Computing halfspace depth contours based on the idea of a circular sequence

被引:1
|
作者
Liu Xiaohui [1 ,2 ]
Ren Haiping [3 ]
Wang Guofu [4 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Stat, Nanchang 330013, Peoples R China
[2] Jiangxi Univ Finance & Econ, Res Ctr Appl Stat, Nanchang 330013, Peoples R China
[3] Jiangxi Univ Sci & Technol, Sch Software, Nanchang 330013, Peoples R China
[4] Cent S Univ, Sch Math & Stat, Changsha 417100, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Circular sequence; exact algorithm; halfspace depth contour; TRIMMED REGIONS; LOCATION; ALGORITHM;
D O I
10.1007/s11424-015-3160-y
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
This paper presents a new efficient algorithm for exactly computing the halfspace depth contours based on the idea of a circular sequence. Unlike the existing methods, the proposed algorithm segments the unit sphere directly relying on the permutations that correspond to the projections of observations onto some unit directions, without having to use the technique of parametric programming. Some data examples are also provided to illustrate the performance of the proposed algorithm.
引用
收藏
页码:1399 / 1411
页数:13
相关论文
共 50 条
  • [41] Parallelizing a kalman filter based depth estimator operating on a sequence of images
    Pryk, Z
    Koziarz, W
    Pedersen, C
    PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 451 - 457
  • [42] Preprocessing of Kinect Depth Map Sequence Compression Based on Fusion Algorithm
    Ha, Rui
    Liu, Pengyu
    Jia, Kebin
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 463 - 467
  • [43] Vision-based surface defect inspection for sequence circular objects
    Li Lin
    Wang Zhong
    Pei Fang-ying
    2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, : 1352 - 1356
  • [44] A Simple, Fast, Filter-Based Algorithm for Circular Sequence Comparison
    Azim, Md. Aashikur Rahman
    Kabir, Mohimenul
    Rahman, M. Sohel
    WALCOM: ALGORITHMS AND COMPUTATION, WALCOM 2018, 2018, 10755 : 183 - 194
  • [45] A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach
    Oktay, Ucman
    Aydin, Muhammed Ali
    Sahingoz, Ozgur Koray
    14TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2013, : 201 - 206
  • [46] Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition
    Siddiqi, Muhammad Hameed
    Khan, Adil Mehmood
    Lee, Seok-Won
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (11): : 2839 - 2852
  • [47] CIRCNV: Detection of CNVs Based on a Circular Profile of Read Depth from Sequencing Data
    Zhao, Hai-Yong
    Li, Qi
    Tian, Ye
    Chen, Yue-Hui
    Alvi, Haque A. K.
    Yuan, Xi-Guo
    BIOLOGY-BASEL, 2021, 10 (07):
  • [48] Radar Communication Integrated Waveform Design Based on OFDM and Circular Shift Sequence
    Li, Cong
    Bao, Weimin
    Xu, Luping
    Zhang, Hua
    Huang, Ziyang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [49] An in-depth and systematic literature review on the blockchain-based approaches for cloud computing
    Jianhu Gong
    Nima Jafari Navimipour
    Cluster Computing, 2022, 25 : 383 - 400
  • [50] An anesthesia depth computing method study based on wavelet transform and artificial neural network
    Yuan S.
    Ye J.
    Zhang X.
    Zhou J.
    Tan X.
    Li R.
    Deng Z.
    Ding Y.
    Shengwu Yixue Gongchengxue Zazhi/Journal of Biomedical Engineering, 2021, 38 (05): : 838 - 847