Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Region division method of brain slice image based on deep learning
WANG Songwei, ZHAO Qiuyang, WANG Yuhang, RAO Xiaoping
Journal of Computer Applications    2020, 40 (4): 1202-1208.   DOI: 10.11772/j.issn.1001-9081.2019091521
Abstract665)      PDF (3502KB)(445)       Save
Aiming at the problem of poor accuracy of automatic region division of mouse brain slice image using traditional multimodal registration method,an unsupervised multimodal region division method of brain slice image was proposed. Firstly,based on the mouse brain map,the Atlas brain map and the Average Template brain map in the Allen Reference Atlases (ARA) database corresponding to the brain slice region division were obtained. Then the Average Template brain map and the mouse brain slices were pre-registered and modal transformed by affine transformation preprocessing and Principal Component Analysis Net-based Structural Representation(PCANet-SR)network processing. After that,according to U-net and the spatial transformation network,the unsupervised registration was realized,and the registration deformation relationship was applied to the Atlas brain map. Finally,the edge contour of the Atlas brain map extracted by the registration deformation was merged with the original mouse brain slices in order to realize the region division of the brain slice image. Compared with the existing PCANet-SR+B spline registration method,experimental results show that the Root Mean Square Error(RMSE)of the registration accuracy index of this method reduced by 1. 6%,the Correlation Coefficient(CC)and the Mutual Information(MI)increased by 3. 5% and 0. 78% respectively. The proposed method can quickly realize the unsupervised multimodal registration task of the brain slice image,and make the brain slice regions be divided accurately.
Reference | Related Articles | Metrics
Multi-factor authentication key agreement scheme based on chaotic mapping
WANG Songwei, CHEN Jianhua
Journal of Computer Applications    2018, 38 (10): 2940-2944.   DOI: 10.11772/j.issn.1001-9081.2018030642
Abstract508)      PDF (877KB)(330)       Save
In the open network environment, identity authentication is an important means to ensure information security. Aiming at the authentication protocol proposed by Li, et al (LI X, WU F, KHAN M K, et al. A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Generation Computer Systems, 2017, 84:149-159.), some security defects were pointed out, such as user impersonation attacks and denial service attacks. In order to overcome those vulnerabilities, a new protocol scheme with multi-factor was proposed. In this protocol, extended chaotic mapping was adopted, dynamic identity was used to protect user anonymity, and three-way handshake was used to achieve asynchronous authentication. Security analysis result shows that the new protocol can resist impersonation attacks and denial service attacks and protect user anonymity and unique identity.
Reference | Related Articles | Metrics