Explore chapters and articles related to this topic
Compression of Wearable Body Sensor Network Data
Published in Kuan-Ching Li, Beniamino DiMartino, Laurence T. Yang, Qingchen Zhang, Smart Data, 2019
Robinson Raju, Melody Moh, Teng-Sheng Moh
The experiments were conducted on a machine with the following hardware: 2.8 GHz Intel Core i7 2.8 GHz processor.16 GB 1600 MHz DDR3 Memory.500GB Flash hard disk drive.
Automated Superpixel-borders-guided Deformation Image Registration for Adaptive Radiotherapy
Published in IETE Technical Review, 2022
Li Zhang, Bin Li, Lian-Fang Tian, Xiang-Xia Li, Ming-Sheng Zhang, Shuang-Chun Liu
The proposed SBG-DIR framework is general and can be used for 2D and 3D case. The performance of the proposed SBG-DIR model has been validated on the clinical follow-up CT volume pairs after pre-processing from eight lung cancer patients, who received several follow-up CT examinations. Each examination was performed at intervals of 6–12 months using the same scanner and scan protocol from the Guangdong General Hospital. The number of slices per CT scan ranges from 273 to 360 with a slice thickness of 1.25 mm and each slice image is 512 × 512 pixels at a resolution ranging from 0.64 to 0.88 mm per pixel. The proposed SBG-DIR method is implemented in MATLAB and open functions in C++. The program is tested on a HP-2008 workstation with 64-bit Windows 7 OS, CPU Intel Xeon(R) X5690 (3.47 GHz), RAM 192 GB DDR3 1333 MHz and graphics card NVIDIA Quadro 6000 with 4GB video memory.
A Fast Image Encryption Algorithm Based on Convolution Operation
Published in IETE Journal of Research, 2019
The computer used is configured with Intel(R) Core(TM) i7-4720HQ [email protected] GHz, 8 GB DDR3 RAM, Windows 10(64-bit), MATLAB 9.0 and Eclipse C/C++ with MinGW GCC Tool Chain. The images used in the test are Lena, Baboon, Pepper, all-black and all-white images all of size 512 × 512, as shown in Figure 4(a–e). Without loss of generality, the simulation uses the secret key K = {989209, 340466, 336436, 110955, 421653, 100976, 24776, 527877, 201612, 865082, 563081, 647203, 163613, 794037, 462583}. With the image cryptosystem shown in Figure 3, the plain images as shown in Figure 4(a–e) are encrypted into the cipher images, as shown in Figure 4(f–j), respectively, and the cipher images in Figure 4(f–j) are decrypted into the original images, as shown in Figure 4(k–o), respectively.
A connection between time domain model order reduction and moment matching for LTI systems
Published in Mathematical and Computer Modelling of Dynamical Systems, 2018
The test system is always the following: CPU: 2x Intel® Xeon® X5650 6 Cores per CPU,clock rate: GHz,12 MB Cache per CPU,memory: GB DDR3 with ECC.