Accuracy validation is essential to clinical application of medical image registration techniques. Registration validation remains a challenging problem in practice mainly due to lack of 'ground truth'. In thi...Accuracy validation is essential to clinical application of medical image registration techniques. Registration validation remains a challenging problem in practice mainly due to lack of 'ground truth'. In this paper, an overview of current validation methods for medical image registration is presented with detailed discussion of their benefits and drawbacks. Special focus is on non-rigid registration validation. Promising solution is also discussed.展开更多
In order to gain the great performance of ASIP, this paper discusses different aspects of an ASIP instruction set specification like syntax, encoding, constraints as welt as behaviors, and introduces our ADL model bas...In order to gain the great performance of ASIP, this paper discusses different aspects of an ASIP instruction set specification like syntax, encoding, constraints as welt as behaviors, and introduces our ADL model based methodology to check them. The automatic generation of test cases based on our straight-forward instruction representation is shown, and the efficient generation of them with good coverage is shown as well. The verification of the constraint checker, a very important tool for programmer, is performed. Results show that the toolkit can find some errors in previous delivery tools, and the introduced methodology verifies the feasibility of our instruction set specification.展开更多
Rainfall induced landslides are a common threat to the communities living on dangerous hillslopes in Chittagong Metropolitan Area, Bangladesh. Extreme population pressure, indiscriminate hill cutting, increased precip...Rainfall induced landslides are a common threat to the communities living on dangerous hillslopes in Chittagong Metropolitan Area, Bangladesh. Extreme population pressure, indiscriminate hill cutting, increased precipitation events due to global warming and associated unplanned urbanization in the hills are exaggerating landslide events. The aim of this article is to prepare a scientifically accurate landslide susceptibility map by combining landslide initiation and runout maps. Land cover, slope, soil permeability, surface geology, precipitation, aspect, and distance to hill cut, road cut, drainage and stream network factor maps were selected by conditional independence test. The locations of 56 landslides were collected by field surveying. A weight of evidence(Wo E) method was applied to calculate the positive(presence of landslides) and negative(absence of landslides) factor weights. A combination of analytical hierarchical process(AHP) and fuzzymembership standardization(weighs from 0 to 1) was applied for performing a spatial multi-criteria evaluation. Expert opinion guided the decision rule for AHP. The Flow-R tool that allows modeling landslide runout from the initiation sources was applied. The flow direction was calculated using the modified Holmgren's algorithm. The AHP landslide initiation and runout susceptibility maps were used to prepare a combined landslide susceptibility map. The relative operating characteristic curve was used for model validation purpose. The accuracy of Wo E, AHP, and combined susceptibility map was calculated 96%, 97%, and 98%, respectively.展开更多
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as ...Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site.展开更多
A new construction method of pile foundation in composite ground, in which, prior to installing piles, the ground is improved around the heads of the piles in soft ground or ground subject to liquefaction, which is in...A new construction method of pile foundation in composite ground, in which, prior to installing piles, the ground is improved around the heads of the piles in soft ground or ground subject to liquefaction, which is introduced in this paper. This construction method uses a combination of pile foundation construction together with common ground improvement methods, including deep mixing, preloading and sand compaction piling, and it is referred to as the composite ground pile method. Since an artificial ground with relatively high rigidity comparing with that of the original ground was formed around the pile in this method, and the seismic performance has not been made clear, thus the seismic performance of piles in composite ground was systematically analyzed through a series of centrifuge model tests and numerical analyses by using dynamic nonlinear finite element method, and a verification method for the seismic performance of piles in composite ground was proposed on the basis of the experimental and numerical results.展开更多
We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed ...We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed to be inexact but bounded and are represented by intervals. Such uncertainty may typically arise from imprecision during the process of manufacturing or construction, or round-off errors. In this case the application of the finite element method results in a system of linear equations with numerous interval parameters which cannot be solved conventionally. Applying a suitable variable substitution, an iteration method for the solution of a parametric system of linear equations is firstly employed to obtain initial bounds on the node displacements. Thereafter, an interval tightening (pruning) technique is applied, firstly on the element forces and secondly on the node displacements, in order to obtain tight guaranteed enclosures for the interval solutions for the forces and displacements.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review t...Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review the work on PTL in four aspects:(1) decidability,complexity and expressiveness of propositional PTL(PPTL);(2) modeling,simulation and verification language(MSVL);(3) formal verification approaches with MSVL and PPTL;and(4) supporting toolkit MSV.展开更多
Calibration coefficients validation is the foundation for ascertaining the sensor performance and carrying out the quantitative application.Based on the analysis of the differences between the calibration and validati...Calibration coefficients validation is the foundation for ascertaining the sensor performance and carrying out the quantitative application.Based on the analysis of the differences between the calibration and validation,two calibration coefficients validation methods were introduced in this paper.Taking the HJ-1A satellite CCD1 camera as an example,the uncertainties of calibration coefficients validation were analyzed.The calibration coefficients validation errors were simulated based on the measured data at an Inner Mongolia test site.The result showed that in the large view angle,the ground directional reflectance variation and the atmospheric path variation were the main error sources in calibration coefficients validation.The ground directional reflectance correction and atmospheric observation angle normalization should be carried out to improve the validation accuracy of calibration coefficients.展开更多
基金Supported by National Basic Research Program of China Grant(2011CB707701)National Natural Science Foundation of China(81127003)
文摘Accuracy validation is essential to clinical application of medical image registration techniques. Registration validation remains a challenging problem in practice mainly due to lack of 'ground truth'. In this paper, an overview of current validation methods for medical image registration is presented with detailed discussion of their benefits and drawbacks. Special focus is on non-rigid registration validation. Promising solution is also discussed.
文摘In order to gain the great performance of ASIP, this paper discusses different aspects of an ASIP instruction set specification like syntax, encoding, constraints as welt as behaviors, and introduces our ADL model based methodology to check them. The automatic generation of test cases based on our straight-forward instruction representation is shown, and the efficient generation of them with good coverage is shown as well. The verification of the constraint checker, a very important tool for programmer, is performed. Results show that the toolkit can find some errors in previous delivery tools, and the introduced methodology verifies the feasibility of our instruction set specification.
基金funded by the Center for Spatial Information Science and Systems at George Mason University, USABayes Ahmed is a Commonwealth Scholar funded by the UK govt
文摘Rainfall induced landslides are a common threat to the communities living on dangerous hillslopes in Chittagong Metropolitan Area, Bangladesh. Extreme population pressure, indiscriminate hill cutting, increased precipitation events due to global warming and associated unplanned urbanization in the hills are exaggerating landslide events. The aim of this article is to prepare a scientifically accurate landslide susceptibility map by combining landslide initiation and runout maps. Land cover, slope, soil permeability, surface geology, precipitation, aspect, and distance to hill cut, road cut, drainage and stream network factor maps were selected by conditional independence test. The locations of 56 landslides were collected by field surveying. A weight of evidence(Wo E) method was applied to calculate the positive(presence of landslides) and negative(absence of landslides) factor weights. A combination of analytical hierarchical process(AHP) and fuzzymembership standardization(weighs from 0 to 1) was applied for performing a spatial multi-criteria evaluation. Expert opinion guided the decision rule for AHP. The Flow-R tool that allows modeling landslide runout from the initiation sources was applied. The flow direction was calculated using the modified Holmgren's algorithm. The AHP landslide initiation and runout susceptibility maps were used to prepare a combined landslide susceptibility map. The relative operating characteristic curve was used for model validation purpose. The accuracy of Wo E, AHP, and combined susceptibility map was calculated 96%, 97%, and 98%, respectively.
基金The national natural science foundation(61273290,61373147)Xiamen Scientific Plan Project(2014S0048,3502Z20123037)+1 种基金Fujian Scientific Plan Project(2013HZ0004-1)FuJian provincial education office A-class project(-JA13238)
文摘Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site.
文摘A new construction method of pile foundation in composite ground, in which, prior to installing piles, the ground is improved around the heads of the piles in soft ground or ground subject to liquefaction, which is introduced in this paper. This construction method uses a combination of pile foundation construction together with common ground improvement methods, including deep mixing, preloading and sand compaction piling, and it is referred to as the composite ground pile method. Since an artificial ground with relatively high rigidity comparing with that of the original ground was formed around the pile in this method, and the seismic performance has not been made clear, thus the seismic performance of piles in composite ground was systematically analyzed through a series of centrifuge model tests and numerical analyses by using dynamic nonlinear finite element method, and a verification method for the seismic performance of piles in composite ground was proposed on the basis of the experimental and numerical results.
文摘We consider a statically determinate structural truss problem where all of the physical model parameters are uncertain: not just the material values and applied loads, but also the positions of the nodes are assumed to be inexact but bounded and are represented by intervals. Such uncertainty may typically arise from imprecision during the process of manufacturing or construction, or round-off errors. In this case the application of the finite element method results in a system of linear equations with numerous interval parameters which cannot be solved conventionally. Applying a suitable variable substitution, an iteration method for the solution of a parametric system of linear equations is firstly employed to obtain initial bounds on the node displacements. Thereafter, an interval tightening (pruning) technique is applied, firstly on the element forces and secondly on the node displacements, in order to obtain tight guaranteed enclosures for the interval solutions for the forces and displacements.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
基金supported by the National Natural Science Foundation of China(Grant Nos.61133001,61272117,61202038,61322202,61420106004 and 91418201)
文摘Projection temporal logic(PTL) is an extension of interval temporal logic(ITL) with a new projection operator prj and infinite intervals which has been well investigated in the past ten years.In this paper,we review the work on PTL in four aspects:(1) decidability,complexity and expressiveness of propositional PTL(PPTL);(2) modeling,simulation and verification language(MSVL);(3) formal verification approaches with MSVL and PPTL;and(4) supporting toolkit MSV.
基金supported by the International Science and Technology Cooperation Program of China(Grant No.2008DFA21540)the National Hi-Tech Research and Development Program of China(Grant No.2006AA12Z113)+1 种基金the Chinese Defense Advance Research Program of Science and Technologythe Young Talents Filed Special Project of Institute of Remote Sensing and Application of Chinese Academy of Sciences
文摘Calibration coefficients validation is the foundation for ascertaining the sensor performance and carrying out the quantitative application.Based on the analysis of the differences between the calibration and validation,two calibration coefficients validation methods were introduced in this paper.Taking the HJ-1A satellite CCD1 camera as an example,the uncertainties of calibration coefficients validation were analyzed.The calibration coefficients validation errors were simulated based on the measured data at an Inner Mongolia test site.The result showed that in the large view angle,the ground directional reflectance variation and the atmospheric path variation were the main error sources in calibration coefficients validation.The ground directional reflectance correction and atmospheric observation angle normalization should be carried out to improve the validation accuracy of calibration coefficients.