average diffusion distance

average diffusion distance(ADD) 

定义见: [1]




说明见: [2]




主要代码:


% test for farthest point sampling on 3D meshes
%%%%%%%%%%%%%%   sphere   %%%%%%%%%%%%%%%%
% name = 'sphere40.obj';
% X0=read_obj(name); 
% vertex=X0.xyz';  %坐标
% faces=X0.tri'; %三角形顺序索引
%%%%%%%%%%%%%%   elephant   %%%%%%%%%%%%%%%%
[vertex,faces] = read_mesh('elephant-50kv');
vertex = vertex';
faces = faces';
%dis=squareform(pdist(vertex));%euclidian distance 


numvert = size(vertex, 1);
colorvector = (1:numvert)'/ numvert;
%figure(1);
%scatter3(vertex(:,1),vertex(:,2),vertex(:,3),10,colorvector,'filled'); 
L = cotmatrix(vertex,faces);
M = massmatrix(vertex,faces,'voronoi');
M = diag(M);
M = M * ones(1,size(L,2));
L = L./M;% the discrete Laplacian matrix

eigennum = 51;

[U,S] = eigs(L, eigennum, 'sr');

%[U,S,V] = svds(L,size(L,1));
eigenvals=diag(S);
t = 1 / (2 * eigenvals(2)); % select time
eigenvals = eigenvals(eigenvals<-log(0.1)/t);% choose eigen number

eigennum = min(eigennum - 1, size(eigenvals,1) - 1);

e_minus_lambda_t = exp(-eigenvals(2:eigennum+1).*t);   
e_minus_lambda_t = ones(size(U,1),1)*e_minus_lambda_t';
X = U(:,2:eigennum+1).*e_minus_lambda_t;
%figure(2);
%scatter3(X(:,1),X(:,2),X(:,3),10,colorvector,'filled'); 
dis=squareform(pdist(X).^2);%diffusion distance 
D = sum(dis, 2);

col = D;
col = perform_histogram_equalization(col, linspace(0,1,length(col)));
options.face_vertex_color = col;
clf;
hold on;
plot_mesh(vertex, faces, options);
colormap jet(256);
camlight;
shading interp;


最终结果:




正如[1]说的那样,the ADD presents highvalues for boundary and extrema points, and small valuesfor points in the center of the segment.



[1]A Hierarchical Segmentation of Articulated Bodies

[2]Symmetry-Aware Nonrigid Matching of Incomplete 3D Surfaces


完整源代码

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.
最新发布
06-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值