Evaluation of computational efficiency on image-block cutting area in stitching orthophoto

Author(s):  
Chin-Feng Tsai ◽  
Cai-Yun Tsou ◽  
Yi-Chun Hung ◽  
Jie-Yi Lee ◽  
Ya-Ting Hsu ◽  
...  
2019 ◽  
Vol 2019 (1) ◽  
pp. 62-68
Author(s):  
Michael J. Vrhel ◽  
Artifex Software

Ghostscript has a long history in the open source community and was developed at the same time that page description languages were evolving to the complex specification of PDF today. Color is a key component in this specification and its description and proper implementation is as complex as any other part of the specification. In this document, the color processing and management that takes place in Ghostscript is reviewed with a focus on how its design achieves computational efficiency while providing flexibility for the developer and user.


Author(s):  
Anna ILYENKO ◽  
Sergii ILYENKO ◽  
Yana MASUR

In this article, the main problems underlying the current asymmetric crypto algorithms for the formation and verification of electronic-digital signature are considered: problems of factorization of large integers and problems of discrete logarithm. It is noted that for the second problem, it is possible to use algebraic groups of points other than finite fields. The group of points of the elliptical curve, which satisfies all set requirements, looked attractive on this side. Aspects of the application of elliptic curves in cryptography and the possibilities offered by these algebraic groups in terms of computational efficiency and crypto-stability of algorithms were also considered. Information systems using elliptic curves, the keys have a shorter length than the algorithms above the finite fields. Theoretical directions of improvement of procedure of formation and verification of electronic-digital signature with the possibility of ensuring the integrity and confidentiality of information were considered. The proposed method is based on the Schnorr signature algorithm, which allows data to be recovered directly from the signature itself, similarly to RSA-like signature systems, and the amount of recoverable information is variable depending on the information message. As a result, the length of the signature itself, which is equal to the sum of the length of the end field over which the elliptic curve is determined, and the artificial excess redundancy provided to the hidden message was achieved.


Author(s):  
Amos Golan

In this chapter I provide additional rationalization for using the info-metrics framework. This time the justifications are in terms of the statistical, mathematical, and information-theoretic properties of the formalism. Specifically, in this chapter I discuss optimality, statistical and computational efficiency, sufficiency, the concentration theorem, the conditional limit theorem, and the concept of information compression. These properties, together with the other properties and measures developed in earlier chapters, provide logical, mathematical, and statistical justifications for employing the info-metrics framework.


Author(s):  
Sauro Succi

This chapter provides a bird’s eye view of the main numerical particle methods used in the kinetic theory of fluids, the main purpose being of locating Lattice Boltzmann in the broader context of computational kinetic theory. The leading numerical methods for dense and rarified fluids are Molecular Dynamics (MD) and Direct Simulation Monte Carlo (DSMC), respectively. These methods date of the mid 50s and 60s, respectively, and, ever since, they have undergone a series of impressive developments and refinements which have turned them in major tools of investigation, discovery and design. However, they are both very demanding on computational grounds, which motivates a ceaseless demand for new and improved variants aimed at enhancing their computational efficiency without losing physical fidelity and vice versa, enhance their physical fidelity without compromising computational viability.


2021 ◽  
Vol 68 (3) ◽  
pp. 258-269
Author(s):  
Idris Kempf ◽  
Paul J. Goulart ◽  
Stephen R. Duncan ◽  
Guenther Rehm

Mathematics ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 462
Author(s):  
Jie Wei ◽  
Yufeng Nie ◽  
Wenxian Xie

The loop cutset solving algorithm in the Bayesian network is particularly important for Bayesian inference. This paper proposes an algorithm for solving the approximate minimum loop cutset based on the loop cutting contribution index. Compared with the existing algorithms, the algorithm uses the loop cutting contribution index of nodes and node-pairs to analyze nodes from a global perspective, and select loop cutset candidates with node-pair as the unit. The algorithm uses the parameter μ to control the range of node pairs, and the parameter ω to control the selection conditions of the node pairs, so that the algorithm can adjust the parameters according to the size of the Bayesian networks, which ensures computational efficiency. The numerical experiments show that the calculation efficiency of the algorithm is significantly improved when it is consistent with the accuracy of the existing algorithm; the experiments also studied the influence of parameter settings on calculation efficiency using trend analysis and two-way analysis of variance. The loop cutset solving algorithm based on the loop cutting contribution index uses the node-pair as the unit to solve the loop cutset, which helps to improve the efficiency of Bayesian inference and Bayesian network structure analysis.


2021 ◽  
Vol 7 (7) ◽  
pp. 119
Author(s):  
Marina Gardella ◽  
Pablo Musé ◽  
Jean-Michel Morel ◽  
Miguel Colom

A complex processing chain is applied from the moment a raw image is acquired until the final image is obtained. This process transforms the originally Poisson-distributed noise into a complex noise model. Noise inconsistency analysis is a rich source for forgery detection, as forged regions have likely undergone a different processing pipeline or out-camera processing. We propose a multi-scale approach, which is shown to be suitable for analyzing the highly correlated noise present in JPEG-compressed images. We estimate a noise curve for each image block, in each color channel and at each scale. We then compare each noise curve to its corresponding noise curve obtained from the whole image by counting the percentage of bins of the local noise curve that are below the global one. This procedure yields crucial detection cues since many forgeries create a local noise deficit. Our method is shown to be competitive with the state of the art. It outperforms all other methods when evaluated using the MCC score, or on forged regions large enough and for colorization attacks, regardless of the evaluation metric.


Sign in / Sign up

Export Citation Format

Share Document