-
Article
Open AccessImproved shape-from-template method with perspective space constraints for disappearing features
Inferring the 3D surface shape of a known template from 2D images captured by a monocular camera is a challenging problem. Due to the severely underconstrained nature of the problem, inferring shape accurately...
-
Article
Learning high-quality depth map from 360° multi-exposure imagery
Monocular 360° depth estimation is an important and challenging task in computer vision and 3D vision. Recently, deep neural networks have shown great abilities in estimating depth map from a single 360° image...
-
Article
Online probabilistic forecasting method for trapezoidal photovoltaic stream data
For the probabilistic forecasting of photovoltaic generation, the design of a feasible online predictive framework is a challenging problem. To deal with this issue, an ensemble dynamic OS-ELM based on quantil...
-
Article
Interpolation-Based High Capacity Quantum Image Steganography
Encryption and information hiding are widely used in security applications requiring copyright protection, over-communication, and tamper detection. Quantum steganography, using quantum images and audio as inf...
-
Chapter and Conference Paper
Lung Segmentation via Deep Learning Network and Fully-Connected Conditional Random Fields
Computer-Aided Diagnosis (CAD) benefits to early diagnosis and accurate treatment of lung diseases. As a preprocessing of CAD-based chest radiograph analysis, reliable lung segmentation is a prerequisite step ...
-
Article
Two-Stage Game Strategy for Multiclass Imbalanced Data Online Prediction
For multiclass imbalanced data online prediction, how to design a self-adapted model is a challenging problem. To address this issue, a novel dynamic multi-classification algorithm which uses two-stage game st...
-
Chapter and Conference Paper
NADSR: A Network Anomaly Detection Scheme Based on Representation
Deep learning has been widely used for identifying anomaly network traffic. It trains supervised classifiers on a pre-screened numerical traffic feature dataset in the most cases, so the classification effecti...
-
Chapter and Conference Paper
Research on Spatial Network Routing Model Based on Price Game
The topological structure of the spatial information network changes drastically, the resources on the space are limited, and the communication delay is long which bring great challenges to the construction of...
-
Article
Fast global illumination of dynamic water surface based on two stage rendering
Water simulation plays an important role in computer graphics, and its complex optical properties are very computationally intensive due to the variation of phenomena. In this paper, a fast-global illumination...
-
Chapter and Conference Paper
Delay-Constrained Load Balancing in the SDN
In the low earth orbit (LEO) satellite networks, a single satellite may cover areas with various population quantity, economic conditions and time zones. In this case, networks have time-varying traffic load a...
-
Chapter and Conference Paper
Dynamic Load Balancing Algorithm Based on Per-pixel Rendering Cost Estimation for Parallel Ray Tracing on PC Clusters
Load balancing determines the performance of the sort-first rendering clusters. A dynamic load balancing algorithm based on per-pixel rendering cost is proposed. Firstly, a 3D scene is rendered by ray tracing....
-
Article
Open AccessImbalanced biomedical data classification using self-adaptive multilayer ELM combined with dynamic GAN
Imbalanced data classification is an inevitable problem in medical intelligent diagnosis. Most of real-world biomedical datasets are usually along with limited samples and high-dimensional feature. This seriou...
-
Article
Simulation of water surface using current consumer-level graphics hardware
Water surface visualization is an important research topic in computer graphics. This paper presents a novel method of water surface simulation by Secondary Distorted Textures (SDT), which realistically simula...
-
Chapter and Conference Paper
Response to Multiple Attack Behaviour Models in Cloud Computing
User behaviour models have been widely used to simulate attack behaviour in the security domain. In this paper, we introduce one perfect rational and three bounded rational behaviour models to simulate attack ...
-
Chapter and Conference Paper
An Auction-Gaming Based Routing Model for LEO Satellite Networks
Characteristics of LEO satellite networks, like dynamically changed topological structures, limited on-board resources, and longer communication delay, have brought new challenges to the construction of satell...
-
Chapter and Conference Paper
An Improved Weighted ELM with Hierarchical Feature Representation for Imbalanced Biomedical Datasets
In medical intelligent diagnosis, most of the real-world datasets have the class-imbalance problem and some strong correlation features. In this paper, a novel classification model with hierarchical feature re...
-
Chapter and Conference Paper
Water Surface Simulation Based on Perlin Noise and Secondary Distorted Textures
Simulation of water surface is an important topic in computer graphic. In this paper we propose a fast method to simulate the reflection and refraction of water surface in high quality based on Perlin noise. T...
-
Chapter and Conference Paper
End-to-End Stochastic QoS Performance Under Multi-layered Satellite Network
To meet the growth of real-time and multimedia traffic, the next generation of satellite networks with a guarantee of quality of service (QoS) is indeed, urgent. In this paper, we support the multi-layered sat...
-
Article
Measurements-based Moving Target Detection in Quantum Video
A method to detect a moving target in multi-channel quantum video is proposed based on multiple measurements on the video strip. The proposed method is capable of detecting the location of the moving target in...
-
Article
Strategy for quantum image stabilization
Image stabilization is a process to smooth the unstable motion vector of video sequences to achieve its stabilization. Even though the classical image stabilization techniques seem already very mature so far, ...