Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficien...Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficiency. However, packet losses often occur over unreliable networks even for base layer of SVC and have severe impact on the playback quality of compressed video. Until now, no literature has discussed error concealment support for standard SVC bit-stream. In this paper, we provide robust and effective error concealment techniques for SVC with spatial scalability. Experimental results showed that the proposed methods provide substantial improvement, both subjectively and objectively, without a significant complexity overhead.展开更多
Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resi...Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resilient coding scheme for H.264and uses techniques of mode decision, data hiding, and error concealment to reduce the damage from error propagation. This paper proposes a system with two error resilience techniques that can improve the robustness of H.264 in noisy channels. The first technique is Nearest Neighbor motion compensated Error Concealment (NNEC) that chooses the nearest neighbors in the reference frames for error concealment. The second technique is Distortion Estimated Mode Decision (DEMD) that selects an optimal mode based on stochastically distorted frames. Observed simulation results showed that the rate-distortion performances of the proposed algorithms are better than those of the compared algorithms.展开更多
In the Wyner-Ziv(WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information(SI) at the decoder, and channel coding is applied to achieve compression. In t...In the Wyner-Ziv(WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information(SI) at the decoder, and channel coding is applied to achieve compression. In this paper, errors caused by the virtual correlation channel are addressed and an error concealment approach is proposed for pixel-based WZ video coding. In the approach, errors after decoding are classified into two types. Type 1 errors are caused by residual bit errors after channel decoding, while type 2 errors are due to low quality of SI in part of a frame which causes SI not lying within the quantization bin of a decoded quantized pixel value. Two separate strategies are respectively designed to detect and conceal the two types of errors. Simulations are carried out and results are presented to demonstrate the effectiveness of the proposed approach.展开更多
Audio Video coding Standard (AVS) is the latest audio and video coding standard of China. AVS Part 7 (also known as AVS-M) targets mobility applications where error concealment is of great importance. This paper first...Audio Video coding Standard (AVS) is the latest audio and video coding standard of China. AVS Part 7 (also known as AVS-M) targets mobility applications where error concealment is of great importance. This paper first briefly introduces the general concept of error concealment. Then two error concealment schemes are proposed and implemented on AVS-M decoder under different test conditions. Simulation results of the schemes and suggestions on how to use these tools are also provided.展开更多
In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quali...In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quality of the restored video under the constraints of low delay and computational complexity, which are critical to real-time applications and portable devices having limited resources. Specifically, it takes into consideration the physical property of motion field in order to achieve more meaningful perceptual video quality, in addition to the improved objective PSNR. Further, a simple bilinear spatial interpolation approach is combined with the improved boundary-match (B-M) based temporal EC approach according to texture and motion activity analysis. Finally, we propose a low complexity temporal EC method based on motion vector interpolation as a replacement of the B-M based approach in the scheme under low-computation requirement, or as a complement to further improve the scheme's performance in applications having enough computation resources. Extensive experiments demonstrated that the proposal features not only better reconstruction, objectively and subjectively, than JM benchmark, but also robustness to different video sequences.展开更多
In this paper,a fuzzy reasoning based temporal error concealment method is proposed. The basic temporal error concealment is implemented by estimating Motion Vector (MV) of the lost MacroBlock (MB) from its neighborin...In this paper,a fuzzy reasoning based temporal error concealment method is proposed. The basic temporal error concealment is implemented by estimating Motion Vector (MV) of the lost MacroBlock (MB) from its neighboring MVs. Which MV is the most proper one is evaluated by some criteria. Generally,two criteria are widely used,namely Side Match Distortion (SMD) and Sum of Absolute Difference (SAD) of corresponding MV. However,each criterion could only partly describe the status of lost block. To accomplish the judgement more accurately,the two measures are considered together. Thus a refined measure based on fuzzy reasoning is adopted to balance the effects of SMD and SAD. Terms SMD and SAD are regarded as fuzzy input and the term ‘similarity’ as output to complete fuzzy reasoning. Result of fuzzy reasoning represents how the tested MV is similar to the original one. And k-means clustering technique is performed to define the membership function of input fuzzy sets adaptively. According to the experimental results,the concealment based on new measure achieves better performance.展开更多
Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest...Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest pain accompanied by profuse sweating for 3 hours and underwent emergency percutaneous coronary intervention (PCI) at a local hospital. The procedure revealed left main stem occlusion with subsequent left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA). After the procedure, the patient experienced hemodynamic instability, recurrent ventricular fibrillation, and critical condition, thus transferred to our hospital for further treatment. Symptoms and signs: The patient is in a comatose state, unresponsive to stimuli, with bilateral dilated pupils measuring 2.0 mm, exhibiting reduced sensitivity to light reflex, and recurrent fever. Coarse breath sounds can be heard in both lungs, with audible moist rales. Irregular breathing pattern is observed, and heart sounds vary in intensity. No pathological murmurs are auscultated in any valve auscultation area. Diagnostic methods: Coronary angiography results at the local hospital showed complete occlusion of the left main stem, and left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA) was performed. However, the distal guidewire did not pass through. After admission, blood tests showed a Troponin T level of 1.44 ng/ml and a Myoglobin level of 312 ng/ml. The platelet count was 1390 × 10<sup>9</sup>/L. Von Willebrand factor (vWF) activity was measured at 201.9%. Bone marrow aspiration biopsy showed active bone marrow proliferation and platelet clustering. The peripheral blood smear also showed platelet clustering. JAK-2 gene testing was positive, confirming the diagnosis of primary thrombocytosis. Treatment methods: The patient is assisted with mechanical ventilation and intra-aortic balloon counterpulsation to improve coronary blood flow. Electrolyte levels are closely monitored, especially maintaining plasma potassium levels between 4.0 and 4.5 mmol/l. Hydroxyurea 500 mg is administered for platelet reduction. Anticoagulants and antiplatelet agents are used rationally to prevent further infarction or bleeding. Antiarrhythmic, lipid-lowering, gastroprotective, hepatoprotective, and heart failure treatment are also provided. Clinical outcome: The family members chose to withdraw treatment and signed for discharge due to a combination of reasons, including economic constraints and uncertainty about the prognosis due to the long disease course. Acute myocardial infarction has gradually become one of the leading causes of death in our country. As a “green channel” disease, corresponding diagnostic and treatment protocols have been established in China, and significant progress has been made in emergency care. There are strict regulations for the time taken from the catheterization lab to the cardiac intensive care unit, and standardized treatments are provided to patients once they enter the intensive care unit. Research results show that the incidence of acute myocardial infarction in patients with primary thrombocythemia within 10 years is 9.4%. This type of disease is rare and difficult to cure, posing significant challenges to medical and nursing professionals. In order to benefit future patients, we have documented individual cases of treatment and nursing care for these patients. The research results show that these patients exhibit resistance to traditional oral anticoagulant drugs and require alternative anticoagulants. Additionally, there are significant differences in serum and plasma potassium levels among patients. Therefore, when making clinical diagnoses, it is necessary to carefully distinguish between the two. Particularly, nursing personnel should possess dialectical thinking when supplementing potassium levels in patients in order to reduce the incidence of malignant arrhythmias and mortality rates.展开更多
A novel frame error concealment scheme is proposed to improve the decoded audio quality of the receiver for transform coded excitation(TCX) audio codec. This scheme, which is a gain control approach based on the stabi...A novel frame error concealment scheme is proposed to improve the decoded audio quality of the receiver for transform coded excitation(TCX) audio codec. This scheme, which is a gain control approach based on the stability of linear predictive coding(LPC) filter, predicts the lost frames by utilizing the linear spectrum frequency and different continuous attenuation factor of different kinds of lost frames. Signal noise ratio(SNR) test and multiple stimuli with hidden reference and anchor(MUSHRA) test are conducted to evaluate the performance of this approach in adaptive multi-rate wideband plus(AMR-WB+) audio codec. Compared with the original frame error concealment scheme, our scheme achieves better audio recovery quality in AMR-WB+ audio codec.展开更多
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w...The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world.展开更多
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc...The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.展开更多
Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr...Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr. E.L. in 1919. It can be associated with voiding problem and in adults, sexual issues, among others. Objective: To show that surgery can reverse celibacy induced by CP and highlight the need for an interdisciplinary approach to correction of this anomaly. Patient and Method: A thirty-one-year male patient who had a surgical release of his buried penis by two surgeons in 2019 in a private hospital. The case note was reviewed, the data obtained analyzed and the results including photographs, were presented. The patient was followed up. Result: A 10 cm length of penis and a hundred percent (100%) take of sheet of split skin graft used to resurface the denuded penis were achieved using combined spinal and epidural anesthesia. The patient, his mother and the surgeons were satisfied with the outcome. Consequently, he resolved to marry a wife after all. Conclusion: Concealed penis can now be regarded as a known cause of celibacy and surgical correction can reverse the celibate state.展开更多
Background: The Hainan Partridge(Arborophila ardens) is endemic to Hainan Island,China,and is listed as vulnerable(VU) because its population size is steadily decreasing due to illegal hunting and habitat loss.Its bre...Background: The Hainan Partridge(Arborophila ardens) is endemic to Hainan Island,China,and is listed as vulnerable(VU) because its population size is steadily decreasing due to illegal hunting and habitat loss.Its breeding biology is poorly known.Methods: This study was conducted in three sites in the major tropical primary rainforest in Hainan.Nests of the Hainan Partridge were found by monitoring radio-tracked individuals.Video recorders were set up to monitor reproductive behaviour of Hainan Partridge when nests were found.Results: Here for the first time we report the breeding biology of Hainan Partridge by providing information on its nest site,nest,eggs,and reproductive behaviour.We found that Hainan Partridges laid immaculate white eggs in ground nests which were totally covered by dry leaves and small branches forming arches that provided optimal concealment.A novel and regular behaviour was found in Hainan Partridges since they grasped leaves and small branches and then threw them on or around their nests to provide cover during incubation and after hatching of chicks.Conclusions: Recruitment behaviour in Hainan Partridges benefit from supplementation of nest arch material to nests,cover the nest entrance and thus maintain or increase nest concealment.However,it may also contribute to concealment of the track which could expose their activities and clues for predators.Our finding implies that the Hainan Partridge has evolved such a novel reproductive behaviour under the strong selection of predation pressure.Due to habitat fragmentation and habitat loss,we suggest setting up arch structures and provide small branches and leaves in degraded or fragmented habitats to improve their suitability for partridge reproduction.This method may contribute to increasing the reproductive success of Hainan Partridge and thus compensate for its continuous population decrease.展开更多
This letter presents a novel Motion Vector (MV) recovery method which is based on Mean Shift (MS) procedure. According to motion continuity, MVs in local area should be similar. If projecting MV into 2-D feature space...This letter presents a novel Motion Vector (MV) recovery method which is based on Mean Shift (MS) procedure. According to motion continuity, MVs in local area should be similar. If projecting MV into 2-D feature space, local MVs in the feature space tend to cluster closely. To estimate the lost MVs in local area, recovery of lost MVs is modeled as clustering operation. MS procedure is applied to enforce each lost MV in the feature space to shift to the position where dominant MVs are gathered. Meanwhile, bandwidth estimation is statistically characterized by the variation of local standard de-viations; weighted value calculation is determined by estimation of overall standard deviation. Simu-lation results demonstrate their better performance when compared with other MV recovery ap-proaches and low computation cost.展开更多
In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concea...In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concealed bracing detail. The four tested structures included one normal concrete model, one recycled coarse aggregate concrete model, and two recycled coarse and fi ne aggregate concrete models with or without concealed bracings inside the shear walls. The dynamic characteristics, dynamic response and failure mode of each model were compared and analyzed. Finite element models were also developed and nonlinear time-history response analysis was conducted. The test and analysis results show that the seismic performance of the recycled coarse aggregate concrete frame-shear wall structure is slightly worse than the normal concrete structure. The seismic resistance capacity of the recycled concrete frame-shear wall structure can be greatly improved by setting up concealed bracings inside the walls. With appropriate design, the recycled coarse aggregate concrete frame-shear wall structure and recycled concrete structure with concealed bracings inside the walls can be applied in buildings.展开更多
Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation ...Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation sampling, has matured and become useful method of geogas prospecting, through authors’ studies more than 10 years. The study of the mechanism for geogas prospecting has also been progressed. It bas been revealed that the geogas matter is in the form of nano-scale particles of the ores by the observation of scanning electron microscope (SEM). This paper summarizes the feature of the geogas anomaly, and describes its forming mechanism. A new example using geogas prospecting is given.展开更多
Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of...Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes.展开更多
The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallo...The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallogeny of the deposit have included its timing,the ore-controlling structures and sedimentary host rocks and their implications for mineral exploration.However,the deep nappe structural style of Taqian-Fuchun metallogenic belt that hosts the W deposit,and the spatial shape and scale of deeply concealed intrusions and their sedimentary host rocks are still poorly defined,which seriously restricts the discovery of new deposits at depth and in surrounding areas of the W deposit.Modern 3 D geological modeling is an important tool for the exploration of concealed orebodies,especially in brownfield environments.There are obvious density contrast and weak magnetic contrast in the ore-controlling strata and granite at the periphery of the deposit,which lays a physical foundation for solving the 3 D spatial problems of the ore-controlling geological body in the deep part of the study area through gravity and magnetic modeling.Gravity data(1:50000)and aeromagnetic data(1:50000)from the latest geophysical surveys of 2016-2018 have been used,firstly,to carry out a potential field separation to obtain residual anomalies for gravity and magnetic interactive inversion.Then,on the basis of the analysis of the relationship between physical properties and lithology,under the constraints of surface geology and borehole data,human-computer interactive gravity and magnetic inversion for 18 cross-sections were completed.Finally,the 3 D geological model of the Zhuxi tungsten deposit and its periphery have been established through these 18 sections,and the spatial shape of the intrusions and strata with a depth of 5 km underground were obtained,initially realizing―transparency‖for ore-controlling bodies.According the analysis of the geophysical,geochemical,and geological characteristics of the Zhuxi tungsten deposit,we discern three principles for prospecting and prediction in the research area,and propose five new exploration targets in its periphery.展开更多
Because nearby construction has harmful effects,precisely predicting blast-induced ground vibration is critical.In this paper,a hybrid artificial bee colony(ABC)and support vector machine(SVM)model was proposed for pr...Because nearby construction has harmful effects,precisely predicting blast-induced ground vibration is critical.In this paper,a hybrid artificial bee colony(ABC)and support vector machine(SVM)model was proposed for predicting the value of peak particle velocity(PPV),which is used to describe blast-induced ground vibration.To construct the model,5 potentially relevant factors,including controllable and uncontrollable parameters,were considered as input parameters,and PPV was set as the output parameter.Forty-five samples were recorded from the Hongling lead-zinc mine.An ABC-SVM model was developed and trained on 35 samples via 5-fold cross-validation(CV).A testing set(10 samples)was used to evaluate the prediction performance of the ABC-SVM model.SVM and four empirical models(United States Bureau of Mines(USBM),Amraseys-Hendron(A-H),Langefors-Kihstrom(L-K),and Central Mining Research Institute(CMRI))also were introduced for comparison.Next,the performances of the models were analyzed by using 3 statistical parameters:the correlation coefficient(R2),root-mean-square error(RMSE),and variance accounted for(VAF).ABC-SVM had the highest R2 and VAF values followed by the SVM,A-H,USBM,CMRI,and L-K methods.The results demonstrated that ABC-SVM outperformed SVM and the empirical predictors for predicting PPV.Moreover,the best results from the R2,RMSE,and VAF indices were 0.9628,0.2737,and 96.05%for the ABC-SVM model.The sensitivities of the parameters also were investigated,and the height difference between the blast point and the monitoring station was found to be the parameter that had the most influence on PPV.展开更多
Identifying ore-induced geochemical anomalies at the surface that indicate concealed deposits in buried areas remains a significant challenge in geochemical exploration. In this study, in order to trace the source of ...Identifying ore-induced geochemical anomalies at the surface that indicate concealed deposits in buried areas remains a significant challenge in geochemical exploration. In this study, in order to trace the source of the geochemical anomalies, systematic luminescence intensity analyses were conducted on quartz grains from the Quaternary regolith at the Hadatu sandstone-type uranium deposit in the Erenhot Basin. The optically stimulated luminescence(OSL) ages were much older than the depositional ages of the Quaternary regolith. Moreover, quartz OSL ages were closely related to both borehole grades and sampling depths. Thus, the abnormal mineral OSL ages from near-surface sediments were ultimately controlled by the sandstone-type uranium deposits. This is identical to the rapid changes of quartz OSL ages(0.063 ka/cm) and equivalent doses(0.19 Gy/cm) with depths in a given sampling site. The instantaneous soil radon concentration was positively correlated with the quartz OSL apparent age, indicating their ore-induced origin and, as a result, their effectiveness in the exploration of concealed uranium deposits. Other parameters, including mobile-state uranium and;Po contents, were poorly correlated with quartz OSL ages and therefore should only be used with caution for geochemical exploration. This is the first time an attempt has been made to discriminate the ore-induced sources for different surface anomaly parameters, including instantaneous soil radon, mobile-state uranium and;Po contents for concealed sandstonetype uranium deposits.展开更多
文摘Scalable video coding (SVC), as the Scalable Extension of H.264/AVC, is an ongoing international video coding standard designed for network adaptive or device adaptive applications and also offers high coding efficiency. However, packet losses often occur over unreliable networks even for base layer of SVC and have severe impact on the playback quality of compressed video. Until now, no literature has discussed error concealment support for standard SVC bit-stream. In this paper, we provide robust and effective error concealment techniques for SVC with spatial scalability. Experimental results showed that the proposed methods provide substantial improvement, both subjectively and objectively, without a significant complexity overhead.
文摘Although H.264 video coding standard provides several error resilience tools, the damage caused by error propagation may still be tremendous. This work is aimed at developing a robust and standard-compliant error resilient coding scheme for H.264and uses techniques of mode decision, data hiding, and error concealment to reduce the damage from error propagation. This paper proposes a system with two error resilience techniques that can improve the robustness of H.264 in noisy channels. The first technique is Nearest Neighbor motion compensated Error Concealment (NNEC) that chooses the nearest neighbors in the reference frames for error concealment. The second technique is Distortion Estimated Mode Decision (DEMD) that selects an optimal mode based on stochastically distorted frames. Observed simulation results showed that the rate-distortion performances of the proposed algorithms are better than those of the compared algorithms.
基金Supported by the National Science and Technology Major Project of China(No.2018ZX10734401-004)
文摘In the Wyner-Ziv(WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information(SI) at the decoder, and channel coding is applied to achieve compression. In this paper, errors caused by the virtual correlation channel are addressed and an error concealment approach is proposed for pixel-based WZ video coding. In the approach, errors after decoding are classified into two types. Type 1 errors are caused by residual bit errors after channel decoding, while type 2 errors are due to low quality of SI in part of a frame which causes SI not lying within the quantization bin of a decoded quantized pixel value. Two separate strategies are respectively designed to detect and conceal the two types of errors. Simulations are carried out and results are presented to demonstrate the effectiveness of the proposed approach.
基金Project (No. 60333020) supported by the National Natural Science Foundation of China
文摘Audio Video coding Standard (AVS) is the latest audio and video coding standard of China. AVS Part 7 (also known as AVS-M) targets mobility applications where error concealment is of great importance. This paper first briefly introduces the general concept of error concealment. Then two error concealment schemes are proposed and implemented on AVS-M decoder under different test conditions. Simulation results of the schemes and suggestions on how to use these tools are also provided.
基金Project supported by the Teaching and Research Award Program for Outstanding Young Professor in High Education Institute, Ministration of Education, China
文摘In this paper, we present a spatio-temporal post-processing error concealment (EC) algorithm designed initially for a H.264 video-streaming scheme over packet-lossy networks. It aims at optimizing the subjective quality of the restored video under the constraints of low delay and computational complexity, which are critical to real-time applications and portable devices having limited resources. Specifically, it takes into consideration the physical property of motion field in order to achieve more meaningful perceptual video quality, in addition to the improved objective PSNR. Further, a simple bilinear spatial interpolation approach is combined with the improved boundary-match (B-M) based temporal EC approach according to texture and motion activity analysis. Finally, we propose a low complexity temporal EC method based on motion vector interpolation as a replacement of the B-M based approach in the scheme under low-computation requirement, or as a complement to further improve the scheme's performance in applications having enough computation resources. Extensive experiments demonstrated that the proposal features not only better reconstruction, objectively and subjectively, than JM benchmark, but also robustness to different video sequences.
基金Supported by the National Natural Science Foundation of China (No.60672134)
文摘In this paper,a fuzzy reasoning based temporal error concealment method is proposed. The basic temporal error concealment is implemented by estimating Motion Vector (MV) of the lost MacroBlock (MB) from its neighboring MVs. Which MV is the most proper one is evaluated by some criteria. Generally,two criteria are widely used,namely Side Match Distortion (SMD) and Sum of Absolute Difference (SAD) of corresponding MV. However,each criterion could only partly describe the status of lost block. To accomplish the judgement more accurately,the two measures are considered together. Thus a refined measure based on fuzzy reasoning is adopted to balance the effects of SMD and SAD. Terms SMD and SAD are regarded as fuzzy input and the term ‘similarity’ as output to complete fuzzy reasoning. Result of fuzzy reasoning represents how the tested MV is similar to the original one. And k-means clustering technique is performed to define the membership function of input fuzzy sets adaptively. According to the experimental results,the concealment based on new measure achieves better performance.
文摘Medical history summary: Male, 47 years old, was admitted to the hospital due to “dizziness accompanied by chest tightness and pain for more than 8 days”. One week ago, the patient experienced chest tightness, chest pain accompanied by profuse sweating for 3 hours and underwent emergency percutaneous coronary intervention (PCI) at a local hospital. The procedure revealed left main stem occlusion with subsequent left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA). After the procedure, the patient experienced hemodynamic instability, recurrent ventricular fibrillation, and critical condition, thus transferred to our hospital for further treatment. Symptoms and signs: The patient is in a comatose state, unresponsive to stimuli, with bilateral dilated pupils measuring 2.0 mm, exhibiting reduced sensitivity to light reflex, and recurrent fever. Coarse breath sounds can be heard in both lungs, with audible moist rales. Irregular breathing pattern is observed, and heart sounds vary in intensity. No pathological murmurs are auscultated in any valve auscultation area. Diagnostic methods: Coronary angiography results at the local hospital showed complete occlusion of the left main stem, and left main stem to left anterior descending artery percutaneous transluminal coronary angioplasty (PTCA) was performed. However, the distal guidewire did not pass through. After admission, blood tests showed a Troponin T level of 1.44 ng/ml and a Myoglobin level of 312 ng/ml. The platelet count was 1390 × 10<sup>9</sup>/L. Von Willebrand factor (vWF) activity was measured at 201.9%. Bone marrow aspiration biopsy showed active bone marrow proliferation and platelet clustering. The peripheral blood smear also showed platelet clustering. JAK-2 gene testing was positive, confirming the diagnosis of primary thrombocytosis. Treatment methods: The patient is assisted with mechanical ventilation and intra-aortic balloon counterpulsation to improve coronary blood flow. Electrolyte levels are closely monitored, especially maintaining plasma potassium levels between 4.0 and 4.5 mmol/l. Hydroxyurea 500 mg is administered for platelet reduction. Anticoagulants and antiplatelet agents are used rationally to prevent further infarction or bleeding. Antiarrhythmic, lipid-lowering, gastroprotective, hepatoprotective, and heart failure treatment are also provided. Clinical outcome: The family members chose to withdraw treatment and signed for discharge due to a combination of reasons, including economic constraints and uncertainty about the prognosis due to the long disease course. Acute myocardial infarction has gradually become one of the leading causes of death in our country. As a “green channel” disease, corresponding diagnostic and treatment protocols have been established in China, and significant progress has been made in emergency care. There are strict regulations for the time taken from the catheterization lab to the cardiac intensive care unit, and standardized treatments are provided to patients once they enter the intensive care unit. Research results show that the incidence of acute myocardial infarction in patients with primary thrombocythemia within 10 years is 9.4%. This type of disease is rare and difficult to cure, posing significant challenges to medical and nursing professionals. In order to benefit future patients, we have documented individual cases of treatment and nursing care for these patients. The research results show that these patients exhibit resistance to traditional oral anticoagulant drugs and require alternative anticoagulants. Additionally, there are significant differences in serum and plasma potassium levels among patients. Therefore, when making clinical diagnoses, it is necessary to carefully distinguish between the two. Particularly, nursing personnel should possess dialectical thinking when supplementing potassium levels in patients in order to reduce the incidence of malignant arrhythmias and mortality rates.
基金Supported by the National High Technology Research and Development Program of China(863 Program)(2015AA016306)the Foundation of Outstanding Middle-aged and Young Scientific and Technological Innovation Team Program of Department of Education of Hubei Province(T201516)the Foundation of Department of Education of Hubei Province(Q20132207)
文摘A novel frame error concealment scheme is proposed to improve the decoded audio quality of the receiver for transform coded excitation(TCX) audio codec. This scheme, which is a gain control approach based on the stability of linear predictive coding(LPC) filter, predicts the lost frames by utilizing the linear spectrum frequency and different continuous attenuation factor of different kinds of lost frames. Signal noise ratio(SNR) test and multiple stimuli with hidden reference and anchor(MUSHRA) test are conducted to evaluate the performance of this approach in adaptive multi-rate wideband plus(AMR-WB+) audio codec. Compared with the original frame error concealment scheme, our scheme achieves better audio recovery quality in AMR-WB+ audio codec.
基金National Natural Science Foundation of China(grant number 61801512,grant number 62071484)Natural Science Foundation of Jiangsu Province(grant number BK20180080)to provide fund for conducting experiments。
文摘The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world.
基金This work was supported,in part,by the National Nature Science Foundation of China under grant numbers 62272236in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20201136,BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund。
文摘The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.
文摘Concealed penis (CP) is a developmental anomaly in which the penis is hidden in the skin of the abdomen, thigh or scrotum. As a result of this, the penis appears shortened in length. It was first described by Keyes Jr. E.L. in 1919. It can be associated with voiding problem and in adults, sexual issues, among others. Objective: To show that surgery can reverse celibacy induced by CP and highlight the need for an interdisciplinary approach to correction of this anomaly. Patient and Method: A thirty-one-year male patient who had a surgical release of his buried penis by two surgeons in 2019 in a private hospital. The case note was reviewed, the data obtained analyzed and the results including photographs, were presented. The patient was followed up. Result: A 10 cm length of penis and a hundred percent (100%) take of sheet of split skin graft used to resurface the denuded penis were achieved using combined spinal and epidural anesthesia. The patient, his mother and the surgeons were satisfied with the outcome. Consequently, he resolved to marry a wife after all. Conclusion: Concealed penis can now be regarded as a known cause of celibacy and surgical correction can reverse the celibate state.
基金supported by the National Natural Science Foundation of China(Nos.30360015 and 30860044 to WL)National Geographic Society(NGS)Conservation Trust(C66-05 to WL)Program for New Century Excellent Talents in University(NCET-13-0761 to CY)
文摘Background: The Hainan Partridge(Arborophila ardens) is endemic to Hainan Island,China,and is listed as vulnerable(VU) because its population size is steadily decreasing due to illegal hunting and habitat loss.Its breeding biology is poorly known.Methods: This study was conducted in three sites in the major tropical primary rainforest in Hainan.Nests of the Hainan Partridge were found by monitoring radio-tracked individuals.Video recorders were set up to monitor reproductive behaviour of Hainan Partridge when nests were found.Results: Here for the first time we report the breeding biology of Hainan Partridge by providing information on its nest site,nest,eggs,and reproductive behaviour.We found that Hainan Partridges laid immaculate white eggs in ground nests which were totally covered by dry leaves and small branches forming arches that provided optimal concealment.A novel and regular behaviour was found in Hainan Partridges since they grasped leaves and small branches and then threw them on or around their nests to provide cover during incubation and after hatching of chicks.Conclusions: Recruitment behaviour in Hainan Partridges benefit from supplementation of nest arch material to nests,cover the nest entrance and thus maintain or increase nest concealment.However,it may also contribute to concealment of the track which could expose their activities and clues for predators.Our finding implies that the Hainan Partridge has evolved such a novel reproductive behaviour under the strong selection of predation pressure.Due to habitat fragmentation and habitat loss,we suggest setting up arch structures and provide small branches and leaves in degraded or fragmented habitats to improve their suitability for partridge reproduction.This method may contribute to increasing the reproductive success of Hainan Partridge and thus compensate for its continuous population decrease.
基金Supported by the National Natural Science Foundation of China (No. 60672134)
文摘This letter presents a novel Motion Vector (MV) recovery method which is based on Mean Shift (MS) procedure. According to motion continuity, MVs in local area should be similar. If projecting MV into 2-D feature space, local MVs in the feature space tend to cluster closely. To estimate the lost MVs in local area, recovery of lost MVs is modeled as clustering operation. MS procedure is applied to enforce each lost MV in the feature space to shift to the position where dominant MVs are gathered. Meanwhile, bandwidth estimation is statistically characterized by the variation of local standard de-viations; weighted value calculation is determined by estimation of overall standard deviation. Simu-lation results demonstrate their better performance when compared with other MV recovery ap-proaches and low computation cost.
基金National Science and Technology Support Program of China under Grant No.2011BAJ08B02Natural Science Foundation of Beijing under Grant No.8132016Beijing City University Youth Backbone Talent Training Project under Grant No.PHR201108009
文摘In this study, four 1/5 scaled shaking table tests were conducted to investigate the seismic performance of recycled concrete frame-shear wall structures with different recycled aggregates replacement rates and concealed bracing detail. The four tested structures included one normal concrete model, one recycled coarse aggregate concrete model, and two recycled coarse and fi ne aggregate concrete models with or without concealed bracings inside the shear walls. The dynamic characteristics, dynamic response and failure mode of each model were compared and analyzed. Finite element models were also developed and nonlinear time-history response analysis was conducted. The test and analysis results show that the seismic performance of the recycled coarse aggregate concrete frame-shear wall structure is slightly worse than the normal concrete structure. The seismic resistance capacity of the recycled concrete frame-shear wall structure can be greatly improved by setting up concealed bracings inside the walls. With appropriate design, the recycled coarse aggregate concrete frame-shear wall structure and recycled concrete structure with concealed bracings inside the walls can be applied in buildings.
文摘Geogas prospecting is a new method in the search for deep and/or concealed mineral deposits.The probing depth of the method comes to 300-500 m below the surface. The method, based on nuclear aualysis and accumulation sampling, has matured and become useful method of geogas prospecting, through authors’ studies more than 10 years. The study of the mechanism for geogas prospecting has also been progressed. It bas been revealed that the geogas matter is in the form of nano-scale particles of the ores by the observation of scanning electron microscope (SEM). This paper summarizes the feature of the geogas anomaly, and describes its forming mechanism. A new example using geogas prospecting is given.
基金This work is supported by the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant U1536206,U1405254,61772283,61602253,61672294,61502242+2 种基金by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘Deep neural network has proven to be very effective in computer vision fields.Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing methods.Generative adversarial network(GAN)is becoming one of the highlights among these deep neural networks.GAN is capable of generating realistic images which are imperceptible to the human vision system so that the generated images can be directly used as intermediate medium for many tasks.One promising application of using GAN generated images would be image concealing which requires the embedded image looks like not being tampered to human vision system and also undetectable to most analyzers.Texture synthesizing has drawn lots of attention in computer vision field and is used for image concealing in steganography and watermark.The traditional methods which use synthesized textures for information hiding mainly select features and mathematic functions by human metrics and usually have a low embedding rate.This paper takes advantage of the generative network and proposes an approach for synthesizing complex texture-like image of arbitrary size using a modified deep convolutional generative adversarial network(DCGAN),and then demonstrates the feasibility of embedding another image inside the generated texture while the difference between the two images is nearly invisible to the human eyes.
基金jointly supported by the National Key R&D Program of China(Grant No.2016YFC0600201)China Geological Survey project(Grant Nos.DD20190012,DD20160082)the National Natural Science Foundation of China(Grant Nos.92062108,41630320,41574133)。
文摘The Zhuxi tungsten deposit in Jiangxi Province,South China,contains a total W reserve of about 2.86 Mt at an average grade of 0.54 wt%WO3,representing the largest W deposit in the world.Numerous studies on the metallogeny of the deposit have included its timing,the ore-controlling structures and sedimentary host rocks and their implications for mineral exploration.However,the deep nappe structural style of Taqian-Fuchun metallogenic belt that hosts the W deposit,and the spatial shape and scale of deeply concealed intrusions and their sedimentary host rocks are still poorly defined,which seriously restricts the discovery of new deposits at depth and in surrounding areas of the W deposit.Modern 3 D geological modeling is an important tool for the exploration of concealed orebodies,especially in brownfield environments.There are obvious density contrast and weak magnetic contrast in the ore-controlling strata and granite at the periphery of the deposit,which lays a physical foundation for solving the 3 D spatial problems of the ore-controlling geological body in the deep part of the study area through gravity and magnetic modeling.Gravity data(1:50000)and aeromagnetic data(1:50000)from the latest geophysical surveys of 2016-2018 have been used,firstly,to carry out a potential field separation to obtain residual anomalies for gravity and magnetic interactive inversion.Then,on the basis of the analysis of the relationship between physical properties and lithology,under the constraints of surface geology and borehole data,human-computer interactive gravity and magnetic inversion for 18 cross-sections were completed.Finally,the 3 D geological model of the Zhuxi tungsten deposit and its periphery have been established through these 18 sections,and the spatial shape of the intrusions and strata with a depth of 5 km underground were obtained,initially realizing―transparency‖for ore-controlling bodies.According the analysis of the geophysical,geochemical,and geological characteristics of the Zhuxi tungsten deposit,we discern three principles for prospecting and prediction in the research area,and propose five new exploration targets in its periphery.
基金National Natural Science Foundation of China(NSFC)under Grant Nos.52104125 and 52104109the Fundamental Research Funds for the Central Universities under Grant No.B220202056+2 种基金the Opening Fund of State Key Laboratory of Mining Response and Disaster Prevention and Control in Deep Coal Mines under Grant No.SKLMRDPC21KF04the Natural Science Basic Research Plan in Shaanxi Province of China(2022JQ-304)the Fund of Young Elite Scientists Sponsorship Program by CAST under Grant No.2021QNRC001。
文摘Because nearby construction has harmful effects,precisely predicting blast-induced ground vibration is critical.In this paper,a hybrid artificial bee colony(ABC)and support vector machine(SVM)model was proposed for predicting the value of peak particle velocity(PPV),which is used to describe blast-induced ground vibration.To construct the model,5 potentially relevant factors,including controllable and uncontrollable parameters,were considered as input parameters,and PPV was set as the output parameter.Forty-five samples were recorded from the Hongling lead-zinc mine.An ABC-SVM model was developed and trained on 35 samples via 5-fold cross-validation(CV).A testing set(10 samples)was used to evaluate the prediction performance of the ABC-SVM model.SVM and four empirical models(United States Bureau of Mines(USBM),Amraseys-Hendron(A-H),Langefors-Kihstrom(L-K),and Central Mining Research Institute(CMRI))also were introduced for comparison.Next,the performances of the models were analyzed by using 3 statistical parameters:the correlation coefficient(R2),root-mean-square error(RMSE),and variance accounted for(VAF).ABC-SVM had the highest R2 and VAF values followed by the SVM,A-H,USBM,CMRI,and L-K methods.The results demonstrated that ABC-SVM outperformed SVM and the empirical predictors for predicting PPV.Moreover,the best results from the R2,RMSE,and VAF indices were 0.9628,0.2737,and 96.05%for the ABC-SVM model.The sensitivities of the parameters also were investigated,and the height difference between the blast point and the monitoring station was found to be the parameter that had the most influence on PPV.
基金supported by the National Key Research and Development Program of Deep-penetrating Geochemistry(Grant No.2016YFC0600604)。
文摘Identifying ore-induced geochemical anomalies at the surface that indicate concealed deposits in buried areas remains a significant challenge in geochemical exploration. In this study, in order to trace the source of the geochemical anomalies, systematic luminescence intensity analyses were conducted on quartz grains from the Quaternary regolith at the Hadatu sandstone-type uranium deposit in the Erenhot Basin. The optically stimulated luminescence(OSL) ages were much older than the depositional ages of the Quaternary regolith. Moreover, quartz OSL ages were closely related to both borehole grades and sampling depths. Thus, the abnormal mineral OSL ages from near-surface sediments were ultimately controlled by the sandstone-type uranium deposits. This is identical to the rapid changes of quartz OSL ages(0.063 ka/cm) and equivalent doses(0.19 Gy/cm) with depths in a given sampling site. The instantaneous soil radon concentration was positively correlated with the quartz OSL apparent age, indicating their ore-induced origin and, as a result, their effectiveness in the exploration of concealed uranium deposits. Other parameters, including mobile-state uranium and;Po contents, were poorly correlated with quartz OSL ages and therefore should only be used with caution for geochemical exploration. This is the first time an attempt has been made to discriminate the ore-induced sources for different surface anomaly parameters, including instantaneous soil radon, mobile-state uranium and;Po contents for concealed sandstonetype uranium deposits.