期刊文献+
共找到56篇文章
< 1 2 3 >
每页显示 20 50 100
Frame loss error concealment for SVC 被引量:3
1
作者 PANDIT Purvin BOYCE Jill 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期677-683,共7页
Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficien... Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficiency. However, packet losses often occur over unreliable networks even for base layer of SVC and have severe impact on the playback quality of compressed video. Until now, no literature has discussed error concealment support for standard SVC bit-stream. In this paper, we provide robust and effective error concealment techniques for SVC with spatial scalability. Experimental results showed that the proposed methods provide substantial improvement, both subjectively and objectively, without a significant complexity overhead. 展开更多
关键词 SCALABLE video CODING (SVC) Error concealment Spatial SCALABILITY
下载PDF
An error resilient scheme for H.264 video coding based on distortion estimated mode decision and nearest neighbor error concealment 被引量:1
2
作者 LEE Tien-hsu WANG Jong-tzy +1 位作者 CHEN Jhih-bin CHANG Pao-chi 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期34-40,共7页
Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resi... Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resilient coding scheme for H.264and uses techniques of mode decision, data hiding, and error concealment to reduce the damage from error propagation. This paper proposes a system with two error resilience techniques that can improve the robustness of H.264 in noisy channels. The first technique is Nearest Neighbor motion compensated Error Concealment (NNEC) that chooses the nearest neighbors in the reference frames for error concealment. The second technique is Distortion Estimated Mode Decision (DEMD) that selects an optimal mode based on stochastically distorted frames. Observed simulation results showed that the rate-distortion performances of the proposed algorithms are better than those of the compared algorithms. 展开更多
关键词 H.264 ERROR resilience ERROR concealment Data hiding Mode decision
下载PDF
Error concealment in pixel based Wyner-Ziv video coding 被引量:1
3
作者 袁承宗 Han Chuanzhao +5 位作者 Wang Yan Zhang Ning Zhang Zhen Zhu Xinzhong Li Xian Qu Di 《High Technology Letters》 EI CAS 2019年第3期340-346,共7页
In the Wyner-Ziv(WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information(SI) at the decoder, and channel coding is applied to achieve compression. In t... In the Wyner-Ziv(WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information(SI) at the decoder, and channel coding is applied to achieve compression. In this paper, errors caused by the virtual correlation channel are addressed and an error concealment approach is proposed for pixel-based WZ video coding. In the approach, errors after decoding are classified into two types. Type 1 errors are caused by residual bit errors after channel decoding, while type 2 errors are due to low quality of SI in part of a frame which causes SI not lying within the quantization bin of a decoded quantized pixel value. Two separate strategies are respectively designed to detect and conceal the two types of errors. Simulations are carried out and results are presented to demonstrate the effectiveness of the proposed approach. 展开更多
关键词 Wyner-Ziv(WZ) video coding ERROR detection ERROR concealment SIDE information(SI)
下载PDF
Analysis and application of error concealment tools in AVS-M decoder
4
作者 YANG Cheng SHI Lei WU Xiao-yang ZHANG Ci-xun 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期54-58,共5页
Audio Video coding Standard (AVS) is the latest audio and video coding standard of China. AVS Part 7 (also known as AVS-M) targets mobility applications where error concealment is of great importance. This paper first... Audio Video coding Standard (AVS) is the latest audio and video coding standard of China. AVS Part 7 (also known as AVS-M) targets mobility applications where error concealment is of great importance. This paper first briefly introduces the general concept of error concealment. Then two error concealment schemes are proposed and implemented on AVS-M decoder under different test conditions. Simulation results of the schemes and suggestions on how to use these tools are also provided. 展开更多
关键词 Audio VIDEO coding Standard (AVS) Error concealment VIDEO communication
下载PDF
Content-adaptive robust error concealment for packet-lossy H.264 video streaming
5
作者 LIAO Ning YAN Dan QUAN Zi-yi MEN Ai-dong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期41-47,共7页
In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quali... In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quality of the restored video under the constraints of low delay and computational complexity, which are critical to real-time applications and portable devices having limited resources. Specifically, it takes into consideration the physical property of motion field in order to achieve more meaningful perceptual video quality, in addition to the improved objective PSNR. Further, a simple bilinear spatial interpolation approach is combined with the improved boundary-match (B-M) based temporal EC approach according to texture and motion activity analysis. Finally, we propose a low complexity temporal EC method based on motion vector interpolation as a replacement of the B-M based approach in the scheme under low-computation requirement, or as a complement to further improve the scheme's performance in applications having enough computation resources. Extensive experiments demonstrated that the proposal features not only better reconstruction, objectively and subjectively, than JM benchmark, but also robustness to different video sequences. 展开更多
关键词 ERROR concealment ERROR control H.264/AVC Video streaming LOSSY transmission
下载PDF
A NOVEL TEMPORAL ERROR CONCEALMENT METHOD BASED ON FUZZY REASONING FOR H.264
6
作者 Zhan Xuefeng Zhu Xiuchang 《Journal of Electronics(China)》 2010年第2期197-205,共9页
In this paper,a fuzzy reasoning based temporal error concealment method is proposed. The basic temporal error concealment is implemented by estimating Motion Vector (MV) of the lost MacroBlock (MB) from its neighborin... In this paper,a fuzzy reasoning based temporal error concealment method is proposed. The basic temporal error concealment is implemented by estimating Motion Vector (MV) of the lost MacroBlock (MB) from its neighboring MVs. Which MV is the most proper one is evaluated by some criteria. Generally,two criteria are widely used,namely Side Match Distortion (SMD) and Sum of Absolute Difference (SAD) of corresponding MV. However,each criterion could only partly describe the status of lost block. To accomplish the judgement more accurately,the two measures are considered together. Thus a refined measure based on fuzzy reasoning is adopted to balance the effects of SMD and SAD. Terms SMD and SAD are regarded as fuzzy input and the term ‘similarity’ as output to complete fuzzy reasoning. Result of fuzzy reasoning represents how the tested MV is similar to the original one. And k-means clustering technique is performed to define the membership function of input fuzzy sets adaptively. According to the experimental results,the concealment based on new measure achieves better performance. 展开更多
关键词 Temporal error concealment k-means clustering Adaptive membership function Fuzzy reasoning
下载PDF
One Case of Primary Thrombocythemia with Concealed Hypokalemia Complicated by Acute Myocardial Infarction
7
作者 Huiling Liang Tingting Zheng Yuanhong Zhuo 《World Journal of Cardiovascular Diseases》 CAS 2024年第1期16-26,共11页
Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest... Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest pain accompanied by profuse sweating for 3 hours and underwent emergency percutaneous coronary intervention (PCI) at a local hospital. The procedure revealed left main stem occlusion with subsequent left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA). After the procedure, the patient experienced hemodynamic instability, recurrent ventricular fibrillation, and critical condition, thus transferred to our hospital for further treatment. Symptoms and signs: The patient is in a comatose state, unresponsive to stimuli, with bilateral dilated pupils measuring 2.0 mm, exhibiting reduced sensitivity to light reflex, and recurrent fever. Coarse breath sounds can be heard in both lungs, with audible moist rales. Irregular breathing pattern is observed, and heart sounds vary in intensity. No pathological murmurs are auscultated in any valve auscultation area. Diagnostic methods: Coronary angiography results at the local hospital showed complete occlusion of the left main stem, and left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA) was performed. However, the distal guidewire did not pass through. After admission, blood tests showed a Troponin T level of 1.44 ng/ml and a Myoglobin level of 312 ng/ml. The platelet count was 1390 × 10<sup>9</sup>/L. Von Willebrand factor (vWF) activity was measured at 201.9%. Bone marrow aspiration biopsy showed active bone marrow proliferation and platelet clustering. The peripheral blood smear also showed platelet clustering. JAK-2 gene testing was positive, confirming the diagnosis of primary thrombocytosis. Treatment methods: The patient is assisted with mechanical ventilation and intra-aortic balloon counterpulsation to improve coronary blood flow. Electrolyte levels are closely monitored, especially maintaining plasma potassium levels between 4.0 and 4.5 mmol/l. Hydroxyurea 500 mg is administered for platelet reduction. Anticoagulants and antiplatelet agents are used rationally to prevent further infarction or bleeding. Antiarrhythmic, lipid-lowering, gastroprotective, hepatoprotective, and heart failure treatment are also provided. Clinical outcome: The family members chose to withdraw treatment and signed for discharge due to a combination of reasons, including economic constraints and uncertainty about the prognosis due to the long disease course. Acute myocardial infarction has gradually become one of the leading causes of death in our country. As a “green channel” disease, corresponding diagnostic and treatment protocols have been established in China, and significant progress has been made in emergency care. There are strict regulations for the time taken from the catheterization lab to the cardiac intensive care unit, and standardized treatments are provided to patients once they enter the intensive care unit. Research results show that the incidence of acute myocardial infarction in patients with primary thrombocythemia within 10 years is 9.4%. This type of disease is rare and difficult to cure, posing significant challenges to medical and nursing professionals. In order to benefit future patients, we have documented individual cases of treatment and nursing care for these patients. The research results show that these patients exhibit resistance to traditional oral anticoagulant drugs and require alternative anticoagulants. Additionally, there are significant differences in serum and plasma potassium levels among patients. Therefore, when making clinical diagnoses, it is necessary to carefully distinguish between the two. Particularly, nursing personnel should possess dialectical thinking when supplementing potassium levels in patients in order to reduce the incidence of malignant arrhythmias and mortality rates. 展开更多
关键词 Primary Thrombocythemia Acute ST-Segment Elevation Myocardial Infarction Concealed Hypokalemia THROMBOSIS BLEEDING
下载PDF
A Novel Frame Error Concealment Scheme Based on Gain Control for TCX Audio Codec
8
作者 XIANG Kai HU Ruimin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期133-138,共6页
A novel frame error concealment scheme is proposed to improve the decoded audio quality of the receiver for transform coded excitation(TCX) audio codec. This scheme, which is a gain control approach based on the stabi... A novel frame error concealment scheme is proposed to improve the decoded audio quality of the receiver for transform coded excitation(TCX) audio codec. This scheme, which is a gain control approach based on the stability of linear predictive coding(LPC) filter, predicts the lost frames by utilizing the linear spectrum frequency and different continuous attenuation factor of different kinds of lost frames. Signal noise ratio(SNR) test and multiple stimuli with hidden reference and anchor(MUSHRA) test are conducted to evaluate the performance of this approach in adaptive multi-rate wideband plus(AMR-WB+) audio codec. Compared with the original frame error concealment scheme, our scheme achieves better audio recovery quality in AMR-WB+ audio codec. 展开更多
关键词 frame error concealment audio codec transform coded excitation(TCX)
原文传递
Dual Attribute Adversarial Camouflage toward camouflaged object detection 被引量:1
9
作者 Yang Wang Zheng Fang +3 位作者 Yun-fei Zheng Zhen Yang Wen Tong Tie-yong Cao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第4期166-175,共10页
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w... The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world. 展开更多
关键词 Adversarial camouflage Digital camouflage generation Visual concealment Object detection Adversarial patch
下载PDF
A Derivative Matrix-Based Covert Communication Method in Blockchain
10
作者 Xiang Zhang Xiaona Zhang +3 位作者 Xiaorui Zhang Wei Sun Ruohan Meng Xingming Sun 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期225-239,共15页
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc... The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency. 展开更多
关键词 Covert communication blockchain concealment SECURITY capacity DERIVATION
下载PDF
Reawakened Sexual Interest: The Result of Surgical Correction of Concealed Penis
11
作者 Mishack Ikechukwu Akunekwe Blessing Etukakpan Job Gogo Otokwala 《Surgical Science》 2023年第4期295-302,共8页
Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr... Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr. E.L. in 1919. It can be associated with voiding problem and in adults, sexual issues, among others. Objective: To show that surgery can reverse celibacy induced by CP and highlight the need for an interdisciplinary approach to correction of this anomaly. Patient and Method: A thirty-one-year male patient who had a surgical release of his buried penis by two surgeons in 2019 in a private hospital. The case note was reviewed, the data obtained analyzed and the results including photographs, were presented. The patient was followed up. Result: A 10 cm length of penis and a hundred percent (100%) take of sheet of split skin graft used to resurface the denuded penis were achieved using combined spinal and epidural anesthesia. The patient, his mother and the surgeons were satisfied with the outcome. Consequently, he resolved to marry a wife after all. Conclusion: Concealed penis can now be regarded as a known cause of celibacy and surgical correction can reverse the celibate state. 展开更多
关键词 Reawakened Sexual Interest Concealed Penis CELIBACY Surgical Correction
下载PDF
隐身材料研究开发现状与矿物材料在其中的应用 被引量:6
12
作者 王宁 朱俊 +1 位作者 冯俊明 张强 《矿物学报》 CAS CSCD 北大核心 2001年第3期345-350,共6页
本文简要介绍了隐身技术中的电磁波吸收材料及矿物材料的研究开发现状。并针对日益严重的电磁波环境污染等问题 ,讨论了矿物材料在电磁波污染防治、隐身技术和远红外吸收制品等方面的应用前景及应注意的问题。
关键词 隐身材料 矿物材料 环境电磁学 电磁波吸收材料 远红外吸收制品
下载PDF
Breeding biology and novel reproductive behaviour in the Hainan Partridge(Arborophila ardens) 被引量:2
13
作者 Xiaodong Rao Canchao Yang Wei Liang 《Avian Research》 CSCD 2017年第4期232-237,共6页
Background: The Hainan Partridge(Arborophila ardens) is endemic to Hainan Island,China,and is listed as vulnerable(VU) because its population size is steadily decreasing due to illegal hunting and habitat loss.Its bre... Background: The Hainan Partridge(Arborophila ardens) is endemic to Hainan Island,China,and is listed as vulnerable(VU) because its population size is steadily decreasing due to illegal hunting and habitat loss.Its breeding biology is poorly known.Methods: This study was conducted in three sites in the major tropical primary rainforest in Hainan.Nests of the Hainan Partridge were found by monitoring radio-tracked individuals.Video recorders were set up to monitor reproductive behaviour of Hainan Partridge when nests were found.Results: Here for the first time we report the breeding biology of Hainan Partridge by providing information on its nest site,nest,eggs,and reproductive behaviour.We found that Hainan Partridges laid immaculate white eggs in ground nests which were totally covered by dry leaves and small branches forming arches that provided optimal concealment.A novel and regular behaviour was found in Hainan Partridges since they grasped leaves and small branches and then threw them on or around their nests to provide cover during incubation and after hatching of chicks.Conclusions: Recruitment behaviour in Hainan Partridges benefit from supplementation of nest arch material to nests,cover the nest entrance and thus maintain or increase nest concealment.However,it may also contribute to concealment of the track which could expose their activities and clues for predators.Our finding implies that the Hainan Partridge has evolved such a novel reproductive behaviour under the strong selection of predation pressure.Due to habitat fragmentation and habitat loss,we suggest setting up arch structures and provide small branches and leaves in degraded or fragmented habitats to improve their suitability for partridge reproduction.This method may contribute to increasing the reproductive success of Hainan Partridge and thus compensate for its continuous population decrease. 展开更多
关键词 Habitat fragmentation Habitat loss Nest arch Nest concealment Recruitment behavior
下载PDF
MOTION VECTOR RECOVERY METHOD BASED ON MEAN SHIFT PROCEDURE
14
作者 Zhan Xuefeng Zhu Xiuchang 《Journal of Electronics(China)》 2010年第6期830-837,共8页
This letter presents a novel Motion Vector (MV) recovery method which is based on Mean Shift (MS) procedure. According to motion continuity, MVs in local area should be similar. If projecting MV into 2-D feature space... This letter presents a novel Motion Vector (MV) recovery method which is based on Mean Shift (MS) procedure. According to motion continuity, MVs in local area should be similar. If projecting MV into 2-D feature space, local MVs in the feature space tend to cluster closely. To estimate the lost MVs in local area, recovery of lost MVs is modeled as clustering operation. MS procedure is applied to enforce each lost MV in the feature space to shift to the position where dominant MVs are gathered. Meanwhile, bandwidth estimation is statistically characterized by the variation of local standard de-viations; weighted value calculation is determined by estimation of overall standard deviation. Simu-lation results demonstrate their better performance when compared with other MV recovery ap-proaches and low computation cost. 展开更多
关键词 Error concealment Motion Vector (MV) recovery Mean shift K-MEANS Bandwidth estimation
下载PDF
Shaking table experimental study of recycled concrete frame-shear wall structures 被引量:8
15
作者 Zhang Jianwei Cao Wanlin +2 位作者 Meng Shaobin Yu Cheng Dong Hongying 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2014年第2期257-267,共11页
In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concea... In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concealed bracing detail. The four tested structures included one normal concrete model, one recycled coarse aggregate concrete model, and two recycled coarse and fi ne aggregate concrete models with or without concealed bracings inside the shear walls. The dynamic characteristics, dynamic response and failure mode of each model were compared and analyzed. Finite element models were also developed and nonlinear time-history response analysis was conducted. The test and analysis results show that the seismic performance of the recycled coarse aggregate concrete frame-shear wall structure is slightly worse than the normal concrete structure. The seismic resistance capacity of the recycled concrete frame-shear wall structure can be greatly improved by setting up concealed bracings inside the walls. With appropriate design, the recycled coarse aggregate concrete frame-shear wall structure and recycled concrete structure with concealed bracings inside the walls can be applied in buildings. 展开更多
关键词 recycled concrete frame-shear WALL concealed bracings SHAKING TABLE test nonlinear TIME-HISTORY response analysis
下载PDF
A New Method Searching for Concealed Mineral Resources: Geogas Prospecting Based on Nuclear Analysis and Accumulation Sampling 被引量:6
16
作者 Tong Chunhan Li Juchu(Department Three, Chengdu University of Technology, Chengdu 610059) 《Journal of Earth Science》 SCIE CAS CSCD 1999年第4期329-332,共4页
Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation ... Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation sampling, has matured and become useful method of geogas prospecting, through authors’ studies more than 10 years. The study of the mechanism for geogas prospecting has also been progressed. It bas been revealed that the geogas matter is in the form of nano-scale particles of the ores by the observation of scanning electron microscope (SEM). This paper summarizes the feature of the geogas anomaly, and describes its forming mechanism. A new example using geogas prospecting is given. 展开更多
关键词 GEOGAS PROSPECTING mechanism trace element NANO-SCALE particles INAA SEM concealed DEPOSITS
下载PDF
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network 被引量:5
17
作者 Chuanlong Li Yumeng Jiang Marta Cheslyar 《Computers, Materials & Continua》 SCIE EI 2018年第8期313-324,共12页
Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of... Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes. 展开更多
关键词 GAN CNN texture synthesis STEGANOGRAPHY WATERMARK image concealing information hiding
下载PDF
A 3D Geological Model Constrained by Gravity and Magnetic Inversion and its Exploration Implications for the World-class Zhuxi Tungsten Deposit, South China 被引量:3
18
作者 YAN Jiayong LÜ Qingtian +8 位作者 QI Guang FU Guangming ZHANG Kun LAN Xueyi GUO Xin WEI Jin LUO Fan WANG Hao WANG Xu 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2020年第6期1940-1959,共20页
The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallo... The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallogeny of the deposit have included its timing,the ore-controlling structures and sedimentary host rocks and their implications for mineral exploration.However,the deep nappe structural style of Taqian-Fuchun metallogenic belt that hosts the W deposit,and the spatial shape and scale of deeply concealed intrusions and their sedimentary host rocks are still poorly defined,which seriously restricts the discovery of new deposits at depth and in surrounding areas of the W deposit.Modern 3 D geological modeling is an important tool for the exploration of concealed orebodies,especially in brownfield environments.There are obvious density contrast and weak magnetic contrast in the ore-controlling strata and granite at the periphery of the deposit,which lays a physical foundation for solving the 3 D spatial problems of the ore-controlling geological body in the deep part of the study area through gravity and magnetic modeling.Gravity data(1:50000)and aeromagnetic data(1:50000)from the latest geophysical surveys of 2016-2018 have been used,firstly,to carry out a potential field separation to obtain residual anomalies for gravity and magnetic interactive inversion.Then,on the basis of the analysis of the relationship between physical properties and lithology,under the constraints of surface geology and borehole data,human-computer interactive gravity and magnetic inversion for 18 cross-sections were completed.Finally,the 3 D geological model of the Zhuxi tungsten deposit and its periphery have been established through these 18 sections,and the spatial shape of the intrusions and strata with a depth of 5 km underground were obtained,initially realizing―transparency‖for ore-controlling bodies.According the analysis of the geophysical,geochemical,and geological characteristics of the Zhuxi tungsten deposit,we discern three principles for prospecting and prediction in the research area,and propose five new exploration targets in its periphery. 展开更多
关键词 3D geological modelling gravity and magnetic data interactive inversion tungsten exploration of concealed W mineralization Taqian-Fuchun metallogenic belt Jiangxi province
下载PDF
A hybrid artificial bee colony algorithm and support vector machine for predicting blast-induced ground vibration 被引量:2
19
作者 Zhu Chun Xu Yingze +4 位作者 Wu Yongxin He Manchao Zhu Chuanqi Meng Qingxiang Lin Yun 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2022年第4期861-876,共16页
Because nearby construction has harmful effects,precisely predicting blast-induced ground vibration is critical.In this paper,a hybrid artificial bee colony(ABC)and support vector machine(SVM)model was proposed for pr... Because nearby construction has harmful effects,precisely predicting blast-induced ground vibration is critical.In this paper,a hybrid artificial bee colony(ABC)and support vector machine(SVM)model was proposed for predicting the value of peak particle velocity(PPV),which is used to describe blast-induced ground vibration.To construct the model,5 potentially relevant factors,including controllable and uncontrollable parameters,were considered as input parameters,and PPV was set as the output parameter.Forty-five samples were recorded from the Hongling lead-zinc mine.An ABC-SVM model was developed and trained on 35 samples via 5-fold cross-validation(CV).A testing set(10 samples)was used to evaluate the prediction performance of the ABC-SVM model.SVM and four empirical models(United States Bureau of Mines(USBM),Amraseys-Hendron(A-H),Langefors-Kihstrom(L-K),and Central Mining Research Institute(CMRI))also were introduced for comparison.Next,the performances of the models were analyzed by using 3 statistical parameters:the correlation coefficient(R2),root-mean-square error(RMSE),and variance accounted for(VAF).ABC-SVM had the highest R2 and VAF values followed by the SVM,A-H,USBM,CMRI,and L-K methods.The results demonstrated that ABC-SVM outperformed SVM and the empirical predictors for predicting PPV.Moreover,the best results from the R2,RMSE,and VAF indices were 0.9628,0.2737,and 96.05%for the ABC-SVM model.The sensitivities of the parameters also were investigated,and the height difference between the blast point and the monitoring station was found to be the parameter that had the most influence on PPV. 展开更多
关键词 recycled concrete frame-shear wall concealed bracings shaking table test nonlinear time-history response analysis
下载PDF
Application of Optically Stimulated Luminescence Technique in Exploring a Concealed Sandstone-type Uranium Deposit 被引量:1
20
作者 KANG Huan CHEN Yuelong +3 位作者 XUE Guoliang ZHAO Junxiang ZHANG Na ZHANG Yangyang 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2022年第2期571-581,共11页
Identifying ore-induced geochemical anomalies at the surface that indicate concealed deposits in buried areas remains a significant challenge in geochemical exploration. In this study, in order to trace the source of ... Identifying ore-induced geochemical anomalies at the surface that indicate concealed deposits in buried areas remains a significant challenge in geochemical exploration. In this study, in order to trace the source of the geochemical anomalies, systematic luminescence intensity analyses were conducted on quartz grains from the Quaternary regolith at the Hadatu sandstone-type uranium deposit in the Erenhot Basin. The optically stimulated luminescence(OSL) ages were much older than the depositional ages of the Quaternary regolith. Moreover, quartz OSL ages were closely related to both borehole grades and sampling depths. Thus, the abnormal mineral OSL ages from near-surface sediments were ultimately controlled by the sandstone-type uranium deposits. This is identical to the rapid changes of quartz OSL ages(0.063 ka/cm) and equivalent doses(0.19 Gy/cm) with depths in a given sampling site. The instantaneous soil radon concentration was positively correlated with the quartz OSL apparent age, indicating their ore-induced origin and, as a result, their effectiveness in the exploration of concealed uranium deposits. Other parameters, including mobile-state uranium and;Po contents, were poorly correlated with quartz OSL ages and therefore should only be used with caution for geochemical exploration. This is the first time an attempt has been made to discriminate the ore-induced sources for different surface anomaly parameters, including instantaneous soil radon, mobile-state uranium and;Po contents for concealed sandstonetype uranium deposits. 展开更多
关键词 OSL dating geochemical anomaly ore-induced anomaly concealed sandstone-type uranium deposit
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部