首页 > 最新文献

2017 International Conference on Network and Information Systems for Computers (ICNISC)最新文献

英文 中文
Local Linear Dimensionality Reduction Algorithm Based on Nonlinear Manifolds Decomposition 基于非线性流形分解的局部线性降维算法
Zi-Hui Pei, Qi Shen
Aiming at the problem that linear data reduction algorithm is difficult to deal with data with nonlinear structure, this paper proposes a new algorithm for facial expression feature extraction based on manifold decomposition algorithm. The algorithm utilizes the characteristic of local linearity of nonlinear manifolds. Through classical principal component analysis The local linear patches of nonlinear manifold structures are reduced in dimension. The local PCA representation can be obtained by local dimension reduction, and then the local coordinates are aligned by the coordinate arrangement technique, so that the low dimensional coordinates of the whole manifold can be obtained. The simulation results show that the local linear dimensionality reduction algorithm of nonlinear manifold decomposition is superior to other classical manifold learning algorithms in the recognition accuracy when applied to facial expression feature extraction.
针对线性数据约简算法难以处理非线性结构数据的问题,提出了一种基于流形分解算法的面部表情特征提取新算法。该算法利用了非线性流形的局部线性特性。通过经典主成分分析,对非线性流形结构的局部线性块进行了降维。通过局部降维得到局部主成分表示,再通过坐标排列技术对局部坐标进行对齐,从而得到整个流形的低维坐标。仿真结果表明,非线性流形分解的局部线性降维算法在面部表情特征提取中的识别精度优于其他经典流形学习算法。
{"title":"Local Linear Dimensionality Reduction Algorithm Based on Nonlinear Manifolds Decomposition","authors":"Zi-Hui Pei, Qi Shen","doi":"10.1109/ICNISC.2017.00035","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00035","url":null,"abstract":"Aiming at the problem that linear data reduction algorithm is difficult to deal with data with nonlinear structure, this paper proposes a new algorithm for facial expression feature extraction based on manifold decomposition algorithm. The algorithm utilizes the characteristic of local linearity of nonlinear manifolds. Through classical principal component analysis The local linear patches of nonlinear manifold structures are reduced in dimension. The local PCA representation can be obtained by local dimension reduction, and then the local coordinates are aligned by the coordinate arrangement technique, so that the low dimensional coordinates of the whole manifold can be obtained. The simulation results show that the local linear dimensionality reduction algorithm of nonlinear manifold decomposition is superior to other classical manifold learning algorithms in the recognition accuracy when applied to facial expression feature extraction.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
OFMON: An Adaptive Flow Monitoring Framework for SDN OFMON:一种SDN自适应流量监控框架
X. Yuan, Fen Hu
Software-defined networking introduces the possibility of building self-tuning networks that constantly monitor network conditions and react rapidly to important events such as congestion. However, it is not an easy task to monitor network status without any overhead. Traditional monitoring mechanisms may introduce huge overheads when monitoring the network continuously. In this paper, we present OFMON - an adaptive flow measurement framework to reduce the overhead and improve the accuracy. It utilizes the Packet-In and Flow-Removed messages as a passive method and uses an adaptive polling algorithm based on fuzzy logic as an active method to obtain traffic metrics. The adaptive techniques are significantly more flexible in their ability of dynamically adjusting the interval of polling depending on the fluctuations of flow, which find a balance between accuracy and overhead. The experiments illustrate that OFMON provides a better method to monitor the link utilization with higher accuracy and lower overhead.
软件定义的网络引入了构建自调优网络的可能性,这种网络可以持续监控网络状况,并对拥塞等重要事件做出快速反应。然而,在没有任何开销的情况下监视网络状态并不是一件容易的事。传统的监控机制在对网络进行连续监控时可能会带来巨大的开销。在本文中,我们提出了一种自适应流量测量框架OFMON,以减少开销和提高精度。它采用Packet-In和Flow-Removed消息作为被动方法,采用基于模糊逻辑的自适应轮询算法作为主动方法来获取流量指标。自适应技术在根据流量波动动态调整轮询间隔的能力上明显更加灵活,在准确性和开销之间找到了平衡。实验表明,OFMON提供了一种较好的链路利用率监测方法,具有较高的精度和较低的开销。
{"title":"OFMON: An Adaptive Flow Monitoring Framework for SDN","authors":"X. Yuan, Fen Hu","doi":"10.1109/ICNISC.2017.00016","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00016","url":null,"abstract":"Software-defined networking introduces the possibility of building self-tuning networks that constantly monitor network conditions and react rapidly to important events such as congestion. However, it is not an easy task to monitor network status without any overhead. Traditional monitoring mechanisms may introduce huge overheads when monitoring the network continuously. In this paper, we present OFMON - an adaptive flow measurement framework to reduce the overhead and improve the accuracy. It utilizes the Packet-In and Flow-Removed messages as a passive method and uses an adaptive polling algorithm based on fuzzy logic as an active method to obtain traffic metrics. The adaptive techniques are significantly more flexible in their ability of dynamically adjusting the interval of polling depending on the fluctuations of flow, which find a balance between accuracy and overhead. The experiments illustrate that OFMON provides a better method to monitor the link utilization with higher accuracy and lower overhead.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-User and Multi-View Human Eyes' Detection and Tracking 多用户、多视角人眼检测与跟踪
Tao Yu, Jian-hua Zou, Qin-Bao Song
This paper presents a framework on multi-user and multi-view human eyes' detection and tracking. First, it uses fives kinds of AdaBoost face detectors with four different sizes at each area of image to detect faces in turn. Then, to locate eyes' positions, four kinds of AdaBoost eye detectors are used and if the eye-detection above fails, the prior knowledge of human organs' positions in anatomy is applied as a spare method. Next, it uses the unscented filter to predict the targets' next possible positions. Finally, the detection method above is used to detect the third frame and amend the relative forecasting. And repeat above cycle until tracking over. This framework is robust to subject's eyes' blinking, closing, wearing glasses and partly sheltering in multi-face and multi-view to a certain extent for the optimized structure performance and reasonable selected features. And because of the nonlinear filtering, it can track targets in curves with changing speeds. It mainly fits most usual vertical head scenes in monitoring environment.
提出了一种多用户、多视角人眼检测与跟踪框架。首先,它使用五种AdaBoost人脸检测器,在图像的每个区域使用四种不同尺寸的人脸检测器来依次检测人脸。然后,使用四种AdaBoost眼睛探测器来定位眼睛的位置,如果以上眼睛检测失败,则使用解剖学中人体器官位置的先验知识作为备用方法。接下来,它使用无味过滤器来预测目标的下一个可能位置。最后,利用上述检测方法对第三帧进行检测,并对相关预测进行修正。并重复上述循环,直到跟踪结束。该框架优化了结构性能,合理选择了特征,在一定程度上对受试者多面、多视角的眨眼、闭眼、戴眼镜和部分遮挡具有鲁棒性。由于采用了非线性滤波,使得该方法能够在速度变化的曲线中跟踪目标。主要适用于监控环境中最常见的垂直头部场景。
{"title":"Multi-User and Multi-View Human Eyes' Detection and Tracking","authors":"Tao Yu, Jian-hua Zou, Qin-Bao Song","doi":"10.1109/ICNISC.2017.00068","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00068","url":null,"abstract":"This paper presents a framework on multi-user and multi-view human eyes' detection and tracking. First, it uses fives kinds of AdaBoost face detectors with four different sizes at each area of image to detect faces in turn. Then, to locate eyes' positions, four kinds of AdaBoost eye detectors are used and if the eye-detection above fails, the prior knowledge of human organs' positions in anatomy is applied as a spare method. Next, it uses the unscented filter to predict the targets' next possible positions. Finally, the detection method above is used to detect the third frame and amend the relative forecasting. And repeat above cycle until tracking over. This framework is robust to subject's eyes' blinking, closing, wearing glasses and partly sheltering in multi-face and multi-view to a certain extent for the optimized structure performance and reasonable selected features. And because of the nonlinear filtering, it can track targets in curves with changing speeds. It mainly fits most usual vertical head scenes in monitoring environment.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Binary SIFT Matching Method Combined with the Color and Exposure Information 结合颜色和曝光信息的二值SIFT匹配方法
Mingzhe Su, Yan Ma, Xiangfen Zhang, Shun-bao Li, Yuping Zhang
The traditional SIFT method is capable of extracting distinctive feature for image matching. However, it is extremely time consuming in the SIFT matching due to the use of Euclidean distance measure. Recently, several binary SIFT (BSIFT) methods have been developed to improve the matching efficiency, whereas merely image brightness information is involved in these algorithms. The matching performance will drop because of the lack of the color information of the image. This paper presents a binary SIFT matching method combined with the color and exposure information. First, three components, including luminance, color offset and exposure offset are combined together to express the image pixel. Then, 128-D SIFT descriptor is converted into 256-bit binarized SIFT descriptor. Finally, the improved Hamming distance is proposed in the matching procedure. Experimental results on UKBench dataset show that the proposed method not only ensures the matching speed, but also improves matching accuracy.
传统的SIFT方法能够提取出鲜明的特征进行图像匹配。然而,由于使用欧几里得距离度量,SIFT匹配非常耗时。近年来,为了提高匹配效率,人们开发了几种二值SIFT (BSIFT)算法,但这些算法只涉及图像亮度信息。由于缺少图像的颜色信息,匹配性能会下降。提出了一种结合颜色和曝光信息的二值SIFT匹配方法。首先,将亮度、色彩偏移和曝光偏移三个分量组合在一起表示图像像素;然后将128-D SIFT描述符转换为256位二值化SIFT描述符。最后,在匹配过程中提出了改进的汉明距离。在UKBench数据集上的实验结果表明,该方法不仅保证了匹配速度,而且提高了匹配精度。
{"title":"A Binary SIFT Matching Method Combined with the Color and Exposure Information","authors":"Mingzhe Su, Yan Ma, Xiangfen Zhang, Shun-bao Li, Yuping Zhang","doi":"10.1109/ICNISC.2017.00062","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00062","url":null,"abstract":"The traditional SIFT method is capable of extracting distinctive feature for image matching. However, it is extremely time consuming in the SIFT matching due to the use of Euclidean distance measure. Recently, several binary SIFT (BSIFT) methods have been developed to improve the matching efficiency, whereas merely image brightness information is involved in these algorithms. The matching performance will drop because of the lack of the color information of the image. This paper presents a binary SIFT matching method combined with the color and exposure information. First, three components, including luminance, color offset and exposure offset are combined together to express the image pixel. Then, 128-D SIFT descriptor is converted into 256-bit binarized SIFT descriptor. Finally, the improved Hamming distance is proposed in the matching procedure. Experimental results on UKBench dataset show that the proposed method not only ensures the matching speed, but also improves matching accuracy.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Key Space Based on CPRS Algorithm 基于CPRS算法的密钥空间设计
Dan Cai, Xiaoyong Ji, Weiqi Jin
Designing the key space based on the initial value xi, system parameter ui and coupling coefficient εi (i=1, 2... m, m is the dimension of hyperchaotic system). By theoretical analysis and practical test, the sensitivity of initial value xi is 10-16, the sensitivity of coupling coefficient εi is 10-15, the sensitivity of system parameter ui is 10-13, so the initial value and coupling coefficient are used as the parameters of designing the key space and the total number of the key space in one-dimensional system is 1031. Each node has different initial values and coupling coefficients in m-dimensional CPRS hyperchaotic system, so the total number of key space in m-dimensional system is 10 31*m. The design consists of an "S_Box" algorithm and two different valuing algorithms. The "S_Box" algorithm adopts BKDRHash function due to the Hash function which has minor conflict and make the value distribution uniform in the "S_Box" and two different valuing algorithms obtain the initial value and coupling coefficient desired in the encryption system. The experimental results show that the three algorithms obtaining the values is well distributed and improve the performance of anti-cracking. The Passwords that users input map into different parameters through the key space by which CPRS hyperchaotic system transmitting terminal encrypts and the receiving terminal can be decrypted successfully using the same parameters.
基于初始值xi、系统参数ui和耦合系数εi (i= 1,2,…)设计键空间。M, M为超混沌系统的维数)。通过理论分析和实际测试,初始值xi的灵敏度为10-16,耦合系数εi的灵敏度为10-15,系统参数ui的灵敏度为10-13,因此将初始值和耦合系数作为设计键空间的参数,一维系统中键空间的总数为1031个。在m维CPRS超混沌系统中,每个节点具有不同的初始值和耦合系数,因此m维系统中的键空间总数为10 31*m。该设计由一个“S_Box”算法和两个不同的赋值算法组成。“S_Box”算法采用了BKDRHash函数,因为Hash函数冲突较小,使得“S_Box”中的值分布均匀,两种不同的赋值算法获得了加密系统所需的初始值和耦合系数。实验结果表明,三种算法得到的值分布均匀,提高了抗裂性能。用户输入的密码通过CPRS超混沌系统发送端加密的密钥空间映射到不同的参数,接收端使用相同的参数可以成功解密。
{"title":"Design of Key Space Based on CPRS Algorithm","authors":"Dan Cai, Xiaoyong Ji, Weiqi Jin","doi":"10.1109/ICNISC.2017.00044","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00044","url":null,"abstract":"Designing the key space based on the initial value xi, system parameter ui and coupling coefficient εi (i=1, 2... m, m is the dimension of hyperchaotic system). By theoretical analysis and practical test, the sensitivity of initial value xi is 10-16, the sensitivity of coupling coefficient εi is 10-15, the sensitivity of system parameter ui is 10-13, so the initial value and coupling coefficient are used as the parameters of designing the key space and the total number of the key space in one-dimensional system is 1031. Each node has different initial values and coupling coefficients in m-dimensional CPRS hyperchaotic system, so the total number of key space in m-dimensional system is 10 31*m. The design consists of an \"S_Box\" algorithm and two different valuing algorithms. The \"S_Box\" algorithm adopts BKDRHash function due to the Hash function which has minor conflict and make the value distribution uniform in the \"S_Box\" and two different valuing algorithms obtain the initial value and coupling coefficient desired in the encryption system. The experimental results show that the three algorithms obtaining the values is well distributed and improve the performance of anti-cracking. The Passwords that users input map into different parameters through the key space by which CPRS hyperchaotic system transmitting terminal encrypts and the receiving terminal can be decrypted successfully using the same parameters.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127696514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Service Chain Migration for Network Functions Virtualization 面向网络功能虚拟化的动态服务链迁移
Liquan Xie, Qiao Zhou, Jianyang Huang
Virtual network function supports the scalable control to the software-based network functions while leading to the challenge of flexible service chains migration for the load balance, processing performance or QoS. In this paper, we formulated the service chains migration (SCM) problem as an integer linear program that maximizes the utility of the network and subjects to the resource and performance constraints. We approximated the objective function of SCM with the Log-Sum-Exp function, and proposed a Markov chain-based distributed migration algorithm. Simulation results prove that the proposed algorithm can realize effective and cost-efficient service chain migration.
虚拟网络功能支持对基于软件的网络功能的可扩展控制,同时也带来了灵活的业务链迁移对负载平衡、处理性能或QoS的挑战。在本文中,我们将服务链迁移(SCM)问题表述为一个整数线性规划,使网络的效用最大化,并受资源和性能约束。用Log-Sum-Exp函数逼近SCM的目标函数,提出了一种基于马尔可夫链的分布式迁移算法。仿真结果表明,该算法能够实现高效、低成本的服务链迁移。
{"title":"Dynamic Service Chain Migration for Network Functions Virtualization","authors":"Liquan Xie, Qiao Zhou, Jianyang Huang","doi":"10.1109/ICNISC.2017.00027","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00027","url":null,"abstract":"Virtual network function supports the scalable control to the software-based network functions while leading to the challenge of flexible service chains migration for the load balance, processing performance or QoS. In this paper, we formulated the service chains migration (SCM) problem as an integer linear program that maximizes the utility of the network and subjects to the resource and performance constraints. We approximated the objective function of SCM with the Log-Sum-Exp function, and proposed a Markov chain-based distributed migration algorithm. Simulation results prove that the proposed algorithm can realize effective and cost-efficient service chain migration.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127744220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Static Vulnerabilities Analysis Algorithm for PHP Codes 一种新的PHP代码静态漏洞分析算法
Xue-xiong Yan, Hengtai Ma
as for detecting taint-style vulnerabilities in PHP codes, this paper introduces function calling control vulnerability, which is a new kind of taint-style vulnerabilities in PHP codes without sensitive function, and enriches classical update rules for taint analysis with a new transfer function definition, which is used to deal with statements with a single function call. The new static vulnerabilities analysis algorithm is implemented in a tool named POSE, and the experiment results of the POSE show that the new algorithm is valid for detecting more type of taint-style vulnerabilities in PHP codes.
针对PHP代码中的污染式漏洞检测,本文引入了函数调用控制漏洞,这是一种不含敏感函数的PHP代码中的新型污染式漏洞,并通过新的传递函数定义丰富了经典的污染分析更新规则,用于处理单函数调用语句。在一个名为POSE的工具中实现了新的静态漏洞分析算法,POSE的实验结果表明,新算法可以有效地检测出PHP代码中更多类型的污点式漏洞。
{"title":"A New Static Vulnerabilities Analysis Algorithm for PHP Codes","authors":"Xue-xiong Yan, Hengtai Ma","doi":"10.1109/ICNISC.2017.00034","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00034","url":null,"abstract":"as for detecting taint-style vulnerabilities in PHP codes, this paper introduces function calling control vulnerability, which is a new kind of taint-style vulnerabilities in PHP codes without sensitive function, and enriches classical update rules for taint analysis with a new transfer function definition, which is used to deal with statements with a single function call. The new static vulnerabilities analysis algorithm is implemented in a tool named POSE, and the experiment results of the POSE show that the new algorithm is valid for detecting more type of taint-style vulnerabilities in PHP codes.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Support and Test of Software-Intensive Systems 软件密集型系统的软件支持和测试
Huafang Geng, Jianmei Dai
Software is the core of Software-Intensive Systems which belong to information equipment. This paper analyses the elements of software support that depend on three-dimensional structure through setting up the static model. The test of software which acquires careful planning must run through the process of Software-Intensive Systems maintenance.
软件是属于信息设备的软件密集型系统的核心。本文通过建立静态模型,分析了依赖于三维结构的软件支撑要素。软件的测试需要经过周密的计划,必须贯穿于软件密集型系统维护的整个过程。
{"title":"Software Support and Test of Software-Intensive Systems","authors":"Huafang Geng, Jianmei Dai","doi":"10.1109/ICNISC.2017.00049","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00049","url":null,"abstract":"Software is the core of Software-Intensive Systems which belong to information equipment. This paper analyses the elements of software support that depend on three-dimensional structure through setting up the static model. The test of software which acquires careful planning must run through the process of Software-Intensive Systems maintenance.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Switching Median Filter in Two-Dimensional Otsu Image Segmentation 切换中值滤波在二维大津图像分割中的应用
Hanmin Ye, Shi Yan, Xue Bai
Aiming at the problem that traditional 2D Otsu algorithm is poor in image segmentation with serious noise pollution, a new image segmentation method based on the combination of median filter and 2-D Otsu is proposed. By using the switching median filter to the noise image anti-noise, and then use the two-dimensional Otsu to image segmentation to improve the segmentation effect. The experimental results show that the new method has a good segmentation effect on the gray image with high noise, and the advantage of this algorithm is more obvious when the noise is stronger.
针对传统二维Otsu算法分割效果差且噪声污染严重的问题,提出了一种基于中值滤波和二维Otsu相结合的图像分割新方法。通过使用切换中值滤波器对图像进行噪声抑制,然后使用二维大津对图像进行分割,以提高分割效果。实验结果表明,新方法对高噪声的灰度图像具有良好的分割效果,且当噪声越强时,该算法的优势越明显。
{"title":"Application of Switching Median Filter in Two-Dimensional Otsu Image Segmentation","authors":"Hanmin Ye, Shi Yan, Xue Bai","doi":"10.1109/ICNISC.2017.00063","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00063","url":null,"abstract":"Aiming at the problem that traditional 2D Otsu algorithm is poor in image segmentation with serious noise pollution, a new image segmentation method based on the combination of median filter and 2-D Otsu is proposed. By using the switching median filter to the noise image anti-noise, and then use the two-dimensional Otsu to image segmentation to improve the segmentation effect. The experimental results show that the new method has a good segmentation effect on the gray image with high noise, and the advantage of this algorithm is more obvious when the noise is stronger.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Time Synchronization Method of Ad Hoc Networks Based on Life Cycle
Zuoxue Liu, Rui Jin
To solve some shortcomings existing in several typical master-slave synchronization protocols, this paper presented a new synchronization method for Ad hoc networks using the life cycle of network nodes. We used the life cycle of Ad hoc node as the criterion of the synchronization, used the slot alignment for coarse synchronization, and exchanged the synchronization information between nodes for fine synchronization. In order to reduce the number of synchronization and maintain the clock drift between the nodes will not be too much error, we proposed the monitoring algorithm in synchronization process. The simulation results show that the improved synchronization process which have monitoring algorithm can reduce the number of synchronizations when the clock drift error does not reach the threshold value, and the synchronization error between the master node and the 6 hops node is only 0.37ms.
针对几种典型主从同步协议存在的不足,提出了一种利用网络节点生命周期的Ad hoc网络同步方法。我们以Ad hoc节点的生命周期作为同步的准则,采用槽对齐进行粗同步,节点间交换同步信息进行细同步。为了减少同步次数和保持节点间时钟漂移不会有太大误差,我们提出了同步过程中的监控算法。仿真结果表明,在时钟漂移误差不达到阈值的情况下,改进的同步过程具有监控算法,可以减少同步次数,主节点与6跳节点之间的同步误差仅为0.37ms。
{"title":"A New Time Synchronization Method of Ad Hoc Networks Based on Life Cycle","authors":"Zuoxue Liu, Rui Jin","doi":"10.1109/ICNISC.2017.00030","DOIUrl":"https://doi.org/10.1109/ICNISC.2017.00030","url":null,"abstract":"To solve some shortcomings existing in several typical master-slave synchronization protocols, this paper presented a new synchronization method for Ad hoc networks using the life cycle of network nodes. We used the life cycle of Ad hoc node as the criterion of the synchronization, used the slot alignment for coarse synchronization, and exchanged the synchronization information between nodes for fine synchronization. In order to reduce the number of synchronization and maintain the clock drift between the nodes will not be too much error, we proposed the monitoring algorithm in synchronization process. The simulation results show that the improved synchronization process which have monitoring algorithm can reduce the number of synchronizations when the clock drift error does not reach the threshold value, and the synchronization error between the master node and the 6 hops node is only 0.37ms.","PeriodicalId":429511,"journal":{"name":"2017 International Conference on Network and Information Systems for Computers (ICNISC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131522232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference on Network and Information Systems for Computers (ICNISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1