首页 > 最新文献

2013 IEEE Third International Conference on Information Science and Technology (ICIST)最新文献

英文 中文
Session 20: Ubi/cloud computing 20场:Ubi/云计算
Xiaobin Wang, Malu Zhang, Yuanjing Yang
{"title":"Session 20: Ubi/cloud computing","authors":"Xiaobin Wang, Malu Zhang, Yuanjing Yang","doi":"10.1109/icist.2013.6747630","DOIUrl":"https://doi.org/10.1109/icist.2013.6747630","url":null,"abstract":"","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multicarrier-based physical layer security scheme for the multicast systems 一种基于多载波的多播系统物理层安全方案
Tong Lin, Kai-zhi Huang, W. Luo
Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than that of the receivers, which is not practical in the multicasting system. To solve this problem, a multicarrier-based physical layer security scheme for the multicast systems is proposed, which takes the advantage of both space and frequency domain to form a relatively virtual multi-antenna system. Through subcarrier allocation the existence of null space in every subcarrier channel matrix is guaranteed, so that the artificial noise can be added to ensure a secure communication. Based on the Kuhn-Tucher condition, an optimal power allocation method is also proposed to maximize the security rates under the restriction of total power. Simulation results indicate that this scheme is unlimited by the amount of the sender antennas, and it improves the security rates by 2 bit/s/Hz than the average power allocation method.
传统的物理层安全方法,如人工噪声,通常要求发送方的天线数量多于接收方的天线数量,这在多播系统中是不实用的。为了解决这一问题,提出了一种基于多载波的多播系统物理层安全方案,该方案利用空间域和频域的优势,形成一个相对虚拟的多天线系统。通过子载波分配,保证了每个子载波信道矩阵中存在零空间,从而增加了人工噪声,保证了通信的安全性。基于Kuhn-Tucher条件,提出了在总功率约束下安全率最大化的最优功率分配方法。仿真结果表明,该方案不受发送端天线数量的限制,比一般的功率分配方法提高了2 bit/s/Hz的安全速率。
{"title":"A multicarrier-based physical layer security scheme for the multicast systems","authors":"Tong Lin, Kai-zhi Huang, W. Luo","doi":"10.1109/ICIST.2013.6747839","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747839","url":null,"abstract":"Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than that of the receivers, which is not practical in the multicasting system. To solve this problem, a multicarrier-based physical layer security scheme for the multicast systems is proposed, which takes the advantage of both space and frequency domain to form a relatively virtual multi-antenna system. Through subcarrier allocation the existence of null space in every subcarrier channel matrix is guaranteed, so that the artificial noise can be added to ensure a secure communication. Based on the Kuhn-Tucher condition, an optimal power allocation method is also proposed to maximize the security rates under the restriction of total power. Simulation results indicate that this scheme is unlimited by the amount of the sender antennas, and it improves the security rates by 2 bit/s/Hz than the average power allocation method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The community detection algorithm based on transferring the similarity 基于相似性转移的群体检测算法
D. Niu, Hongchang Chen, Lixiong Liu
For global community detection algorithm having high computation complexity and local community detection algorithm working bad in community quality, in this paper we propose an algorithm by finding the core nodes in different communities first, then use an algorithm based on transferring the similarity we propose in this paper to measure the similarity between core nodes with other nodes. Finally we divide the network by the similarity calculation results.The proposed algorithm is tested on both our network and common networks, and is compared with the typical algorithms in community detection. Experimental results verify and confirm the feasibility and validity of the proposed algorithm.
针对全局社区检测算法计算复杂度高、局部社区检测算法社区质量差的问题,本文提出了一种先在不同社区中找到核心节点,然后利用本文提出的基于相似性转移的算法来度量核心节点与其他节点之间的相似度的算法。最后根据相似度计算结果对网络进行划分。该算法在我们的网络和普通网络上进行了测试,并与社区检测中的典型算法进行了比较。实验结果验证了所提算法的可行性和有效性。
{"title":"The community detection algorithm based on transferring the similarity","authors":"D. Niu, Hongchang Chen, Lixiong Liu","doi":"10.1109/ICIST.2013.6747672","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747672","url":null,"abstract":"For global community detection algorithm having high computation complexity and local community detection algorithm working bad in community quality, in this paper we propose an algorithm by finding the core nodes in different communities first, then use an algorithm based on transferring the similarity we propose in this paper to measure the similarity between core nodes with other nodes. Finally we divide the network by the similarity calculation results.The proposed algorithm is tested on both our network and common networks, and is compared with the typical algorithms in community detection. Experimental results verify and confirm the feasibility and validity of the proposed algorithm.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123398729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of emotional scenes in facial expressional recognition: Priming versus contextual effect 情绪场景在面部表情识别中的作用:启动与情境效应
Xiaowen Zhang, Zhaomin Liu, Yuming Xuan
Objects were better recognized in consistent scenes (where objects appeared frequently) than inconsistent scenes (where objects appeared rarely). This consistency effect also was found in the facial expressional recognition in scenes. However, the underlying mechanisms of expressional recognition in scenes were not clear. In the present study, we addressed the question of whether emotional scenes influenced recognition of facial expression through top-down priming effect. In two experiments, emotional scenes and facial expressions were presented sequentially or simultaneously and participants were instructed to categorize facial expressions, ignoring scenes. Similar consistency effects and happy face advantage were observed which suggested emotional scenes automatically influenced expressional recognition through priming effect.
物体在一致的场景中(物体经常出现)比在不一致的场景中(物体很少出现)被更好地识别。这种一致性效应也存在于场景中的面部表情识别中。然而,场景中表情识别的潜在机制尚不清楚。在本研究中,我们探讨了情绪场景是否通过自上而下的启动效应影响面部表情的识别。在两个实验中,情绪场景和面部表情按顺序或同时呈现,参与者被要求对面部表情进行分类,忽略场景。相似的一致性效应和快乐面孔优势表明情绪场景通过启动效应自动影响表情识别。
{"title":"The role of emotional scenes in facial expressional recognition: Priming versus contextual effect","authors":"Xiaowen Zhang, Zhaomin Liu, Yuming Xuan","doi":"10.1109/ICIST.2013.6747489","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747489","url":null,"abstract":"Objects were better recognized in consistent scenes (where objects appeared frequently) than inconsistent scenes (where objects appeared rarely). This consistency effect also was found in the facial expressional recognition in scenes. However, the underlying mechanisms of expressional recognition in scenes were not clear. In the present study, we addressed the question of whether emotional scenes influenced recognition of facial expression through top-down priming effect. In two experiments, emotional scenes and facial expressions were presented sequentially or simultaneously and participants were instructed to categorize facial expressions, ignoring scenes. Similar consistency effects and happy face advantage were observed which suggested emotional scenes automatically influenced expressional recognition through priming effect.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126734766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power swing reduction in synchronous generators via SVC designed with sliding mode control 采用滑模控制的SVC控制同步发电机功率摆降
Lizhi Wang, Jun Zhou
Swing equations of individual synchronous generators in multi-machine systems have strong power-swing nonlinearities. In this paper and for the first time, we introduce sliding mode control (SMC) laws to deal with power swing reduction problem in individual generators directly without linearizing their swing equations. The suggested control laws are implemented by static VAR compensators (or simply, the so-called SVC) attached to the output terminal of a generator. To improve steady-state and/or transient performances in power generation and operation of generators, we further consider adjusting the coefficients of switching function and the control gains. Numeric stimulation clearly shows that the suggested sliding mode control stabilization works well.
多机系统中单个同步发电机的摆振方程具有很强的功率摆振非线性。在本文中,我们首次引入滑模控制(SMC)律来直接处理单个发电机的功率摆动减小问题,而无需对其摆动方程进行线性化。建议的控制律是由静态无功补偿器(或简单地说,所谓的SVC)附加到发电机的输出端来实现的。为了改善发电机发电和运行中的稳态和/或暂态性能,我们进一步考虑调整开关函数系数和控制增益。数值仿真清楚地表明,所提出的滑模控制稳定效果良好。
{"title":"Power swing reduction in synchronous generators via SVC designed with sliding mode control","authors":"Lizhi Wang, Jun Zhou","doi":"10.1109/ICIST.2013.6747545","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747545","url":null,"abstract":"Swing equations of individual synchronous generators in multi-machine systems have strong power-swing nonlinearities. In this paper and for the first time, we introduce sliding mode control (SMC) laws to deal with power swing reduction problem in individual generators directly without linearizing their swing equations. The suggested control laws are implemented by static VAR compensators (or simply, the so-called SVC) attached to the output terminal of a generator. To improve steady-state and/or transient performances in power generation and operation of generators, we further consider adjusting the coefficients of switching function and the control gains. Numeric stimulation clearly shows that the suggested sliding mode control stabilization works well.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective community detection algorithm of the social networks 一种有效的社交网络社区检测算法
Yuan Huang, Wei Hou, Xiaowei Li, Shaomei Li
The traditional social network community detection algorithms generally lack of consideration of link attributes, and full expression using link attribute information model and mechanism. Aiming at this issue, this paper puts forward the community detection algorithm of social network through fusion the link and node attributes. We combine similarity of node attributes between adjacent nodes and link information, and define the similar weights. On this basis, the algorithm realizes community detection of the social network by combining condensation algorithm. Experiments show that effect of this algorithm about social network attribute is remarkable, obviously in attribute-distinct community.
传统的社交网络社区检测算法普遍缺乏对链接属性的考虑,充分利用链接属性信息的模型和机制来表达。针对这一问题,本文提出了融合链接属性和节点属性的社交网络社区检测算法。结合相邻节点间节点属性的相似度和链路信息,定义相似权值。在此基础上,结合凝聚算法实现对社交网络的社区检测。实验表明,该算法对社会网络属性的识别效果显著,在属性不同的社区中效果明显。
{"title":"An effective community detection algorithm of the social networks","authors":"Yuan Huang, Wei Hou, Xiaowei Li, Shaomei Li","doi":"10.1109/ICIST.2013.6747668","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747668","url":null,"abstract":"The traditional social network community detection algorithms generally lack of consideration of link attributes, and full expression using link attribute information model and mechanism. Aiming at this issue, this paper puts forward the community detection algorithm of social network through fusion the link and node attributes. We combine similarity of node attributes between adjacent nodes and link information, and define the similar weights. On this basis, the algorithm realizes community detection of the social network by combining condensation algorithm. Experiments show that effect of this algorithm about social network attribute is remarkable, obviously in attribute-distinct community.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An optimal pulse width modulation method for high-speed permanent magnet synchronous motor 高速永磁同步电机脉宽优化调制方法
Liyi Li, Guangjun Tan, Jiaxi Liu, B. Kou
This paper proposes an optimal pulse width modulation (PWM) method for high-speed permanent magnet synchronous motor (PMSM), which combines the proposed fundamental voltage component invariance (FVCI) PWM method ensuring the same voltage and current fundamental components as the command waveforms, with the minimum current harmonic PWM method. First, the paper regards the third harmonic injection PWM (THIPWM) with 25% third harmonic as the minimum current harmonic PWM method, and proposes a simple algorithm to generate the third harmonic based on the three-phase fundamental voltage waves. Then the paper proposes a FVCI-PWM method, which ensures that the PWM waveform has the same fundamental component as the command sinusoidal voltage waveform without current closed-loop control. The simulation and experimental results upon the 60000rpm PMSM are carried out finally to verify the effectiveness of the proposed PWM method.
本文提出了一种适用于高速永磁同步电机的最优脉宽调制方法,该方法将所提出的保证与指令波形相同的电压、电流基波分量不变(FVCI)脉宽调制方法与最小电流谐波脉宽调制方法相结合。首先,本文将三次谐波25%的三次谐波注入PWM (THIPWM)作为最小电流谐波PWM方法,提出了一种基于三相基波电压产生三次谐波的简单算法。在此基础上提出了一种FVCI-PWM方法,该方法使PWM波形与命令正弦电压波形具有相同的基元分量,无需电流闭环控制。最后在6000rpm的永磁同步电动机上进行了仿真和实验,验证了所提PWM方法的有效性。
{"title":"An optimal pulse width modulation method for high-speed permanent magnet synchronous motor","authors":"Liyi Li, Guangjun Tan, Jiaxi Liu, B. Kou","doi":"10.1109/ICIST.2013.6747543","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747543","url":null,"abstract":"This paper proposes an optimal pulse width modulation (PWM) method for high-speed permanent magnet synchronous motor (PMSM), which combines the proposed fundamental voltage component invariance (FVCI) PWM method ensuring the same voltage and current fundamental components as the command waveforms, with the minimum current harmonic PWM method. First, the paper regards the third harmonic injection PWM (THIPWM) with 25% third harmonic as the minimum current harmonic PWM method, and proposes a simple algorithm to generate the third harmonic based on the three-phase fundamental voltage waves. Then the paper proposes a FVCI-PWM method, which ensures that the PWM waveform has the same fundamental component as the command sinusoidal voltage waveform without current closed-loop control. The simulation and experimental results upon the 60000rpm PMSM are carried out finally to verify the effectiveness of the proposed PWM method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122103653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An enhanced approach to physical-layer network coding 一种增强的物理层网络编码方法
Tianming Jiang, Yuanyuan Gao, W. Fang, Baofeng Yang, Y. Long
In wireless networks, physical-layer network coding (PNC) is a practical technique to utilize the addition of two simultaneous arriving electromagnetic (EM) waves and realize exchanging messages in two time slots. When several nodes (more than two) need to exchange messages through one relay node, traditional PNC scheme can't deal with the addition of more than two EM waves. The paper proposes an enhanced physical-layer network coding scheme (EPNC) to solve this problem. Through this proposition more than two nodes can exchange messages in two time slots. A four node wireless network model is analyzed and compared with traditional data transmission (TDT) and PNC schemes in the paper. It is concluded that the proposed scheme achieves progress in throughput compared with PNC.
在无线网络中,物理层网络编码(PNC)是利用两个同时到达的电磁波的叠加,实现在两个时隙交换信息的一种实用技术。当多个节点(两个以上)需要通过一个中继节点交换消息时,传统的PNC方案无法处理两个以上电磁波的添加。本文提出了一种增强的物理层网络编码方案(EPNC)来解决这一问题。通过这个命题,两个以上的节点可以在两个时隙交换消息。分析了一种四节点无线网络模型,并与传统的数据传输(TDT)和PNC方案进行了比较。与PNC相比,该方案在吞吐量方面取得了进步。
{"title":"An enhanced approach to physical-layer network coding","authors":"Tianming Jiang, Yuanyuan Gao, W. Fang, Baofeng Yang, Y. Long","doi":"10.1109/ICIST.2013.6747795","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747795","url":null,"abstract":"In wireless networks, physical-layer network coding (PNC) is a practical technique to utilize the addition of two simultaneous arriving electromagnetic (EM) waves and realize exchanging messages in two time slots. When several nodes (more than two) need to exchange messages through one relay node, traditional PNC scheme can't deal with the addition of more than two EM waves. The paper proposes an enhanced physical-layer network coding scheme (EPNC) to solve this problem. Through this proposition more than two nodes can exchange messages in two time slots. A four node wireless network model is analyzed and compared with traditional data transmission (TDT) and PNC schemes in the paper. It is concluded that the proposed scheme achieves progress in throughput compared with PNC.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security BoxLock:基于移动端的Serpent加密算法和一次性密码机制实现,用于Dropbox文件安全
Aditya Yulianto, S. Kom, Maria Irmina Prasetiyowati
Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library. The aim of this research is to make an application for encrypting Dropbox files and therefore, to ensure uploaded files from being accessed by unauthorized parties. In this research, Serpent algorithm was implemented because of its hardware efficiency and an additional feature, OTP mechanism, was used as additional user authentication process. The research shown that encryption and decryption processes each took three seconds for processing a two megabytes file, and the file was not accessible in encrypted form.
Dropbox是一家流行的云存储提供商,它在文件安全和未经授权的访问方面构成了几个威胁。利用Dropbox应用程序编程接口(API)和Bouncy Castle库构建了一个Android和web应用程序,该应用程序实现了Serpent加密算法和一次性密码(OTP)机制,以保护Dropbox上的文件和web应用程序。这项研究的目的是使加密Dropbox文件的应用程序,因此,以确保上传的文件被未经授权的各方访问。在本研究中,由于Serpent算法的硬件效率高,并使用了额外的特性OTP机制作为额外的用户认证过程。研究表明,处理一个2兆字节的文件,加密和解密过程各需要3秒钟,并且无法以加密形式访问该文件。
{"title":"BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security","authors":"Aditya Yulianto, S. Kom, Maria Irmina Prasetiyowati","doi":"10.1109/ICIST.2013.6747571","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747571","url":null,"abstract":"Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library. The aim of this research is to make an application for encrypting Dropbox files and therefore, to ensure uploaded files from being accessed by unauthorized parties. In this research, Serpent algorithm was implemented because of its hardware efficiency and an additional feature, OTP mechanism, was used as additional user authentication process. The research shown that encryption and decryption processes each took three seconds for processing a two megabytes file, and the file was not accessible in encrypted form.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian rigid point set registration using logarithmic double exponential prior 对数双指数先验贝叶斯刚体点集配准
Jiajia Wu, Y. Wan, Zhenming Su
Point set registration is a key problem in many computer vision tasks. The goal of point set registration is to match two sets of points and estimate the transformation parameter that maps one point set to the other. Among the many published registration methods, the recently proposed Coherent Point Drift (CPD) algorithm stands out for its accuracy. In this paper we show that by casting CPD in the Bayesian framework we can obtain even better results. In particular, in case of large translation amount, our proposed mathod has much less number of iterations than CPD without any loss of accuracy. Experimental results confirms the advantages of the proposed method and shows an overall speedup when compared with the CPD method.
点集配准是许多计算机视觉任务中的关键问题。点集配准的目标是匹配两个点集,并估计将一个点集映射到另一个点集的转换参数。在许多已发表的配准方法中,最近提出的相干点漂移(CPD)算法以其精度突出。在本文中,我们证明了在贝叶斯框架中浇铸CPD可以得到更好的结果。特别是在翻译量较大的情况下,我们提出的方法比CPD迭代次数少得多,而且精度没有损失。实验结果证实了该方法的优越性,与CPD方法相比,该方法的总体速度有所提高。
{"title":"Bayesian rigid point set registration using logarithmic double exponential prior","authors":"Jiajia Wu, Y. Wan, Zhenming Su","doi":"10.1109/ICIST.2013.6747790","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747790","url":null,"abstract":"Point set registration is a key problem in many computer vision tasks. The goal of point set registration is to match two sets of points and estimate the transformation parameter that maps one point set to the other. Among the many published registration methods, the recently proposed Coherent Point Drift (CPD) algorithm stands out for its accuracy. In this paper we show that by casting CPD in the Bayesian framework we can obtain even better results. In particular, in case of large translation amount, our proposed mathod has much less number of iterations than CPD without any loss of accuracy. Experimental results confirms the advantages of the proposed method and shows an overall speedup when compared with the CPD method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128455033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1