Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
MAP super-resolution reconstruction based on adaptive constraint regularization HL-MRF prior model
QIN Longlong, QIAN Yuan, ZHANG Xiaoyan, HOU Xue, ZHOU Qin
Journal of Computer Applications    2015, 35 (2): 506-509.   DOI: 10.11772/j.issn.1001-9081.2015.02.0506
Abstract982)      PDF (716KB)(351)       Save

Aiming at the poor suppression ability for the high-frequency noise in Huber-MRF prior model and the excessive punishment for the high frequency information of image in Gauss-MRF prior model, an adaptive regularization HL-MRF model was proposed. The method combined low frequency function of Huber edge punishment with high frequency function of Lorentzian edge punishment to realize a linear constraint for low frequency and a less punishment for high frequency. The model gained its optimal solution of parameters by using adaptive constraint method to determine regularization parameter. Compared with super-resolution reconstruction methods based on Gauss-MRF prior model and Huber-MRF prior model, the method based on HL-MRF prior model obtains higer Peak Signal-to-Noise Ratio (PSNR) and better performace in details, therefore it has ceratin advantage to suppress the high frequency noise and avoid excessively smoothing image details.

Reference | Related Articles | Metrics
Encryption algorithm for QR code based on Ising model
ZHOU Qing HUANG Dangzhi
Journal of Computer Applications    2013, 33 (10): 2861-2864.  
Abstract529)      PDF (575KB)(695)       Save
There is a potential security risk in the communication process by using QR (Quick Response) code. This paper, therefore, proposed an encryption algorithm. Ising model has a matrix form, in which it is same with QR code, and its process of state change supports parallel operation. An encryption matrix was generated according to the model’s change rule, and then the ciphertext of QR code was produced, using the matrix and combining coding theory of the code. It was proven by the experiments that the algorithm did well in terms of randomness and sensitivity of key. With its simplicity, security and high efficiency, it could be applied to the secure communication for QR code.
Related Articles | Metrics
DVB-CI device driver development on embedded Linux system
ZHOU Qing-xi,LIU Qiang
Journal of Computer Applications    2005, 25 (07): 1698-1700.   DOI: 10.3724/SP.J.2005.01698
Abstract944)      PDF (418KB)(772)       Save

The method was introduced to encapsulate the detailed controls of the concrete DVB-CI device with device driver and provide the uplayer program an abstract device on the embedded Linux system. A DVB-CI device driver based on MontaVista's Hard Hat Linux system and IBM STB02500 Set-Top Box Integrated Controller was implemented as an example.

Reference | Related Articles | Metrics