399 research outputs found

    Learning a Dilated Residual Network for SAR Image Despeckling

    Full text link
    In this paper, to break the limit of the traditional linear models for synthetic aperture radar (SAR) image despeckling, we propose a novel deep learning approach by learning a non-linear end-to-end mapping between the noisy and clean SAR images with a dilated residual network (SAR-DRN). SAR-DRN is based on dilated convolutions, which can both enlarge the receptive field and maintain the filter size and layer depth with a lightweight structure. In addition, skip connections and residual learning strategy are added to the despeckling model to maintain the image details and reduce the vanishing gradient problem. Compared with the traditional despeckling methods, the proposed method shows superior performance over the state-of-the-art methods on both quantitative and visual assessments, especially for strong speckle noise.Comment: 18 pages, 13 figures, 7 table

    A privacy-preserving fuzzy interest matching protocol for friends finding in social networks

    Get PDF
    Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before. In a social network, there are many social groups established based on common interests among persons, such as learning group, family group, and reading group. People often describe their profiles when registering as a user in a social network. Then social networks can organize these users into groups of friends according to their profiles. However, an important issue must be considered, namely many users’ sensitive profiles could have been leaked out during this process. Therefore, it is reasonable to design a privacy-preserving friends-finding protocol in social network. Toward this goal, we design a fuzzy interest matching protocol based on private set intersection. Concretely, two candidate users can first organize their profiles into sets, then use Bloom filters to generate new data structures, and finally find the intersection sets to decide whether being friends or not in the social network. The protocol is shown to be secure in the malicious model and can be useful for practical purposes.Peer ReviewedPostprint (author's final draft

    LIQUID-SOLID COUPLING RESPONSE OF SURROUNDING ROCK MASS OF LARGE-DIAMETER RIVER-CROSSING SHIELD TUNNEL

    Get PDF
    The purpose is to investigate the response of seepage field, displacement field and stress field in the surrounding rock mass during dynamic tunneling in soft soil area. Relied on a large-diameter river-crossing shield tunnel project, considering driving force, shield tail grouting pressure, and the friction resistance between the shield shell and the soil, a three-dimensional fine tunnel model considering the liquid-solid coupling effect in the soil during dynamic tunneling was established by employing the finite difference method. The response characteristics of pore water pressure, displacement and stress in the surrounding rock mass were obtained. The results show that during shield tunneling and shield tail grouting, the pore water pressure in the range of 0.5 times the hole diameter around the tunnel decreases and increases respectively due to the liquid-solid coupling in the surrounding rock mass. When the shield tunneling moves away, the pore water pressure of the soil near the vault decreases, and the pore water pressure near the tunnel arch bottom increases. The impact range of shield tail grouting on the vertical settlement of the upper soil is about 0.5 times the hole diameter. The shield tail grouting can effectively reduce the vertical settlement of the top soil and slow down the vertical uplift of the bottom soil. During shield tunneling the vertical stress distribution of the soil above the vault of the working position and around the excavation surface is funnel-shaped, and the vertical stress around the excavated tunnel decreases

    Carrier Dynamics in Submonolayer InGaAs/GaAs Quantum Dots

    Get PDF
    Carrier dynamics of submonolayer (SML) InGaAs/GaAs quantum dots (QDs) were studied by micro-photoluminecence (MPL), selectively excited photoluminescence (SEPL), and time-resolved photoluminescence (TRPL). MPL and SEPL show the coexistence of localized and delocalized states, and different local phonon modes. TRPL reveal shorter recombination lifetimes and longer capture times for the QDs with higher emission energy. This suggests that the smallest SML QDs are formed by perfectly vertically correlated 2D InAs islands, having the highest In content and the lowest emission energy, while a slight deviation from the perfectly vertical correlation produces larger QDs with lower In content and higher emission energy.Comment: 12 pages, 5 figure

    Effects of drought stress on the seed germination and early seedling growth of the endemic desert plant Eremosparton songoricum (Fabaceae)

    Get PDF
    Eremosparton songoricum (Litv.) Vass. is an endemic and extremely drought-resistant desert plant with populations that are gradually declining due to the failure of sexual recruitment. The effects of drought stress on the seed germination and physiological characteristics of seeds and seedlings were investigated. The results showed that the germination percentage decreased with an increase of polyethylene glycol 6000 (PEG) concentration: -0.3 MPa (5 % PEG) had a promoting effect on seed germination, -0.9 MPa (15 % PEG)dramatically reduced germination, and -1.8 MPa (30 % PEG) was the threshold for E. songoricum germination. However, the contents of proline and soluble sugars and the activity of CAT increased with increasing PEG concentrations. At the young seedling stage, the proline content and CAT, SOD and POD activities all increased at 2 h and then decreased; except for a decrease at 2 h, the MDA content also increased compared to the control (0 h). These results indicated that 2 h may be a key response time point for E. songoricum to resist drought stress. The above results demonstrate that drought stress can suppress and delay the germination of E. songoricum and that the seeds accumulate osmolytes and augment the activity of antioxidative enzymes to cope with drought injury. E. songoricum seedlings are sensitive to water stress and can quickly respond to drought but cannot tolerate drought for an extended period. Although such physiological and biochemical changes are important strategies for E. songoricum to adapt to a drought-prone environment, they may be, at least partially, responsible for the failure of sexual reproduction under natural conditions

    A one-dimensional extremely covalent material: monatomic carbon linear chain

    Get PDF
    Polyyne and cumulene of infinite length as the typical covalent one-dimensional (1D) monatomic linear chains of carbon have been demonstrated to be metallic and semiconductor (Eg = 1.859 eV), respectively, by first-principles calculations. Comparing with single-walled carbon nanotubes, the densities are evidently low and the thermodynamic properties are similar below room temperature but much different at the high temperature range. Polyyne possesses a Young's modulus as high as 1.304 TPa, which means it is even much stiffer than carbon nanotubes and to be the superlative strong 1D material along the axial direction. The Young's modulus of cumulene is estimated to be 760.78 GPa. In addition, polyyne is predicted to be as a one-dimensional electronic material with very high mobility

    Cost-effective secure e-health cloud system using identity based cryptographic techniques

    Get PDF
    Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage.Peer ReviewedPostprint (author's final draft

    Taking Others as a Mirror: Contingent Social Comparison Promotes Task Engagement

    Get PDF
    Social comparison implemented in an informational while not controlling manner can be motivating. In order to directly examine the effect of contingent social comparison on one’s task engagement, we manipulated social comparison in an experimental study and adopted an electrophysiological approach to measure one’ task engagement. In this experiment, we engaged the participants in a modified stop-watch (SW) task which requires a button press to stop the watch within a given time interval and instructed the participants to either play alone or simultaneously play with a same-sex counterpart. In the latter case, they could freely solicit feedback on their counterparts’ performance besides their own. Enlarged stimulus-preceding negativity (SPN) and error-related negativity (ERN) were observed in the two-player condition, indicating strengthened anticipatory attention toward the task-onset stimulus at the pre-task stage and enhanced performance surveillance during task execution. As a complement, self-report data suggested that the participants were more intrinsically motivated to engage in the SW task when contingent social comparison was present. Thus, converging electrophysiological and behavioral evidences suggested the pivotal role of contingent social comparison in promoting self-directed task engagement
    • …
    corecore