It presents a feature extraction and recognition method in this paper based on wavelet packet decomposition energy and support vector machine to solve the problem of recognizing the visible impurity in ampoules. The a...
详细信息
Currently, geographic information systems (GIS) are accessible to a large public, in particular to users who cannot be considered as experts. However, the access to geographic information and its overtaking by various...
详细信息
ISBN:
(纸本)9781424445189
Currently, geographic information systems (GIS) are accessible to a large public, in particular to users who cannot be considered as experts. However, the access to geographic information and its overtaking by various users are not easy. Indeed, between the rigidity of the available access languages and the ignorance of the organization of information within the GIS, the user is often facing information which is available but no exploitable. To solve this problem and to facilitate the access to geographic information, in this article we propose ENVIS: a visual environment for the querying of GIS according to a figurative approach based on the definition of a visual language. The following sections in this article will try to identify, by the presentation of the prototype ENVIS, the benefits which can be drawn from this visual dialog which offers to the user a means to formulate a geographical query in an intuitive and simplified way.
Feature extraction and classifier design are two main processing blocks in all pattern recognition andcomputer vision systems. For visual patterns, extracting robust and discriminative features from image is the most...
详细信息
ISBN:
(纸本)9781424445189
Feature extraction and classifier design are two main processing blocks in all pattern recognition andcomputer vision systems. For visual patterns, extracting robust and discriminative features from image is the most difficult yet the most critical step. Several typical and advanced approaches of feature extraction from image are explored, some of which are analyzed in depth. Various techniques of feature extraction from image are organized in four categories: human expert knowledge based methods, image local structure based approaches, image global structure based techniques and machine learning based statistical approaches. We will show examples of applying these feature extraction approaches to solve problems of the image based biometrics, including fingerprint verification/identification and face detection/recognition. These illustrative application examples unveil the ideas, principles and advancements of feature extraction techniques and demonstrate their effectiveness and limitations in solving real-world problems.
In order to meet the needs of product collaborative design, a method of data update consistency control was presented based on Peer-to-Peer (P2P) network technology. The data consistency management mode was establishe...
详细信息
ISBN:
(纸本)9781424445189
In order to meet the needs of product collaborative design, a method of data update consistency control was presented based on Peer-to-Peer (P2P) network technology. The data consistency management mode was established in P2P collaborative design environment, and method of data update control was analyzed among design peers. Through constructing collaborative mode of P2P groups, we realized control mechanism of data update consistency on the basis of the design constraint sets. The proposed approach offered effectively technical support for dynamic data management of design process in distributed collaborative environment.
Today, supply chain management, is one of the most important usable ways by modern companies to earn competitive benefit. informationtechnology has had very important effect on its development. Also, supply chain, is...
详细信息
ISBN:
(纸本)9781424445189
Today, supply chain management, is one of the most important usable ways by modern companies to earn competitive benefit. informationtechnology has had very important effect on its development. Also, supply chain, is one of the management substructure bases in electronic business. Since supply chains may be long, complicated and including a lot of foreigner, partners are faced with problems that carelessness to them will cause dissatisfaction of customers and losing sale. This management widely is supported by informationtechnology. After a brief discussion on different parts of supply chain management, this paper tries to turn existing problems in this chain and presents a classification of the different ways in which companies use IT in SCM(Supply Chain Management) and usage of informationtechnology in it for instance, different applications of RFID (Radio Frequency Identification) are mentioned. Next section is dedicated to the definition of CPFR (Collaborative Planning Forecasting and Replenishment) systems. At last, a case study will be printed.
Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are p...
详细信息
ISBN:
(纸本)9781424445189
Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are public key broadcast encryption using identity as the public key. In this paper, we show a novel way to construct identity based broadcast encryption. We introduce a new concept: one to many identity based proxy re-encryption. And we show how to construct efficient identity based broadcast encryption based on this primitive. Our scheme can achieve constant size public keys and private keys and linear size ciphertext. But our scheme no longer needs explicitly describing receiver set while all the other schemes need. Thus our scheme is an efficient broadcast encryption scheme compared with other schemes.
Electronic Marketplaces (e-marketplaces, EMs) are one of the most important components of Electronic Commerce (EC). They allow the exchange of goods or services between buyers and sellers for money or other products a...
详细信息
ISBN:
(纸本)9781424445189
Electronic Marketplaces (e-marketplaces, EMs) are one of the most important components of Electronic Commerce (EC). They allow the exchange of goods or services between buyers and sellers for money or other products and services. EMs also play a central role in the economy by facilitating the exchange of information, goods, services, and payments. E-marketplaces create economic value for buyers, sellers, market intermediaries, and for society, at large. In this paper, after the introducing the e-marketplaces, we present the globalization issue and its opportunities for businesses. Then, the challenges and influences of electronic marketplaces in this new economy will be expressed. Finally, as an instance, we present the applications of EM to improve agriculture industry in a selected region.
Because of high mobility and resource constrains in Mobile Ad hoc Network (MANET) environment, a lot of challenges are encountered in effective routing such as Quality of Service (QoS). In this paper, the Ad hoc On-de...
详细信息
ISBN:
(纸本)9781424445189
Because of high mobility and resource constrains in Mobile Ad hoc Network (MANET) environment, a lot of challenges are encountered in effective routing such as Quality of Service (QoS). In this paper, the Ad hoc On-demand Distance Vector (AODV) routing protocol is revised by calculating the corresponding QoS provision values to find the best routes and applying the mechanism of carrier sense in ieee 802.11b to obtain the available bandwidth. Simulation showed that using QoS parameters in route discovery process can significantly reduce end-to-end delay and increase packet delivery ratio under conditions of high load and moderate to high mobility, though the routing load of AODV is slightly less than that of the proposed protocol. Comparison between original routing protocol and the improved algorithm is carried out by using NS-2.
The CoMSON project is a distributed European research project that combines research efforts from both academia and industry. This project is distributed among eight institutions across Europe. The aim of this project...
详细信息
ISBN:
(纸本)9781424445189
The CoMSON project is a distributed European research project that combines research efforts from both academia and industry. This project is distributed among eight institutions across Europe. The aim of this project is to implement an experimental simulation platform (in software code) for devices in micro and nano-electronics with an integrated eLearning system. This project has two main goals. First, to train graduate students and post-docs in mathematical modeling, through the creation of this simulation platform, and second the delivery of this simulation platform to be used as a training tool for new recruits. In this paper we describe the information system architecture created to provide the partners with a strong collaborative and development research environment. This architecture provides a framework with three main goals: information sharing, collaboration in research and, training. This scheme easily allows users to access, update and interact with information and with other researchers within all the stages of the project.
The product identity is an important topic in modern design. However very little research on the cognition of product identity based on consumers' image and design model has been reported. This article has propose...
详细信息
ISBN:
(纸本)9781424445189
The product identity is an important topic in modern design. However very little research on the cognition of product identity based on consumers' image and design model has been reported. This article has proposed the cognition concept of the product identity image, and analyzed the main method based on the image cognition. According to the features of the product identity, this study has employed some quantitative relation experiments such as semantic differential (SD), eye track observing, and qualitative analysis methods such as oral description, metaphor analysis, extracted the key features which affect the image identification and image cognition, and formed the feature database and the rule database of the image inferences. Taking this as the foundation, the study has established the prototype design model of the product identity from the input to the output, carried out the dual appraisals and the revision to the inference results using the identification model and the consumer model in the later period, and ensured the correct output.
暂无评论