首页 > 最新文献

2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)最新文献

英文 中文
Siamese Network for Object Tracking in Aerial Video 航空视频中目标跟踪的暹罗网络
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492751
Xiaolin Zhao, Shilin Zhou, Lin Lei, Zhipeng Deng
In Unmanned Aerial Vehicle (UAV) videos, object tracking remains a challenge, due to its low spatial resolution and poor real-time performance. Recently, methods of deep learning have made great progress in object tracking in computer vision, especially fully-convolutional siamese neural networks (SiamFC). Inspired by it, this paper aims to investigate the use of SiamFC for object tracking in UAV videos. The network is trained on part of a UAV123 dataset and Stanford Drone dataset. First, exemplar image is extracted from the first frame and search regions are extracted in the following frames. Then, a Siamese network is used for tracking objects by calculating the similarity between exemplar image and search region. To evaluate our method, we test on a challenge VIVID dataset. The experiment shows that the proposed method has improvements in accuracy and speed in low spatial resolution UAV videos compared to existing methods.
在无人机(UAV)视频中,由于空间分辨率低、实时性差,目标跟踪仍然是一个挑战。近年来,深度学习方法在计算机视觉的目标跟踪方面取得了很大的进展,特别是全卷积连体神经网络(SiamFC)。受其启发,本文旨在研究SiamFC在无人机视频中目标跟踪的应用。该网络是在UAV123数据集和斯坦福无人机数据集的一部分上训练的。首先,从第一帧提取样本图像,并在接下来的帧中提取搜索区域。然后,通过计算样本图像与搜索区域之间的相似度,使用Siamese网络进行目标跟踪。为了评估我们的方法,我们在一个挑战VIVID数据集上进行了测试。实验表明,与现有方法相比,该方法在低空间分辨率无人机视频中的精度和速度都有提高。
{"title":"Siamese Network for Object Tracking in Aerial Video","authors":"Xiaolin Zhao, Shilin Zhou, Lin Lei, Zhipeng Deng","doi":"10.1109/ICIVC.2018.8492751","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492751","url":null,"abstract":"In Unmanned Aerial Vehicle (UAV) videos, object tracking remains a challenge, due to its low spatial resolution and poor real-time performance. Recently, methods of deep learning have made great progress in object tracking in computer vision, especially fully-convolutional siamese neural networks (SiamFC). Inspired by it, this paper aims to investigate the use of SiamFC for object tracking in UAV videos. The network is trained on part of a UAV123 dataset and Stanford Drone dataset. First, exemplar image is extracted from the first frame and search regions are extracted in the following frames. Then, a Siamese network is used for tracking objects by calculating the similarity between exemplar image and search region. To evaluate our method, we test on a challenge VIVID dataset. The experiment shows that the proposed method has improvements in accuracy and speed in low spatial resolution UAV videos compared to existing methods.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Noise-Resistant Stereo Matching Algorithm Integrating Regional Information 一种融合区域信息的抗噪声立体匹配算法
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492874
Feng Huahui, Zhang Geng, Zhang Xin, Hu Bingliang
Focusing on the problem existing in stereo matching that low-SNR image, such as images collected at night, we propose a novel matching framework based on semi-global matching algorithm and AD-Census. This algorithm extends the original algorithms in two ways. First, image segmentation information as an additional constraint is added that solve the problem of incomplete path and improve the accuracy of cost calculation. Second, the matching cost volume is calculated with AD-SoftCensus measure that minimizes the impact of noise on the quality of matching by changing the pattern of census descriptor from binary to trinary. Results of Middlebury standard test data show that the algorithm significantly improves the precision of matching. In addition, a low-light binocular platform is built to test our method in night environment. Results show the disparity maps are more accurate compared to previous methods.
针对夜间采集的低信噪比图像在立体匹配中存在的问题,提出了一种基于半全局匹配算法和AD-Census的立体匹配框架。该算法从两个方面对原有算法进行了扩展。首先,加入图像分割信息作为附加约束,解决了路径不完全的问题,提高了代价计算的准确性;其次,采用AD-SoftCensus方法计算匹配成本体积,该方法通过将普查描述符的模式从二进制更改为二进制,从而最大限度地减少噪声对匹配质量的影响。Middlebury标准测试数据的结果表明,该算法显著提高了匹配精度。此外,还搭建了一个微光双目平台,在夜间环境下对该方法进行了测试。结果表明,与以往的方法相比,视差图的精度更高。
{"title":"A Noise-Resistant Stereo Matching Algorithm Integrating Regional Information","authors":"Feng Huahui, Zhang Geng, Zhang Xin, Hu Bingliang","doi":"10.1109/ICIVC.2018.8492874","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492874","url":null,"abstract":"Focusing on the problem existing in stereo matching that low-SNR image, such as images collected at night, we propose a novel matching framework based on semi-global matching algorithm and AD-Census. This algorithm extends the original algorithms in two ways. First, image segmentation information as an additional constraint is added that solve the problem of incomplete path and improve the accuracy of cost calculation. Second, the matching cost volume is calculated with AD-SoftCensus measure that minimizes the impact of noise on the quality of matching by changing the pattern of census descriptor from binary to trinary. Results of Middlebury standard test data show that the algorithm significantly improves the precision of matching. In addition, a low-light binocular platform is built to test our method in night environment. Results show the disparity maps are more accurate compared to previous methods.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characteristic Function Based Parameter Estimation for Ocean Ambient Noise 基于特征函数的海洋环境噪声参数估计
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492728
Xuebo Zhang, Cheng Tan, Wenwei Ying
The parameter initializations play an important role in the iteration of parameter estimation. Based on characteristic function, a parameter estimation method for Class B noise considering the parameter initialization is presented in this paper. The noise is firstly considered as the symmetric alpha stable (SαS) distribution. With the log method, we get the estimated parameters, which are further used as the parameter initial values of iteration. It improves the convergence speed. The processing results of simulated data indicate that the parameters of Class B noise can be efficiently estimated with the presented method.
参数初始化在参数估计迭代中起着重要的作用。提出了一种基于特征函数的考虑参数初始化的B类噪声参数估计方法。首先将噪声视为对称α稳定(s - α - s)分布。利用对数法得到估计参数,并将估计参数作为迭代的参数初始值。提高了收敛速度。仿真数据的处理结果表明,该方法可以有效地估计出B类噪声的参数。
{"title":"Characteristic Function Based Parameter Estimation for Ocean Ambient Noise","authors":"Xuebo Zhang, Cheng Tan, Wenwei Ying","doi":"10.1109/ICIVC.2018.8492728","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492728","url":null,"abstract":"The parameter initializations play an important role in the iteration of parameter estimation. Based on characteristic function, a parameter estimation method for Class B noise considering the parameter initialization is presented in this paper. The noise is firstly considered as the symmetric alpha stable (SαS) distribution. With the log method, we get the estimated parameters, which are further used as the parameter initial values of iteration. It improves the convergence speed. The processing results of simulated data indicate that the parameters of Class B noise can be efficiently estimated with the presented method.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secret Data Fusion Based on Chinese Remainder Theorem 基于中国剩余定理的秘密数据融合
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492875
Yuliang Lu, Xuehu Yan, Lintao Liu, Jingju Liu, Guozheng Yang, Qiang Li
In some high-level secure applications in need of multiple participants input their own secret data to achieve access control, such as, secure cabinet opened by multiple owners together, traditional security technology is not applicable. Although secret sharing may be used in the scenarios, there are some problems when directly applying primary secret sharing methods including visual cryptography (VC) and polynomial-based secret sharing. In this paper, we first describe the application scenario (namely secret data fusion) and its requirements, where secret data fusion is different from secret sharing. Then, we propose a possible method for secret data fusion based on Chinese remainder theorem (CRT). Theoretical analyses and experiments are examined to represent the effectiveness of our method.
在一些需要多个参与者输入自己的保密数据来实现访问控制的高级安全应用中,如多个所有者共同打开的安全柜,传统的安全技术就不适用了。虽然可以在这些场景中使用秘密共享,但直接应用主要的秘密共享方法,包括视觉密码(VC)和基于多项式的秘密共享,存在一些问题。本文首先描述了秘密数据融合不同于秘密共享的应用场景(即秘密数据融合)及其需求。在此基础上,提出了一种基于中国剩余定理的秘密数据融合方法。理论分析和实验验证了该方法的有效性。
{"title":"Secret Data Fusion Based on Chinese Remainder Theorem","authors":"Yuliang Lu, Xuehu Yan, Lintao Liu, Jingju Liu, Guozheng Yang, Qiang Li","doi":"10.1109/ICIVC.2018.8492875","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492875","url":null,"abstract":"In some high-level secure applications in need of multiple participants input their own secret data to achieve access control, such as, secure cabinet opened by multiple owners together, traditional security technology is not applicable. Although secret sharing may be used in the scenarios, there are some problems when directly applying primary secret sharing methods including visual cryptography (VC) and polynomial-based secret sharing. In this paper, we first describe the application scenario (namely secret data fusion) and its requirements, where secret data fusion is different from secret sharing. Then, we propose a possible method for secret data fusion based on Chinese remainder theorem (CRT). Theoretical analyses and experiments are examined to represent the effectiveness of our method.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"151 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Level Set Model Originated from Fuzzy Connectedness Guided Initial Contours 一种基于模糊连通性引导初始轮廓的水平集模型
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492772
Yiwei Liu, Peirui Bai, Chang Li, Yue Zhao
Level set models are widely used in the image segmentation field. However, the sensitivity of the initial contours and the manual adjustment of the controlling parameters have limited the segmentation performance. To effectively solve this problem, a novel level set model utilizing both intensity and spatial information is proposed in this paper. Firstly, the fuzzy connectedness (FC) algorithm is applied to obtain the appropriate initial contours, and as a result the complexity and computation cost of building initial contours is reduced. Secondly, based on the morphological characteristics of the initial contours and the parameters of fuzzy connectedness, several equations are proposed to automatically estimate the controlling parameters of the level set evolution and avoid human intervention. Finally, the region-scalable fitting (RSF) model is adopted to evolve and obtain the final robust segmentation results. The efficiency and accuracy of the model proposed in this paper is verified by comparing the three quantitative indexes of time, Dice similarity coefficient (DSC) and peak signal to noise ratio (PSNR) with four different initialized level set models.
水平集模型在图像分割领域得到了广泛的应用。然而,初始轮廓的敏感性和控制参数的手动调整限制了分割性能。为了有效地解决这一问题,本文提出了一种同时利用强度和空间信息的水平集模型。首先,利用模糊连通性(FC)算法获得合适的初始轮廓,降低了初始轮廓的构建复杂度和计算量;其次,根据初始轮廓的形态特征和模糊连度参数,提出了自动估计水平集进化控制参数的方程,避免了人为干预;最后,采用区域可扩展拟合(RSF)模型进行演化,得到最终的鲁棒分割结果。通过对比四种不同初始化水平集模型的时间、Dice相似系数(DSC)和峰值信噪比(PSNR)三个定量指标,验证了本文模型的有效性和准确性。
{"title":"A Novel Level Set Model Originated from Fuzzy Connectedness Guided Initial Contours","authors":"Yiwei Liu, Peirui Bai, Chang Li, Yue Zhao","doi":"10.1109/ICIVC.2018.8492772","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492772","url":null,"abstract":"Level set models are widely used in the image segmentation field. However, the sensitivity of the initial contours and the manual adjustment of the controlling parameters have limited the segmentation performance. To effectively solve this problem, a novel level set model utilizing both intensity and spatial information is proposed in this paper. Firstly, the fuzzy connectedness (FC) algorithm is applied to obtain the appropriate initial contours, and as a result the complexity and computation cost of building initial contours is reduced. Secondly, based on the morphological characteristics of the initial contours and the parameters of fuzzy connectedness, several equations are proposed to automatically estimate the controlling parameters of the level set evolution and avoid human intervention. Finally, the region-scalable fitting (RSF) model is adopted to evolve and obtain the final robust segmentation results. The efficiency and accuracy of the model proposed in this paper is verified by comparing the three quantitative indexes of time, Dice similarity coefficient (DSC) and peak signal to noise ratio (PSNR) with four different initialized level set models.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133130180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network IDS Duplicate Alarm Reduction Using Improved SNM Algorithm 基于改进SNM算法的网络IDS重复告警减少
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492846
Xianguang Lu, Xuehui Du, Wenjuan Wang
Intrusion detection system is an effective defense tool for finding security events. However, it will produce a large number of false positive alerts, which greatly increases the difficulty of real-time security analysis for the security managers, in actual applications. The periodic alarm produced by the wrong configuration of network devices and services, and the approximately duplicate alarm generated by different IDS for the same attack are important components of false alarm. In this paper, we improved the SNM algorithm and cleaned up the duplicate alarm in the original alarm database, which reduced the scale of the database; On the other hand, we have made statistics on the number of duplicate alarms, so that we can further find periodic alerts and remove false alarms.
入侵检测系统是发现安全事件的有效防御工具。但在实际应用中,会产生大量的误报,大大增加了安全管理人员进行实时安全分析的难度。由于网络设备和服务配置错误而产生的周期性告警,以及不同的IDS对同一攻击产生的近似重复的告警,是虚警的重要组成部分。本文对SNM算法进行了改进,对原始告警数据库中的重复告警进行了清理,减小了数据库的规模;另一方面,我们对重复报警的数量进行了统计,这样我们就可以进一步发现周期性报警并排除假报警。
{"title":"Network IDS Duplicate Alarm Reduction Using Improved SNM Algorithm","authors":"Xianguang Lu, Xuehui Du, Wenjuan Wang","doi":"10.1109/ICIVC.2018.8492846","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492846","url":null,"abstract":"Intrusion detection system is an effective defense tool for finding security events. However, it will produce a large number of false positive alerts, which greatly increases the difficulty of real-time security analysis for the security managers, in actual applications. The periodic alarm produced by the wrong configuration of network devices and services, and the approximately duplicate alarm generated by different IDS for the same attack are important components of false alarm. In this paper, we improved the SNM algorithm and cleaned up the duplicate alarm in the original alarm database, which reduced the scale of the database; On the other hand, we have made statistics on the number of duplicate alarms, so that we can further find periodic alerts and remove false alarms.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Neural Network in National Economic Forecast 神经网络在国民经济预测中的应用
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492863
Xiaofeng Yan, Jie Zhao
Prediction is a common method in data mining. In the prediction method, it can be divided into linear prediction and nonlinear prediction. The multiple linear regression method belongs to the linear regression method, and the neural network algorithm belongs to nonlinear prediction. The neural network algorithm belongs to the computational intelligence algorithm. It depends on the complexity of the system and connects the relations between the internal nodes of the neural network through the weights to process the data information. Based on multiple linear regression and neural network algorithms, this paper proposes a predictive model based on multiple linear regression and neural network, and uses this model to study national economic data. The prediction model proposed in this paper is realized by using the linear prediction result as the input neuron of the neural network. The neural network used in this paper is a radial basis function neural network, hereinafter referred to as RBF neural network.
预测是数据挖掘中的一种常用方法。在预测方法中,可分为线性预测和非线性预测。多元线性回归方法属于线性回归方法,神经网络算法属于非线性预测。神经网络算法属于计算智能算法。它根据系统的复杂程度,通过权值连接神经网络内部节点之间的关系,对数据信息进行处理。本文基于多元线性回归和神经网络算法,提出了一种基于多元线性回归和神经网络的预测模型,并利用该模型对国民经济数据进行了研究。本文提出的预测模型是利用线性预测结果作为神经网络的输入神经元来实现的。本文使用的神经网络是径向基函数神经网络,以下简称RBF神经网络。
{"title":"Application of Neural Network in National Economic Forecast","authors":"Xiaofeng Yan, Jie Zhao","doi":"10.1109/ICIVC.2018.8492863","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492863","url":null,"abstract":"Prediction is a common method in data mining. In the prediction method, it can be divided into linear prediction and nonlinear prediction. The multiple linear regression method belongs to the linear regression method, and the neural network algorithm belongs to nonlinear prediction. The neural network algorithm belongs to the computational intelligence algorithm. It depends on the complexity of the system and connects the relations between the internal nodes of the neural network through the weights to process the data information. Based on multiple linear regression and neural network algorithms, this paper proposes a predictive model based on multiple linear regression and neural network, and uses this model to study national economic data. The prediction model proposed in this paper is realized by using the linear prediction result as the input neuron of the neural network. The neural network used in this paper is a radial basis function neural network, hereinafter referred to as RBF neural network.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115872818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grab Cut Image Segmentation Based on Image Region 基于图像区域的抓取切割图像分割
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492818
Yubing Li, Jinbo Zhang, Peng Gao, Liangcheng Jiang, Ming Chen
Grab Cut algorithm is one of the most popular method in the field of image segmentation. It uses texture information and boundary information of image, and achieves good segmentation results with a small number of user interaction. But there are two significant drawbacks about this algorithm. Firstly, If the background is complex or the background and the object are very similar, the segmentation will not be very good. On the other hand, the relatively slow speed and Complex iterative process of the algorithm are greatly limited its application. In this paper, to develop these aspects, we proposed an improved grab cut algorithm. This algorithm is the combination of grab cut and graph-based image segmentation [1]. After the experiment, the improved algorithm is applied to more complex situation.
Grab Cut算法是图像分割领域中最流行的方法之一。它利用图像的纹理信息和边界信息,在用户交互较少的情况下获得了良好的分割效果。但是这个算法有两个明显的缺点。首先,如果背景比较复杂或者背景和目标非常相似,分割效果就不是很好。另一方面,该算法相对较慢的速度和复杂的迭代过程极大地限制了其应用。针对这些问题,本文提出了一种改进的抓取切割算法。该算法结合了抓取切割和基于图的图像分割[1]。经过实验,将改进后的算法应用于更复杂的情况。
{"title":"Grab Cut Image Segmentation Based on Image Region","authors":"Yubing Li, Jinbo Zhang, Peng Gao, Liangcheng Jiang, Ming Chen","doi":"10.1109/ICIVC.2018.8492818","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492818","url":null,"abstract":"Grab Cut algorithm is one of the most popular method in the field of image segmentation. It uses texture information and boundary information of image, and achieves good segmentation results with a small number of user interaction. But there are two significant drawbacks about this algorithm. Firstly, If the background is complex or the background and the object are very similar, the segmentation will not be very good. On the other hand, the relatively slow speed and Complex iterative process of the algorithm are greatly limited its application. In this paper, to develop these aspects, we proposed an improved grab cut algorithm. This algorithm is the combination of grab cut and graph-based image segmentation [1]. After the experiment, the improved algorithm is applied to more complex situation.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117281269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Design and Implementation of T-Hash Tree in Main Memory Data Base 内存数据库中t -哈希树的设计与实现
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492865
Zhiqiang Hu, Meiqi Hu
There are some shortcomings for the cache sensitivity of the index in main memory database, so a new index structure is proposed. T -tree index is studied individually ever before, so as Hash index. Combined with the analysis of the two index structure, a new index structure called the T-Hash tree is introduced. Through analyzing the times of the T -Hash tree cache sensitive and testing the performance of the query, insert, delete operation, the results show that the T -Hash tree can effectively reduce the times of cache sensitive, and as the amount of the data is large, the query, insert, delete efficiency of the T -Hash tree is higher than the T tree.
针对当前主存数据库索引在缓存敏感性方面存在的不足,提出了一种新的索引结构。T树索引以前是单独研究的,哈希索引也是。结合对两种索引结构的分析,引入了一种新的索引结构,称为t -哈希树。通过对T -哈希树缓存敏感的次数进行分析,并对查询、插入、删除操作的性能进行测试,结果表明,T -哈希树可以有效地减少缓存敏感的次数,并且当数据量较大时,T -哈希树的查询、插入、删除效率要高于T树。
{"title":"Design and Implementation of T-Hash Tree in Main Memory Data Base","authors":"Zhiqiang Hu, Meiqi Hu","doi":"10.1109/ICIVC.2018.8492865","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492865","url":null,"abstract":"There are some shortcomings for the cache sensitivity of the index in main memory database, so a new index structure is proposed. T -tree index is studied individually ever before, so as Hash index. Combined with the analysis of the two index structure, a new index structure called the T-Hash tree is introduced. Through analyzing the times of the T -Hash tree cache sensitive and testing the performance of the query, insert, delete operation, the results show that the T -Hash tree can effectively reduce the times of cache sensitive, and as the amount of the data is large, the query, insert, delete efficiency of the T -Hash tree is higher than the T tree.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Better Soft-Tissue Segmentation Based on Gestalt Psychology 基于格式塔心理学的更好的软组织分割
Pub Date : 2018-06-01 DOI: 10.1109/ICIVC.2018.8492830
Qirong Bo, Jun Feng, P. Li, Zhaohui Lv, Jing Zhang
According to gestalt psychology theory, the human brain merges and simplifies unrelated units by some relations through eyes for subsequent cognition. We introduce a new segmentation framework based on gestalt psychology in this paper. An input image is first divided into visual patches using two gestalt principles, similarity and proximity, by a clustering method, and then the visual patches are grouped to form soft tissues by a classification step using the spatial relationship and texture features. We evaluated the proposed method using TCIA database at both sectional level and volumetric level. The experimental results demonstrated the efficiency and robustness of the presented method and indicated its promising applications in the field of medical image processing.
格式塔心理学理论认为,人脑通过眼睛将不相关的单元通过某种关系进行合并和简化,以进行后续认知。本文介绍了一种新的基于格式塔心理学的分割框架。该方法首先利用相似度和接近度两种格式塔原理,通过聚类方法将输入图像划分为视觉块,然后利用空间关系和纹理特征对视觉块进行分类,形成软组织。我们使用TCIA数据库在截面水平和体积水平上对所提出的方法进行了评估。实验结果证明了该方法的有效性和鲁棒性,在医学图像处理领域具有广阔的应用前景。
{"title":"Towards Better Soft-Tissue Segmentation Based on Gestalt Psychology","authors":"Qirong Bo, Jun Feng, P. Li, Zhaohui Lv, Jing Zhang","doi":"10.1109/ICIVC.2018.8492830","DOIUrl":"https://doi.org/10.1109/ICIVC.2018.8492830","url":null,"abstract":"According to gestalt psychology theory, the human brain merges and simplifies unrelated units by some relations through eyes for subsequent cognition. We introduce a new segmentation framework based on gestalt psychology in this paper. An input image is first divided into visual patches using two gestalt principles, similarity and proximity, by a clustering method, and then the visual patches are grouped to form soft tissues by a classification step using the spatial relationship and texture features. We evaluated the proposed method using TCIA database at both sectional level and volumetric level. The experimental results demonstrated the efficiency and robustness of the presented method and indicated its promising applications in the field of medical image processing.","PeriodicalId":173981,"journal":{"name":"2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1