Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03172
Fan Zhu, Fenglei Yang
{"title":"Best viewpoints selection based on feature points detection: Best viewpoints selection based on feature points detection","authors":"Fan Zhu, Fenglei Yang","doi":"10.3724/SP.J.1087.2013.03172","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03172","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3172-3175"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03111
Chuan-hui Liu
{"title":"Improved ant colony genetic optimization algorithm and its application: Improved ant colony genetic optimization algorithm and its application","authors":"Chuan-hui Liu","doi":"10.3724/SP.J.1087.2013.03111","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03111","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"42 1","pages":"3111-3113"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69944947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03149
Y. Hou, Rongcai Zhao, Wei Gao
{"title":"Single instruction multiple data vectorization of non-normalized loops: Single instruction multiple data vectorization of non-normalized loops","authors":"Y. Hou, Rongcai Zhao, Wei Gao","doi":"10.3724/SP.J.1087.2013.03149","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03149","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"6 1","pages":"3149-3154"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03239
Jia Cai, Qiang Wei, Yuefei Zhu
{"title":"Identification of encrypted function in malicious software: Identification of encrypted function in malicious software","authors":"Jia Cai, Qiang Wei, Yuefei Zhu","doi":"10.3724/SP.J.1087.2013.03239","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03239","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3239-3243"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03190
Bo Shukui, Jing Yong-ju
To solve the problem that the features of a target change with the image resolution in target recognition, a multi-scale analysis of target recognition was provided in this paper. First, the multi-scale features of a target were analyzed based on mixed pixels in multi-resolution images. At different scale, the features of a target had different behaviors that were related to the proportion of mixed pixels in the target. Second, the structural differences of the target were analyzed and illustrated from the experiments of multi-scale target recognition. Last, the concept of "dominating class" was proposed based on the multi-scale analysis. The experimental results show that the shape and structural features change with scale of the image and large scale leads big change. This paper studies the target features from multi-scale images and provides guidance on image target recognition.
{"title":"Multi-scale analysis for remote sensing target recognition","authors":"Bo Shukui, Jing Yong-ju","doi":"10.3724/SP.J.1087.2013.03190","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03190","url":null,"abstract":"To solve the problem that the features of a target change with the image resolution in target recognition, a multi-scale analysis of target recognition was provided in this paper. First, the multi-scale features of a target were analyzed based on mixed pixels in multi-resolution images. At different scale, the features of a target had different behaviors that were related to the proportion of mixed pixels in the target. Second, the structural differences of the target were analyzed and illustrated from the experiments of multi-scale target recognition. Last, the concept of \"dominating class\" was proposed based on the multi-scale analysis. The experimental results show that the shape and structural features change with scale of the image and large scale leads big change. This paper studies the target features from multi-scale images and provides guidance on image target recognition.","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3190-3192"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69945687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03097
Dayao Chen, Xiuhong Chen
{"title":"Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding: Face recognition based on orthogonal and uncorrelated marginal neighborhood preserving embedding","authors":"Dayao Chen, Xiuhong Chen","doi":"10.3724/SP.J.1087.2013.03097","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03097","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3097-3101"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69944574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03244
Donglin Pei, Xu Li
{"title":"Further study on algebraic structure of RSA algorithm: Further study on algebraic structure of RSA algorithm","authors":"Donglin Pei, Xu Li","doi":"10.3724/SP.J.1087.2013.03244","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03244","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3244-3246"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69946003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-26DOI: 10.3724/SP.J.1087.2013.03201
Wu Shibin, Chen Bo, D. Wangli, G. Xiaoming
In view of speckle noise in ultrasound image, there are some disadvantages of traditional anisotropic diffusion methods, such as in-sufficient noise suppression and edge details preservation. A de-speckling method based on Mallat-Zhong Discrete Wavelet Transform( MZ-DWT) wavelet was proposed. The method used MZ-DWT wavelet and Expectation Maximization( EM) algorithm as the discrimination factor between homogeneous and edge regions, making it more accurately to control diffusion intensity and rate and achieving the noise suppression and details preservation. The experimental results show that, the proposed algorithm can better de-speckle while preserving image details and the performance of the method is better than the traditional anisotropic diffusion methods.
{"title":"Ultrasound image anisotropic diffusion de-speckling method based on Mallat-Zhong discrete wavelet transform wavelet","authors":"Wu Shibin, Chen Bo, D. Wangli, G. Xiaoming","doi":"10.3724/SP.J.1087.2013.03201","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03201","url":null,"abstract":"In view of speckle noise in ultrasound image, there are some disadvantages of traditional anisotropic diffusion methods, such as in-sufficient noise suppression and edge details preservation. A de-speckling method based on Mallat-Zhong Discrete Wavelet Transform( MZ-DWT) wavelet was proposed. The method used MZ-DWT wavelet and Expectation Maximization( EM) algorithm as the discrimination factor between homogeneous and edge regions, making it more accurately to control diffusion intensity and rate and achieving the noise suppression and details preservation. The experimental results show that, the proposed algorithm can better de-speckle while preserving image details and the performance of the method is better than the traditional anisotropic diffusion methods.","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3201-3203"},"PeriodicalIF":0.0,"publicationDate":"2013-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69946011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}