Based on the information complementarity relationship of heterogeneous images, this paper proposes a wavelet transform fusion method based on target feature regions. Firstly, the method based on fuzzy C-means clusteri...
详细信息
ISBN:
(纸本)9783030152352;9783030152345
Based on the information complementarity relationship of heterogeneous images, this paper proposes a wavelet transform fusion method based on target feature regions. Firstly, the method based on fuzzy C-means clustering is used to extract the target feature region of the infrared image, which is used for local information fusion of the target region of the heterogeneous image to achieve the effect of adding infrared target information in the visible image. Secondly, the original visible image is replaced by the image merged in the first step, and the fusion with the infrared image is realized by wavelet transform to obtain the final fused image. The experimental results of the proposed algorithm and other fusion algorithms are analyzed and compared using subjective and objective evaluation criteria.
Whereas the author's charging and discharging mechanism for modularized battery systems and the associated mathematical trade-off models proposed earlier minimize the human efforts in unloading/loading/(re)chargin...
详细信息
ISBN:
(纸本)9783030204549;9783030204532
Whereas the author's charging and discharging mechanism for modularized battery systems and the associated mathematical trade-off models proposed earlier minimize the human efforts in unloading/loading/(re)charging discharged modules, they per se cannot fully realize the potential ergonomic advantage of modularized battery systems in that considerable time is still necessitated for recharging the unloaded, discharged modules. Such time can apparently be obviated if unloaded, discharged modules are traded and swapped for some already fully charged modules at some battery swapping and charging stations. Battery module trading must be supported by a method to estimate the modules' different remnant energy storage capacities (hereinafter, capacities) so that such disparity can be financially offset by the trading parties. This article delineates such an estimation method, which comprises Process 1 to calculate an indicator of a module's capacity and Process 2 to estimate the module's capacity based on the indicator and some other parameters of the module.
The arrival of the Internet information age promotes the development of electronic and information platform - website. A website is a provider of information and a platform for users to communicate and interact. Websi...
详细信息
ISBN:
(纸本)9783030395124;9783030395117
The arrival of the Internet information age promotes the development of electronic and information platform - website. A website is a provider of information and a platform for users to communicate and interact. Website interface design must consider human cognitive factors, emotional factors, so the website interface design and interaction design is particularly important. Through experimental demonstration and research, this paper takes shopping website as the research object to analyze the mental model of users in website interface design and the influence of different users' occupations on the mental model. According to the conclusion of the analysis, firstly, the change process of user mental model in interface interaction is proposed. Secondly, based on the user mental model, this paper summarizes the design principles of the website. Finally, this paper provides a new way of thinking for the study of website accessibility.
HCI and HRI are two fields where a human being plays the main role. For this reason it is essential to investigate acceptance and its factors. As HRI is a relatively new and complex field, it is even more important to...
详细信息
ISBN:
(纸本)9783030279288;9783030279271
HCI and HRI are two fields where a human being plays the main role. For this reason it is essential to investigate acceptance and its factors. As HRI is a relatively new and complex field, it is even more important to examine the wider range of acceptance coefficients. Therefore, we compare existing HRI acceptance models with existing HCI attitude models to point out missing factors in HRI. We could show that acceptance models leave out important factors although they should have been build upon HCI models and adapted according to extended influencing factors. Instead a new model is set up with "new" factors and "old" HCI elements such as cognitive components are left out. The cognitive component of attitude investigates the correlation of experience and situated knowledge.
Blockchain is an evolving technology that provides trusted decentralized records of information through encrypted blocks of linked data. This technology promised to provide immutable and integral records shared among ...
详细信息
ISBN:
(纸本)9783030325206;9783030325190
Blockchain is an evolving technology that provides trusted decentralized records of information through encrypted blocks of linked data. This technology promised to provide immutable and integral records shared among authorized parties. This infrastructure creates a vast range of opportunities and reforms wide range of business practices. However, this emerging technology is lacking application development experience in real life project. In this paper, building blockchain-based application is represented for two purposes. The first one is a show case of how blockchain application can reform current business practice. The case represents a blockchain application replacing common business practice of having a middleman (Third-party) delivering original bills between healthcare providers and insurance companies. A ClaimChain application is built to demonstrate the potential benefits of the blockchain application in comparison to conventional practice. The second purpose is a demonstration of design decisions made to build blockchain application with reference to blockchain application design approaches introduced by software architecture community. The paper ends with a summary of lessons learned and recommendations for development process of blockchain application.
This article presents a new approach to collaborative filtering recommender systems that focuses on the problem of an active user's (a user to whom recommendations are generated) neighbourhood modelling. Precise i...
详细信息
ISBN:
(纸本)9783030482558;9783030482565
This article presents a new approach to collaborative filtering recommender systems that focuses on the problem of an active user's (a user to whom recommendations are generated) neighbourhood modelling. Precise identification of neighbours of an active user is one of the essential problems that recommender systems encounter due to its direct impact on the quality of generated recommendation lists. In classical algorithm, the neighbourhood is modelled by nearest k neighbours, but this approach has poor scalability. Clustering techniques, although improving time efficiency of recommender systems, can negatively affect the quality (precision) of recommendations. It results from inaccurate modelling of object neighbourhood in the case of data located on borders of clusters. A new algorithm based on multi-clustering is proposed in this article. Instead of one clustering scheme, it works on a set of ones, therefore it selects the clustering scheme that models the neighbourhood more precisely. This article presents the experiments confirming these advantages with respect to recommendation quality as well as time efficiency.
According to the difference and uncertainty of the destructional forms of asphalt pavement cracks in different regions of China, through investigation and analysis, referring to climatic zoning for highway, the differ...
详细信息
ISBN:
(纸本)9783030152352;9783030152345
According to the difference and uncertainty of the destructional forms of asphalt pavement cracks in different regions of China, through investigation and analysis, referring to climatic zoning for highway, the different destructional forms of cracks in Northern permafrost regions, Southern hot and humid regions, Northwest arid regions and Qinghai Tibet Plateau permafrost region were introduced, then combined with different climatic conditions and traffic conditions in different regions, the paper puts forward the management mode of asphalt pavement in different climate areas, provided a reference for the prevention, detection and effective repair of asphalt pavement cracks in different climatic regions in China.
Web scraping is a technique used to extract data from websites and it is the pillar of information retrieval in a world wide web that is ever growing. There are two main ways of extracting data from a website: static ...
详细信息
ISBN:
(纸本)9783030456870;9783030456887
Web scraping is a technique used to extract data from websites and it is the pillar of information retrieval in a world wide web that is ever growing. There are two main ways of extracting data from a website: static and dynamic scraping. Static scraping requires input beyond the target website because the user needs to inspect the HTML content of the target and find certain patterns in the templates that are then used to extract data. Static scraping is also very vulnerable to changes in the template of the web page. Dynamic scraping is a very broad topic and it has been tackled from many different angles: tree-based, natural language processing (NLP), computer vision or machine learning techniques. For most websites, the problem can be broken in two big steps: finding the template for the pages we want to extract data from and then removing irrelevant text such as ads, text from controls or JavaScript code. This paper proposes a solution for dynamic scraping that uses AngleSharp for HTML retrieval and involves a slightly modified approach of the graph technique mentioned in for template finding. Once we find a number of pages then several heuristics can be applied for content extraction and noise filtering. Such heuristics can include: text and hyperlink density, but also removing common content between multiple pages (usually text from controls, static JavaScript) and then of final layer of NLP techniques (breaking the content into sentences, tokenization and part-of-speech tagging).
作者:
Lio, JunOkada, TadashiChuo Univ
Fac Global Informat Shinjuku Ku 1-18 Ichigaya Tamachi Tokyo 1628478 Japan Natl Inst Informat
Principles Informat Res Div Chiyoda Ku 2-1-2 Hitotsubashi Tokyo 1018430 Japan
To prevent ticket scalping, we implemented fast identity online (FIDO) technology to authenticate and ensure the correct ticket holder identities at a basketball game held in the city of Tsukuba, Ibaraki, Japan. This ...
详细信息
ISBN:
(纸本)9783030204549;9783030204532
To prevent ticket scalping, we implemented fast identity online (FIDO) technology to authenticate and ensure the correct ticket holder identities at a basketball game held in the city of Tsukuba, Ibaraki, Japan. This paper describes an overview of our system and describes the advantages of our method compared with other ticketing systems. The system was implemented using an open-source electronic commerce platform. The addition of the FIDO module to the platform enables the biometric authentication function. Moreover, we carried out a simple evaluation of the service by asking participants to respond to a questionnaire. We also present the results of the evaluation analysis.
In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their scheme. As a ...
详细信息
ISBN:
(纸本)9783030169466;9783030169459
In 2017, Liu et al. proposed the high capacity GEMD scheme which increases the capacity of GEMD by divides n adjacent pixels into multiple groups. The dividing modes among the image are the same in their scheme. As a result, it is easy to be attacked by an attacker, In order to improve this short-coming, we change the original embedding procedure, which makes secret message more secure after embedding. The concept is combining Liu's scheme with the incremental sequence. We change each size of embedding secret message to increase security and maintain stable image quality.
暂无评论