In this paper, we present an efficient method for detecting collisions between highly deformable objects, which is a combination of newly developed stochastic method and Particle Swarm Optimization (PSO) algorithm. Fi...
详细信息
This paper is concerned with solution of the consistent fundamental matrix estimation in a quadratic measurement error model. First an extended system for determining the estimator is proposed, and an efficient implem...
详细信息
In order to distinguish and extract the topic information from other interferential information on the BBC news website for the study in social computing, the BBC News Hunter was proposed in this paper. The whole syst...
详细信息
The deconvolution of infiltrating immune cells and stromal cells from complex tumor tissues is significant for studying the impact of these cells on tumor development, as well as assisting cancer therapies. Integratin...
详细信息
Under the framework of LPU (learning from positive data and unlabeled data), this paper originally proposes a three-step algorithm. First, Co-Training is employed for filtering out the "suspect positive" dat...
详细信息
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman c...
详细信息
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman code to the wavelet tree of a string T[1. . .n]. Compared with Huffman code based wavelet tree, the memory space used to represent the shape of wavelet tree is not needed. In case of large alphabet, this part of memory is not negligible. The operations of wavelet tree are also simpler and more efficient due to the canonical Huffman code. Based on the resulting structure, the multi-key rank and select functions can be performed using at most nH0 + jRj(lglgn + lgn lgjRj)+O(nH0) bits and in O(H0) time for average cases, where H0 is the zeroth order empirical entropy of T. In the end, we present an efficient construction algorithm for this index, which is on-line and linear.
With the development of high-throughput microarray technology, a large number of microarray data has been obtained by tens of thousands of simulation experiments on gene expression. However, due to the high cost, gene...
详细信息
In this paper, a relatively flexible filter called extended bilateral filter is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a kernel for...
详细信息
AIM: To explore feasibility and practicability of macula localization independent of macular morphological features. METHODS: A novel method was proposed to identify macula in fundus images by using structure label...
详细信息
AIM: To explore feasibility and practicability of macula localization independent of macular morphological features. METHODS: A novel method was proposed to identify macula in fundus images by using structure label transfer. Its main idea was to match a processed image with the candidate images with known structures, and then transfer the structure label representing the macular to the processed image as a result of macula localization. In this way, macula localization couldn't be influenced by lesion or other interference any more. RESULTS: The average success rate in four datasets was 98.18%. For accuracy, the average error distance in four datasets was 0.151 optic disc diameter (ODD). Even for severe lesion images, the proposed method can still maintain high success rate and high accuracy, e.g., 95.65% and 0.124 ODD in the case of STARE dataset, respectively, which indicated that the proposed method was highly robust and stable in the complicated situations. CONCLUSION: The proposed method can avoid the interference of lesion to macular morphological features in macula localization, and can locate macula with high accuracy and robustness, verifying its feasibility.
This paper presents a new edge-counting based method using Word Net to compute the similarity. The method achieves a similarity that perfectly fits with human rating and effectively simulate the human tHought process ...
详细信息
暂无评论