399 research outputs found
Learning a Dilated Residual Network for SAR Image Despeckling
In this paper, to break the limit of the traditional linear models for
synthetic aperture radar (SAR) image despeckling, we propose a novel deep
learning approach by learning a non-linear end-to-end mapping between the noisy
and clean SAR images with a dilated residual network (SAR-DRN). SAR-DRN is
based on dilated convolutions, which can both enlarge the receptive field and
maintain the filter size and layer depth with a lightweight structure. In
addition, skip connections and residual learning strategy are added to the
despeckling model to maintain the image details and reduce the vanishing
gradient problem. Compared with the traditional despeckling methods, the
proposed method shows superior performance over the state-of-the-art methods on
both quantitative and visual assessments, especially for strong speckle noise.Comment: 18 pages, 13 figures, 7 table
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks
Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before. In a social network, there are many social groups established based on common interests among persons, such as learning group, family group, and reading group. People often describe their profiles when registering as a user in a social network. Then social networks can organize these users into groups of friends according to their profiles. However, an important issue must be considered, namely many users’ sensitive profiles could have been leaked out during this process. Therefore, it is reasonable to design a privacy-preserving friends-finding protocol in social network. Toward this goal, we design a fuzzy interest matching protocol based on private set intersection. Concretely, two candidate users can first organize their profiles into sets, then use Bloom filters to generate new data structures, and finally find the intersection sets to decide whether being friends or not in the social network. The protocol is shown to be secure in the malicious model and can be useful for practical purposes.Peer ReviewedPostprint (author's final draft
LIQUID-SOLID COUPLING RESPONSE OF SURROUNDING ROCK MASS OF LARGE-DIAMETER RIVER-CROSSING SHIELD TUNNEL
The purpose is to investigate the response of seepage field, displacement field and stress field in the surrounding rock mass during dynamic tunneling in soft soil area. Relied on a large-diameter river-crossing shield tunnel project, considering driving force, shield tail grouting pressure, and the friction resistance between the shield shell and the soil, a three-dimensional fine tunnel model considering the liquid-solid coupling effect in the soil during dynamic tunneling was established by employing the finite difference method. The response characteristics of pore water pressure, displacement and stress in the surrounding rock mass were obtained. The results show that during shield tunneling and shield tail grouting, the pore water pressure in the range of 0.5 times the hole diameter around the tunnel decreases and increases respectively due to the liquid-solid coupling in the surrounding rock mass. When the shield tunneling moves away, the pore water pressure of the soil near the vault decreases, and the pore water pressure near the tunnel arch bottom increases. The impact range of shield tail grouting on the vertical settlement of the upper soil is about 0.5 times the hole diameter. The shield tail grouting can effectively reduce the vertical settlement of the top soil and slow down the vertical uplift of the bottom soil. During shield tunneling the vertical stress distribution of the soil above the vault of the working position and around the excavation surface is funnel-shaped, and the vertical stress around the excavated tunnel decreases
Carrier Dynamics in Submonolayer InGaAs/GaAs Quantum Dots
Carrier dynamics of submonolayer (SML) InGaAs/GaAs quantum dots (QDs) were
studied by micro-photoluminecence (MPL), selectively excited photoluminescence
(SEPL), and time-resolved photoluminescence (TRPL). MPL and SEPL show the
coexistence of localized and delocalized states, and different local phonon
modes. TRPL reveal shorter recombination lifetimes and longer capture times for
the QDs with higher emission energy. This suggests that the smallest SML QDs
are formed by perfectly vertically correlated 2D InAs islands, having the
highest In content and the lowest emission energy, while a slight deviation
from the perfectly vertical correlation produces larger QDs with lower In
content and higher emission energy.Comment: 12 pages, 5 figure
Effects of drought stress on the seed germination and early seedling growth of the endemic desert plant Eremosparton songoricum (Fabaceae)
Eremosparton songoricum (Litv.) Vass. is an endemic and extremely drought-resistant desert plant with populations that are gradually declining due to the failure of sexual recruitment. The effects of drought stress on the seed germination and physiological characteristics of seeds and seedlings were investigated. The results showed that the germination percentage
decreased with an increase of polyethylene glycol 6000 (PEG) concentration: -0.3 MPa (5 % PEG) had a promoting effect on seed germination, -0.9 MPa (15 % PEG)dramatically reduced germination, and -1.8 MPa (30 % PEG) was the threshold for E. songoricum germination.
However, the contents of proline and soluble sugars and the activity of CAT increased
with increasing PEG concentrations. At the young seedling stage, the proline content and
CAT, SOD and POD activities all increased at 2 h and then decreased; except for a decrease
at 2 h, the MDA content also increased compared to the control (0 h). These results indicated that 2 h may be a key response time point for E. songoricum to resist drought stress. The above results demonstrate that drought stress can suppress and delay the germination of E. songoricum and that the seeds accumulate osmolytes and augment the activity of antioxidative
enzymes to cope with drought injury. E. songoricum seedlings are sensitive to water
stress and can quickly respond to drought but cannot tolerate drought for an extended period. Although such physiological and biochemical changes are important strategies for E. songoricum to adapt to a drought-prone environment, they may be, at least partially, responsible for the failure of sexual reproduction under natural conditions
A one-dimensional extremely covalent material: monatomic carbon linear chain
Polyyne and cumulene of infinite length as the typical covalent one-dimensional (1D) monatomic linear chains of carbon have been demonstrated to be metallic and semiconductor (Eg = 1.859 eV), respectively, by first-principles calculations. Comparing with single-walled carbon nanotubes, the densities are evidently low and the thermodynamic properties are similar below room temperature but much different at the high temperature range. Polyyne possesses a Young's modulus as high as 1.304 TPa, which means it is even much stiffer than carbon nanotubes and to be the superlative strong 1D material along the axial direction. The Young's modulus of cumulene is estimated to be 760.78 GPa. In addition, polyyne is predicted to be as a one-dimensional electronic material with very high mobility
Cost-effective secure e-health cloud system using identity based cryptographic techniques
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage.Peer ReviewedPostprint (author's final draft
Taking Others as a Mirror: Contingent Social Comparison Promotes Task Engagement
Social comparison implemented in an informational while not controlling manner can be motivating. In order to directly examine the effect of contingent social comparison on one’s task engagement, we manipulated social comparison in an experimental study and adopted an electrophysiological approach to measure one’ task engagement. In this experiment, we engaged the participants in a modified stop-watch (SW) task which requires a button press to stop the watch within a given time interval and instructed the participants to either play alone or simultaneously play with a same-sex counterpart. In the latter case, they could freely solicit feedback on their counterparts’ performance besides their own. Enlarged stimulus-preceding negativity (SPN) and error-related negativity (ERN) were observed in the two-player condition, indicating strengthened anticipatory attention toward the task-onset stimulus at the pre-task stage and enhanced performance surveillance during task execution. As a complement, self-report data suggested that the participants were more intrinsically motivated to engage in the SW task when contingent social comparison was present. Thus, converging electrophysiological and behavioral evidences suggested the pivotal role of contingent social comparison in promoting self-directed task engagement
- …