistic exponential triangular fuzzy number. Basic generalized exponential triangular intuitionistic fuzzy numbers are formulated by (α,β)-cuts. Some of properties and theorems of this type of fuzzy number with graphical representations have been studied and some examples are given to show the effectiveness of the proposed method. Also, the ranking function of the generalized exponential triangular intuitionistic fuzzy number is computed. This ranking method is based on the centroid concept and Euclidean distance. Based on the ranking method, we develop an approach to solving an intuitionistic fuzzy assignment problem where cost is not deterministic numbers but imprecise ones. Then, we solve an intuitionistic fuzzy transportation problem where transportation cost, source, and demand were generalized type-2 intuitionistic fuzzy numbers by the ranking method for Euclidean distance. Intuitionistic fuzzy set theory has been used for analyzing the fuzzy system reliability. We have taken the intuitionistic fuzzy failure to start of an automobile as known basic fault events such as Ignition failure, Battery internal shortage, Spark plug failure and fuel pump failure using Type-2 Intuitionistic Exponential Triangular Fuzzy Number. Our computational procedure is very simple to implement for calculations in intuitionistic fuzzy failure. The major advantage of using Intuitionistic fuzzy sets over fuzzy sets is that intuitionistic fuzzy sets separate the positive and the negative evidence for the membership of an element in a set. Furthermore, the proposed technique can be suitably utilized to solve the start of an automobile problem, because the result of system failure in this method is significant. Finally, the proposed method has been compared with other existing method through numerical examples.
暂无评论