|
Jacquard image segmentation using Mumford-Shah model
Feng Zhi-lin, Yin Jian-wei, Chen Gang, Dong Jin-xiang
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(2 ): 1-.
https://doi.org/10.1631/jzus.2006.A0109
Jacquard image segmentation is one of the primary steps in image analysis for jacquard pattern identification. The main aim is to recognize homogeneous regions within a jacquard image as distinct, which belongs to different patterns. Active contour models have become popular for finding the contours of a pattern with a complex shape. However, the performance of active contour models is often inadequate under noisy environment. In this paper, a robust algorithm based on the Mumford-Shah model is proposed for the segmentation of noisy jacquard images. First, the Mumford-Shah model is discretized on piecewise linear finite element spaces to yield greater stability. Then, an iterative relaxation algorithm for numerically solving the discrete version of the model is presented. In this algorithm, an adaptive triangular mesh is refined to generate Delaunay type triangular mesh defined on structured triangulations, and then a quasi-Newton numerical method is applied to find the absolute minimum of the discrete model. Experimental results on noisy jacquard images demonstrated the efficacy of the proposed algorithm.
|
|
LDPC based time-frequency double differential space-time coding for multi-antenna OFDM systems
Tian Ji-feng, Jiang Hai-ning, Song Wen-tao, Luo Han-wen
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(2 ): 6-.
https://doi.org/10.1631/jzus.2006.A0141
Differential space-time coding was proposed recently in the literature for multi-antenna systems, where neither the transmitter nor the receiver knows the fading coefficients. Among existing schemes, double differential space-time (DDST) coding is of special interest because it is applicable to continuous fast time-varying channels. However, it is less effective in frequency-selective fading channels. This paper’s authors derived a novel time-frequency double differential space-time (TF-DDST) coding scheme for multi-antenna orthogonal frequency division multiplexing (OFDM) systems in a time-varying frequency-selective fading environment, where double differential space-time coding is introduced into both time domain and frequency domain. Our proposed TF-DDST-OFDM system has a low-complexity non-coherent decoding scheme and is robust for time- and frequency-selective Rayleigh fading. In this paper, we also propose the use of state-of-the-art low-density parity-check ΛLDPC) code in serial concatenation with our TF-DDST scheme as a channel code. Simulations revealed that the LDPC based TF-DDST OFDM system has low decoding complexity and relatively better performance.
|
|
CW-HSTCP: Fair TCP in high-speed networks
Pan Xue-zeng, Su Fan-jun, Lü Yong, Ping Ling-di
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(2 ): 10-.
https://doi.org/10.1631/jzus.2006.A0172
The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve this problem by modifying the congestion control mechanism to have the characteristics of TCP friendliness in high loss rate environment and high scalability in low loss rate environment. However, experiments revealed that HSTCP has severe RTT unfairness. After analyzing the RTT unfairness in HSTCP with a model, we proposed CW-HSTCP, which added a fair factor to decrease the difference of congestion window caused by different RTT. Fair factor of long RTT flows can cause a sharp window increment that is easy to cause a bursty traffic, so a method called block-pacing was adopted. Simulation results showed that our new proposal could alleviate the RTT unfairness while keeping advantages of HSTCP.
|
|
An application-layer based centralized information access control for VPN
Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(2 ): 20-.
https://doi.org/10.1631/jzus.2006.A0240
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
|
25 articles
|