<正>With the increasing popularity of 3D applications such as computer games,a lot of 3D geometry models are being *** encourage sharing and reuse,techniques that support matching and retrieval of these models are e...
详细信息
<正>With the increasing popularity of 3D applications such as computer games,a lot of 3D geometry models are being *** encourage sharing and reuse,techniques that support matching and retrieval of these models are emerging. The purpose of annotation for 3D model is that it can automatically list the best suitable labels to describe the 3D models;it is an important part of the text-based 3D model *** this paper,we present a novel method for 3D models multiple semantic ***,we propose a graph-based method to expand the labeled data set,and the semantic words confidence of the models in the extension set are *** algorithm chooses those tags that are reasonably high in confidence based on the mutual distance of tagged models sharing *** our approach is introduced to complete multiple semantic annotation task based on the learned label *** demonstrate the performance of the new method through a large number of *** test result on the PSB data set have shown that the method making use of the unlabeled samples has achieved a better annotation result and need fewer number of hand labeled models.
Pollution sources census will provide data for the macro-control of environmental protection and management and promote economy structure adjustment and planning. Data visualization and processing for pollution source...
详细信息
Pollution sources census will provide data for the macro-control of environmental protection and management and promote economy structure adjustment and planning. Data visualization and processing for pollution sources census is practically meaningful for improving the pollution sources census digitalization and intelligence management level. Based on GIS and spatial database, an information management system for pollution sources census has been developed. It has some functions such as data visualization, data query, data statistics and spatial analysis. Combined with the characteristics of environmental management, the system can provide efficient technical support and scientific basis for environment protection, total quantity control of pollution sources emissions, pollution sources management and economic structure optimization, et al. The experiment results show that it has a certain value and significance for census data exploration and application.
In this work, a simulation model of the thermal state of the work rolls at the hot rolling mill 2000 (m) of Public Joint-Stock Corporation Magnitogorsk iron and steel works (PJSC MMK) is built. A neural network was us...
详细信息
In this paper,we present an application of the hierarchical hidden Markov model(HHMM) for the problem of predicting the state of human behavior in a smart home *** argue that to robustly model and recognize sequential...
详细信息
In this paper,we present an application of the hierarchical hidden Markov model(HHMM) for the problem of predicting the state of human behavior in a smart home *** argue that to robustly model and recognize sequential human activities,it is crucial to exploit both the natural hierarchical decomposition and shared semantics embedded in a ubiquitous *** this end,we propose the use of the HHMM,a rich stochastic model that has recently been extended to handle shared structures,for representing and recognizing a set of complex indoor *** main contributions of this paper lie in the application of the shared structure HHMM,the estimation of the state of a user's behavior,and the detection of abnormal *** user behavior data from an experiment show that directly modeling shared structures improves the recognition efficiency and prediction accuracy for the state of a human's behavior when compared with a flat HMM.
The idea and its importance of strengthening of the multi-disciplinary corporation to promote facility horticulture engineering is put forward by analyzing the present development of China’s facility horticulture, an...
详细信息
The idea and its importance of strengthening of the multi-disciplinary corporation to promote facility horticulture engineering is put forward by analyzing the present development of China’s facility horticulture, and how to strengthen the technology innovation of the corporation is discussed in detail from four perspectives. (1) The facility environment and crops need to be controlled simultaneously according the features of horticultural facilities and the ecological adaptability of crops. (2) The innovation design of greenhouse structures should be implemented in terms of different regional climatic conditions and the need of crop growth or development. (3) Comprehensive optimal environment control still needs further study by integrating crop models with environment models. (4) Finally greenhouse management expert system would be practical with the combination of horticulture, facility equipment and computer technologies.
With the wide use of multimedia applications, people improve the demand of high speed traffics increasingly. However, when the network is congested, single path route can not satisfy the end-to-end bandwidth requireme...
详细信息
With the wide use of multimedia applications, people improve the demand of high speed traffics increasingly. However, when the network is congested, single path route can not satisfy the end-to-end bandwidth requirement, thus limited bandwidth resources can not be used efficiently. In this paper, we therefore propose a bandwidth-guaranteed multi-path routing, which can find multiple node-disjoint paths between source and destination and perform the calculation of available bandwidth of found paths by introducing a method of calculating path available bandwidth. Meanwhile, we design a novel metric for path selection so that we select two parallel paths whose aggregated bandwidth can satisfy the connection bandwidth requirement from multiple paths found by the route discovery. Then we distribute data packets into the two parallel paths for concurrent transmission according to each path’s available bandwidth. Simulation results show our proposed Bandwidth-guaranteed Multi-path Routing (BMR) makes significant improvements in terms of the request success ratio compared with the related works.
In software testing, robustness refers to the ability to ensure that the software system executes correctly under normal or abnormal conditions. Robustness testing needs a large number of illegal and effective inputs ...
详细信息
In software testing, robustness refers to the ability to ensure that the software system executes correctly under normal or abnormal conditions. Robustness testing needs a large number of illegal and effective inputs which is one of the keys to the researches. The data variance is based on mutation testing which is a type of white box testing through destructing the system under a test for robustness testing. The variance data is a type of data which can determine the robustness by applying some interference to the test input, in order to create abnormal data which is then used by the system under test. As TTCN-3(Testing and Test Control Notation)is used for black box testing, it can get the data rule description from the system under test. The data variance is also used for TTCN-3 testing. Therefore, the automatic generation of robust illegal inputs is realized on the basis of the data variance in this paper.
Modeling and verification of behavioral variability in service-oriented product family descriptions is very *** existing methods can only model the basic service behaviors,and time constraints are not taken into consi...
详细信息
Modeling and verification of behavioral variability in service-oriented product family descriptions is very *** existing methods can only model the basic service behaviors,and time constraints are not taken into consideration,which is an important parameter in service *** this paper,we described an approach for modeling and verification of behaviors for a timed service ***,we propose featured Timed Automata,a formalism designed to describe the combined behavior of a timed service family,which leverages on establishing relationships between features and ***,we use product Computation Tree Logic to model properties of service families,which extend Computation Tree Logic to take into account the product ***,we have verified a travel agency service family by the model checker UPPAAL,which shows that our approach helps to verify timed service families effectively in the early phases of development.
Ocean-land segmentation is a basis for oceanic targets detection for SAR imagery. The traditional manual segmentation method can acquire a fairly good result, while it is unable to achieve a satisfying efficiency. Thu...
详细信息
Ocean-land segmentation is a basis for oceanic targets detection for SAR imagery. The traditional manual segmentation method can acquire a fairly good result, while it is unable to achieve a satisfying efficiency. Thus the manual method is unsuitable for batch processing. Ocean map based land masking method requires a priori information, which restricts its application. This paper presents an automatic active contour model based ocean- land segmentation method for SAR imagery. This method forces the active contour to the real coastline by variation level set. Under the restriction of minimizing a given energy function, the method obtains the final segmentation result when the active contour is overlapped on the coastline. In addition, an optimizing method is proposed to improve its computation efficiency, which makes our segmentation method more applicable.
With the development of WLAN (wireless local area network),the security problems become more apparent than before.802.11i protocol enhances the security performance such as encryption and authentication,however,the ...
详细信息
With the development of WLAN (wireless local area network),the security problems become more apparent than before.802.11i protocol enhances the security performance such as encryption and authentication,however,the four-way handshake procedure aiming to produce the PTK (pairwise transient key) is subjected to the DoS attack and the DoS flooding attack,which may result in memory *** mechanism is reviewed for its robustness against the DoS attack and the DoS flooding *** analyzing the Cookie mechanism,some weaknesses such as the exposure of the PTK are ***,an improved mechanism is proposed,without exposing the PTK in the wireless space directly,this new mechanism performs great to avoid the DOS attack and to decrease the transmission load.
暂无评论