首页 > 最新文献

Image Processing & Communications最新文献

英文 中文
A New Idea of Fast Three-Dimensional Median Filtering for Despeckling of Optical Coherence Tomography Images 光学相干层析成像去斑的快速三维中值滤波新思路
Pub Date : 2015-09-01 DOI: 10.1515/ipc-2015-0037
J. Gocławski, J. Sekulska-Nalewajko
Abstract Median filtering has been widely used in image processing for noise removal because it can significantly reduce the power of noise while limiting edge blurring. This filtering is still a challenging task in the case of three-dimensional images containing up to a billion of voxels, especially for large size filtering windows. The authors encountered the problem when applying median filter to speckle noise reduction in optical coherence tomography images acquired by the Spark OCT systems. In the paper a new approach to the GPU (Graphics Processing Unit) based median smoothing has been proposed, which uses two-step evaluation of local intensity histograms stored in the shared memory of a graphic device. The solution is able to output about 50 million voxels per second while processing the neighbourhood of 125 voxels by Quadro K6000 graphic card configured on the Kepler architecture.
中值滤波由于能够在抑制边缘模糊的同时显著降低噪声的强度,在图像处理中得到了广泛的应用。在包含多达10亿体素的三维图像的情况下,这种过滤仍然是一项具有挑战性的任务,特别是对于大尺寸的过滤窗口。在对Spark OCT系统获得的光学相干层析成像图像进行中值滤波降噪时,作者遇到了这个问题。本文提出了一种基于GPU(图形处理单元)的中值平滑的新方法,该方法对存储在图形设备共享内存中的局部强度直方图进行两步评估。该解决方案能够每秒输出约5000万体素,同时通过在开普勒架构上配置的Quadro K6000图形卡处理邻近的125体素。
{"title":"A New Idea of Fast Three-Dimensional Median Filtering for Despeckling of Optical Coherence Tomography Images","authors":"J. Gocławski, J. Sekulska-Nalewajko","doi":"10.1515/ipc-2015-0037","DOIUrl":"https://doi.org/10.1515/ipc-2015-0037","url":null,"abstract":"Abstract Median filtering has been widely used in image processing for noise removal because it can significantly reduce the power of noise while limiting edge blurring. This filtering is still a challenging task in the case of three-dimensional images containing up to a billion of voxels, especially for large size filtering windows. The authors encountered the problem when applying median filter to speckle noise reduction in optical coherence tomography images acquired by the Spark OCT systems. In the paper a new approach to the GPU (Graphics Processing Unit) based median smoothing has been proposed, which uses two-step evaluation of local intensity histograms stored in the shared memory of a graphic device. The solution is able to output about 50 million voxels per second while processing the neighbourhood of 125 voxels by Quadro K6000 graphic card configured on the Kepler architecture.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
3D Reconstruction of Funnel Flow Boundary Using Automatic Point Set Extraction 基于自动点集提取的漏斗流边界三维重建
Pub Date : 2015-09-01 DOI: 10.1515/ipc-2015-0038
Selam Waktola, K. Grudzień, L. Babout
Abstract The paper presents an automatic point set extraction method for reconstructing 3D tomography images of funnel flow boundary. The method clearly shows the boundary between the funnel flow and stagnant zone during silo discharging process. After adjusting the contrast of the original X-ray CT image and applying filter function, the intensity profile of the image shows a high jump corresponding to the local flow boundary position at a specific height of the silo model. By extracting and connecting those jump points gave us a boundary line of the funnel flow from the stagnant. The outcome of segmented image opens a door for analysing further about funnel flow in 3D images.
摘要提出了一种自动点集提取方法,用于重建漏斗流边界三维断层图像。该方法清晰地显示了筒仓卸料过程中漏斗流与停滞区之间的边界。在对原始x射线CT图像进行对比度调整并应用滤波函数后,图像的强度轮廓呈现出一个跳高,对应于筒仓模型特定高度处的局部流动边界位置。通过提取和连接这些跳跃点,我们得到了漏斗流与停滞流的边界线。图像分割结果为进一步分析三维图像中的漏斗流打开了一扇大门。
{"title":"3D Reconstruction of Funnel Flow Boundary Using Automatic Point Set Extraction","authors":"Selam Waktola, K. Grudzień, L. Babout","doi":"10.1515/ipc-2015-0038","DOIUrl":"https://doi.org/10.1515/ipc-2015-0038","url":null,"abstract":"Abstract The paper presents an automatic point set extraction method for reconstructing 3D tomography images of funnel flow boundary. The method clearly shows the boundary between the funnel flow and stagnant zone during silo discharging process. After adjusting the contrast of the original X-ray CT image and applying filter function, the intensity profile of the image shows a high jump corresponding to the local flow boundary position at a specific height of the silo model. By extracting and connecting those jump points gave us a boundary line of the funnel flow from the stagnant. The outcome of segmented image opens a door for analysing further about funnel flow in 3D images.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation of Dishes for Customer Service Automation in a Self-service Canteen 自助食堂客户服务自动化的菜品分割
Pub Date : 2015-06-01 DOI: 10.1515/ipc-2015-0030
T. Kryjak, Damian Krol, M. Gorgon
Abstract The article describes research on dishes segmentation for the purposes of customer service process automation in a self-service canteen. The project assumptions and a prototype test stand are presented. The developed empty workspace detection and tray position determination algorithms are discussed. Finally, the chosen dishes segmentation algorithm is described and justified.
摘要本文以自助餐厅客户服务流程自动化为目的,对菜品细分进行了研究。给出了方案设想和原型试验台。讨论了已开发的空工作空间检测和托盘位置确定算法。最后,对所选菜品分割算法进行了描述和论证。
{"title":"Segmentation of Dishes for Customer Service Automation in a Self-service Canteen","authors":"T. Kryjak, Damian Krol, M. Gorgon","doi":"10.1515/ipc-2015-0030","DOIUrl":"https://doi.org/10.1515/ipc-2015-0030","url":null,"abstract":"Abstract The article describes research on dishes segmentation for the purposes of customer service process automation in a self-service canteen. The project assumptions and a prototype test stand are presented. The developed empty workspace detection and tray position determination algorithms are discussed. Finally, the chosen dishes segmentation algorithm is described and justified.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ray-Tracing-Based Event Detection and 3D Visualization for Automated Video Surveillance System 基于光线跟踪的自动视频监控系统事件检测与三维可视化
Pub Date : 2015-06-01 DOI: 10.1515/ipc-2015-0032
J. Przybyło, M. Jablonski
Abstract Automated and intelligent video surveillance systems play important role in current home care and facilities security applications. Among many research problems is graphical visualization of semantic messages to the human operator that he can percept information in more natural way. The other essential research question is how to recognize 3D objects and their state on the monitored scene only from their views (2D images from the camera). In this paper we continue our previous work on data fusion in visualization of 3D scene semantic model and propose to recognize events and states of scene objects under surveillance in an automatic way using feedback provided by the renderer. We developed ray-tracing based visualization for surveillance system, that is capable of recognizing object’s state and at the same time present relevant information to the human operator.
自动化和智能视频监控系统在当前家庭护理和设施安全应用中发挥着重要作用。在众多的研究问题中,语义信息的图形化可视化使人类操作员能够以更自然的方式感知信息。另一个重要的研究问题是如何仅从其视图(来自摄像机的2D图像)识别3D物体及其在监控场景中的状态。在本文中,我们继续在三维场景语义模型可视化中的数据融合方面的工作,提出利用渲染器提供的反馈自动识别监视下的场景对象的事件和状态。我们开发了基于光线追踪的可视化监控系统,该系统能够识别物体的状态,同时向操作员提供相关信息。
{"title":"Ray-Tracing-Based Event Detection and 3D Visualization for Automated Video Surveillance System","authors":"J. Przybyło, M. Jablonski","doi":"10.1515/ipc-2015-0032","DOIUrl":"https://doi.org/10.1515/ipc-2015-0032","url":null,"abstract":"Abstract Automated and intelligent video surveillance systems play important role in current home care and facilities security applications. Among many research problems is graphical visualization of semantic messages to the human operator that he can percept information in more natural way. The other essential research question is how to recognize 3D objects and their state on the monitored scene only from their views (2D images from the camera). In this paper we continue our previous work on data fusion in visualization of 3D scene semantic model and propose to recognize events and states of scene objects under surveillance in an automatic way using feedback provided by the renderer. We developed ray-tracing based visualization for surveillance system, that is capable of recognizing object’s state and at the same time present relevant information to the human operator.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation of Objects in Log-Polar Space 对数极坐标空间中物体的分割
Pub Date : 2015-06-01 DOI: 10.1515/ipc-2015-0034
Z. Bublinski, P. Pawlik
Abstract The aim of this work was to develop a simple and fast yet robust algorithm for segmentation of objects in log-polar space. Assuming that some interesting parts of an image are selected by fixation of point of attention, pixels located close to fixation points are transformed to a log-polar space, then edge detection is performed. As a final step, detected edges are processed in a specific manner, which should lead to obtain boundaries of objects. After some smoothing, the detected boundaries are transformed back to a Cartesian space and are superimposed on an original image in order to show results of segmentation.
摘要本文的目的是开发一种简单、快速、鲁棒的对数极空间目标分割算法。假设通过注视点选择图像中感兴趣的部分,将注视点附近的像素点转换为对数极坐标空间,然后进行边缘检测。最后一步,对检测到的边缘进行特定的处理,从而得到目标的边界。经过一定的平滑处理后,将检测到的边界转换回笛卡尔空间,并叠加在原始图像上,以显示分割结果。
{"title":"Segmentation of Objects in Log-Polar Space","authors":"Z. Bublinski, P. Pawlik","doi":"10.1515/ipc-2015-0034","DOIUrl":"https://doi.org/10.1515/ipc-2015-0034","url":null,"abstract":"Abstract The aim of this work was to develop a simple and fast yet robust algorithm for segmentation of objects in log-polar space. Assuming that some interesting parts of an image are selected by fixation of point of attention, pixels located close to fixation points are transformed to a log-polar space, then edge detection is performed. As a final step, detected edges are processed in a specific manner, which should lead to obtain boundaries of objects. After some smoothing, the detected boundaries are transformed back to a Cartesian space and are superimposed on an original image in order to show results of segmentation.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123811153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ground Truth Generating Tool for Traffic Video Detector 地面真相生成工具的交通视频检测器
Pub Date : 2015-06-01 DOI: 10.1515/ipc-2015-0031
Szymon Bigaj, A. Glowacz, Jacek Kościow, Z. Mikrut, P. Pawlik
Abstract The paper presents an application for generating ground truth data for the purposes of video detection and justifies its use in systems which analyze road traffic videos. The usefulness of described application in the development of video detection software is presented - especially during scene configuration and comparative analysis of video detection results versus ground truth data. The latter is possible due to simplicity of the result text files generated in a similar way both by the presented application and by the video detection algorithm. Two exemplary applications of the tool designed to generate ground truth data are presented, together with a discussion of their construction, functionality and abilities.
摘要:本文介绍了一种用于视频检测目的的地面真值数据的生成应用,并证明了其在道路交通视频分析系统中的应用。介绍了所描述的应用程序在视频检测软件开发中的有用性-特别是在场景配置和视频检测结果与地面真实数据的比较分析中。后者是可能的,因为所提供的应用程序和视频检测算法以类似的方式生成的结果文本文件很简单。介绍了该工具的两个示例应用程序,用于生成地面真值数据,并讨论了它们的构造、功能和能力。
{"title":"Ground Truth Generating Tool for Traffic Video Detector","authors":"Szymon Bigaj, A. Glowacz, Jacek Kościow, Z. Mikrut, P. Pawlik","doi":"10.1515/ipc-2015-0031","DOIUrl":"https://doi.org/10.1515/ipc-2015-0031","url":null,"abstract":"Abstract The paper presents an application for generating ground truth data for the purposes of video detection and justifies its use in systems which analyze road traffic videos. The usefulness of described application in the development of video detection software is presented - especially during scene configuration and comparative analysis of video detection results versus ground truth data. The latter is possible due to simplicity of the result text files generated in a similar way both by the presented application and by the video detection algorithm. Two exemplary applications of the tool designed to generate ground truth data are presented, together with a discussion of their construction, functionality and abilities.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"16 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of QR-Codes in Digital Images Based on Histogram Similarity 基于直方图相似度的数字图像qr码检测
Pub Date : 2015-06-01 DOI: 10.1515/ipc-2015-0033
Karol Ciazynski, A. Fabijańska
Abstract This paper considers the problem of QR codes detection in digital images. In particular, the approach for detection of QR codes is proposed. The approach is based on histogram correlation between the reference image of QR code and the input image. In particular the input image is firstly divided into blocks. These are next used to build binary map of regions similar and dissimilar in terms of histogram to the image of QR code. On the binary map the morphological operations are next applied in order to remove outliers and identify the QR code. The results of applying the introduced approach to various images are presented and discussed. Different lighting conditions, image resolutions and orientations of QR codes are considered.
本文研究了数字图像中QR码的检测问题。特别提出了QR码的检测方法。该方法基于QR码参考图像与输入图像之间的直方图相关性。首先对输入图像进行分块处理。然后用这些来构建QR码图像的直方图相似和不相似区域的二值图。在二值图上,接下来应用形态学操作以去除异常值并识别QR码。介绍并讨论了将该方法应用于各种图像的结果。考虑了不同的光照条件、图像分辨率和QR码的方向。
{"title":"Detection of QR-Codes in Digital Images Based on Histogram Similarity","authors":"Karol Ciazynski, A. Fabijańska","doi":"10.1515/ipc-2015-0033","DOIUrl":"https://doi.org/10.1515/ipc-2015-0033","url":null,"abstract":"Abstract This paper considers the problem of QR codes detection in digital images. In particular, the approach for detection of QR codes is proposed. The approach is based on histogram correlation between the reference image of QR code and the input image. In particular the input image is firstly divided into blocks. These are next used to build binary map of regions similar and dissimilar in terms of histogram to the image of QR code. On the binary map the morphological operations are next applied in order to remove outliers and identify the QR code. The results of applying the introduced approach to various images are presented and discussed. Different lighting conditions, image resolutions and orientations of QR codes are considered.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"796 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Radiated Information Infiltration Channel Concerning Programme Based Solutions for Information Protection Prior to its Non-Invasive Acquisition 非侵入性获取前基于程序的信息保护方案的辐射信息渗透通道
Pub Date : 2015-03-01 DOI: 10.1515/ipc-2015-0026
I. Kubiak
Abstract The methods for protection of non-public information against electromagnetic infiltration are very important issue that requires constant development of technological advancement of the devices on which such information is processed. The current methods are the solutions regarding construction of the devices and organisation oriented solutions that are related mainly to physically limiting access to such information. The new area concerning electromagnetic protection of processed information by means of electricity is the programme based methods. These, however, do not deal with the issues of cryptographic information protection. The programme based protection uses special shapes of fonts, which having passed through the Radiated Information Infiltration Channel (RIIC) make reading of protected data impossible. This is achieved through eliminating specific character elements (roots, sheriffs, arcs) and maximising the degree of similarity between them. However, the assimilation should not make the original characters, i.e. those displayed on the screen of the device that processes these data harder to differentiate between them. Yet, is maximising the degree of similarity between the characters of a safe font decisive for electromagnetic security? The article presents two font solutions of similar character shape, which are however much different from one another in terms of their degree of recognisability on the output of the RIIC due to structural detail. This shows that maximising similarity between characters in their original form does not have to increase the degree of resistance to recognition of the secondary characters.
如何保护非公开信息免受电磁渗透是一个非常重要的问题,需要处理这些信息的设备不断发展技术进步。目前的方法是关于设备结构的解决方案和面向组织的解决方案,这些解决方案主要与物理上限制对此类信息的访问有关。基于程序的方法是利用电对处理过的信息进行电磁保护的新领域。然而,这些并没有处理加密信息保护的问题。基于程序的保护使用特殊形状的字体,这些字体通过了辐射信息渗透通道(RIIC),使受保护的数据无法读取。这是通过消除特定的角色元素(根,警长,弧线)并最大化它们之间的相似性来实现的。但是,同化不应该使原始字符,即处理这些数据的设备屏幕上显示的字符难以区分它们。然而,最大限度地提高安全字体字符之间的相似性是否对电磁安全起决定性作用?本文提出了两种类似字符形状的字体解决方案,但由于结构细节的原因,它们在RIIC输出上的可识别程度方面存在很大差异。这表明,最大限度地提高原始形式字符之间的相似性并不一定会增加对次要字符识别的抵抗程度。
{"title":"Radiated Information Infiltration Channel Concerning Programme Based Solutions for Information Protection Prior to its Non-Invasive Acquisition","authors":"I. Kubiak","doi":"10.1515/ipc-2015-0026","DOIUrl":"https://doi.org/10.1515/ipc-2015-0026","url":null,"abstract":"Abstract The methods for protection of non-public information against electromagnetic infiltration are very important issue that requires constant development of technological advancement of the devices on which such information is processed. The current methods are the solutions regarding construction of the devices and organisation oriented solutions that are related mainly to physically limiting access to such information. The new area concerning electromagnetic protection of processed information by means of electricity is the programme based methods. These, however, do not deal with the issues of cryptographic information protection. The programme based protection uses special shapes of fonts, which having passed through the Radiated Information Infiltration Channel (RIIC) make reading of protected data impossible. This is achieved through eliminating specific character elements (roots, sheriffs, arcs) and maximising the degree of similarity between them. However, the assimilation should not make the original characters, i.e. those displayed on the screen of the device that processes these data harder to differentiate between them. Yet, is maximising the degree of similarity between the characters of a safe font decisive for electromagnetic security? The article presents two font solutions of similar character shape, which are however much different from one another in terms of their degree of recognisability on the output of the RIIC due to structural detail. This shows that maximising similarity between characters in their original form does not have to increase the degree of resistance to recognition of the secondary characters.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A DDoS Attacks Detection Based on Conditional Heteroscedastic Time Series Models 基于条件异方差时间序列模型的DDoS攻击检测
Pub Date : 2015-03-01 DOI: 10.1515/ipc-2015-0027
T. Andrysiak, Ł. Saganowski, M. Maszewski, Piotr Grad
Abstract Dynamic development of various systems providing safety and protection to network infrastructure from novel, unknown attacks is currently an intensively explored and developed domain. In the present article there is presented an attempt to redress the problem by variability estimation with the use of conditional variation. The predictions of this variability were based on the estimated conditional heteroscedastic statistical models ARCH, GARCH and FIGARCH. The method used for estimating the parameters of the exploited models was determined by calculating maximum likelihood function. With the use of compromise between conciseness of representation and the size of estimation error there has been selected as a sparingly parameterized form of models. In order to detect an attack-/anomaly in the network traffic there were used differences between the actual network traffic and the estimated model of the traffic. The presented research confirmed efficacy of the described method and cogency of the choice of statistical models.
动态开发各种系统,为网络基础设施提供安全和保护,使其免受新的未知攻击,是目前一个深入探索和发展的领域。在本文中,提出了一种尝试,通过使用条件变化的变异性估计来纠正这个问题。这种变异的预测是基于估计的条件异方差统计模型ARCH、GARCH和FIGARCH。通过计算极大似然函数确定了所开发模型参数的估计方法。利用表征的简洁性和估计误差的大小之间的折衷,选择了一种节省参数化的模型形式。为了检测网络流量中的攻击/异常,使用了实际网络流量与流量估计模型之间的差异。本研究证实了所述方法的有效性和统计模型选择的有效性。
{"title":"A DDoS Attacks Detection Based on Conditional Heteroscedastic Time Series Models","authors":"T. Andrysiak, Ł. Saganowski, M. Maszewski, Piotr Grad","doi":"10.1515/ipc-2015-0027","DOIUrl":"https://doi.org/10.1515/ipc-2015-0027","url":null,"abstract":"Abstract Dynamic development of various systems providing safety and protection to network infrastructure from novel, unknown attacks is currently an intensively explored and developed domain. In the present article there is presented an attempt to redress the problem by variability estimation with the use of conditional variation. The predictions of this variability were based on the estimated conditional heteroscedastic statistical models ARCH, GARCH and FIGARCH. The method used for estimating the parameters of the exploited models was determined by calculating maximum likelihood function. With the use of compromise between conciseness of representation and the size of estimation error there has been selected as a sparingly parameterized form of models. In order to detect an attack-/anomaly in the network traffic there were used differences between the actual network traffic and the estimated model of the traffic. The presented research confirmed efficacy of the described method and cogency of the choice of statistical models.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Image Separation Algorithm Based on Joint PDF of Mixed Images 基于混合图像联合PDF的数字图像分离算法
Pub Date : 2015-03-01 DOI: 10.1515/ipc-2015-0025
M. Wajid, Mayank Sharma
Abstract In this article, we have presented an algorithm for separating the mixed or fused images. We have considered that the two independent histogram equalized digital images are linearly mixed, and the joint probability density function (PDF) or the scatter plot of the two observed or mixed images is used for separation. The objective and subjective separation results are presented, and observed to be better than the other existing techniques in terms of Peak signal-to-noise ratio (PSNR) and Signal-to-interference ratio (SIR).
在本文中,我们提出了一种分离混合或融合图像的算法。我们认为两个独立的直方图均衡化的数字图像是线性混合的,使用联合概率密度函数(PDF)或两个观测图像或混合图像的散点图进行分离。给出了客观和主观分离结果,并观察到在峰值信噪比(PSNR)和信干扰比(SIR)方面优于其他现有技术。
{"title":"Digital Image Separation Algorithm Based on Joint PDF of Mixed Images","authors":"M. Wajid, Mayank Sharma","doi":"10.1515/ipc-2015-0025","DOIUrl":"https://doi.org/10.1515/ipc-2015-0025","url":null,"abstract":"Abstract In this article, we have presented an algorithm for separating the mixed or fused images. We have considered that the two independent histogram equalized digital images are linearly mixed, and the joint probability density function (PDF) or the scatter plot of the two observed or mixed images is used for separation. The objective and subjective separation results are presented, and observed to be better than the other existing techniques in terms of Peak signal-to-noise ratio (PSNR) and Signal-to-interference ratio (SIR).","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Image Processing & Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1