Hyperspectral image visualization is an important research field in hyperspectral image processing. This paper summarized the general goals for hyperspectral image visiualization, and put various visiualization method...
详细信息
Hyperspectral image visualization is an important research field in hyperspectral image processing. This paper summarized the general goals for hyperspectral image visiualization, and put various visiualization methods intofour categories, which include method based on band selection,method based on weighting, method based on transformation and method based on optimization. We alsoanalyzed the merits and defects of these methods.
This paper discusses the novel area of Brain informatics (BI). BI is an interdisciplinary field that studies Information processing and Neuroscience. First section of the paper discusses this area and identifies major...
详细信息
This paper discusses the novel area of Brain informatics (BI). BI is an interdisciplinary field that studies Information processing and Neuroscience. First section of the paper discusses this area and identifies major research issues associated with BI. Second section provides a comprehensive literature survey of neuroimaging techniques and their pros and cons. It then relates the most promising technique with its applications in BI. The third section discusses the process of classification. The design of classifiers in the context of BI and use of classification in BI is then discussed. The fifth section discusses the applications of analysis of neuroimaging data. The final section concludes the paper and provides directions for future work.
This paper addresses the complicated issue of social roles in a formal theory of cognition as well as in the methodology and implementation of natural language meaning representation in various computational applicati...
详细信息
This paper addresses the complicated issue of social roles in a formal theory of cognition as well as in the methodology and implementation of natural language meaning representation in various computational applications. We start with analyzing a specific set of operational and substantive difficulties encountered in processing social roles in computational semantics. While exemplified within a specific approach, Ontological Semantic Technology, these difficulties pertain to any approach that will aim at representing social roles adequately and reasoning with them computationally to emulate human cognition. After relating these difficulties to the long, highly respectable, and torturous pedigree of the issue of social roles in philosophy, philosophy of science, and cognitive science, the paper culminates in an apparently novel idea to establish them, very differently from other ontological concepts, as ontological operators, a sort of triggering mechanisms or meaning procedures, with interesting theoretical and operational consequences and links to such important elements of semantic interpretation as emphasis and focus.
This paper proposes a packet loss recovery mechanism on light weight stacks with little resource consumption. And a new Persistent Timer based on multimedia streaming is alsodescribed. These twomechanisms improve mult...
详细信息
This paper proposes a packet loss recovery mechanism on light weight stacks with little resource consumption. And a new Persistent Timer based on multimedia streaming is alsodescribed. These twomechanisms improve multimedia streaming effect and congestion control ability of the embedded system. Besides that, an efficiency and stability testis proposed for behavior and resource cost testing of the improved TCP/IP stack under various transmission problems.
In this paper, the rank range of the solutions of a class of matrix equation are considered. By applying the singular value decomposition of matrix and the properties of Frobenius matrix norm, the extremal rank and th...
详细信息
In this paper, the rank range of the solutions of a class of matrix equation are considered. By applying the singular value decomposition of matrix and the properties of Frobenius matrix norm, the extremal rank and the solution expression are alsogiven when the solvability conditions are satisfied. Then, the explicit expression for the nearest matrix toa given matrix, that belongs tothe corresponding minimal rank solution set of the equation, in the Frobenius norm has been provided.
This paper presents a model-based approach to generate configurable software architectures of so called Cloud-based Cyber-Physical Systems (CCPS). Cloud computing makes dynamically scalable computing power and data st...
详细信息
This paper presents a model-based approach to generate configurable software architectures of so called Cloud-based Cyber-Physical Systems (CCPS). Cloud computing makes dynamically scalable computing power and data storage available. These advantages are included in the design of Cloud-based Cyber-Physical Systems. The designed platform architecture is evaluated by two scenarios of automation engineering. The different scenarios of camera-based process monitoring are analyzed and subject of a timing analysis, an energy consumption estimation as well as a cost analysis. Significant improvements concerning processing time are shown and the energy optimal solution is identified. Moreover the most cost-effective solution is highlighted.
The basic model of a network community as a dynamic system is suggested. Evolutionary platform concept and its development by the "black box" principle are described. Evolutionary progress and also different...
详细信息
The basic model of a network community as a dynamic system is suggested. Evolutionary platform concept and its development by the "black box" principle are described. Evolutionary progress and also different types of the network community motion order in a state space are considered. Such system categories as a "space between the texture layers" and "evolution rate" are determined. Different metrics related to the network community graph features are analyzed. Experiments are conducted on the basis of the data, imported from the Twitter Network using NodeXL software.
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography. Until recen...
详细信息
ISBN:
(纸本)9783939897736
An obfuscator is an algorithm that translates circuits into functionally-equivalent similarly-sized circuits that are hard to understand. Efficient obfuscators would have many applications in cryptography. Until recently, theoretical progress has mainly been limited to no-go results. Recent works have proposed the first efficient obfuscation algorithms for classical logic circuits, based on a notion of indistinguishability against polynomial-time adversaries. In this work, we propose a new notion of obfuscation, which we call partial-indistinguishability. This notion is based on computationally universal groups with efficiently computable normal forms, and appears to be incomparable with existing definitions. We describe universal gate sets for both classical and quantum computation, in which our definition of obfuscation can be met by polynomial-time algorithms. We also discuss some potential applications to testing quantum computers. We stress that the cryptographic security of these obfuscators, especially when composed with translation from other gate sets, remains an open question.
The proceedings contain 30 papers. The special focus in this conference is on Mobile computing, Applications, and Services. The topics include: Lowering the barrier for crowdsensing application development;towards use...
ISBN:
(纸本)9783319054513
The proceedings contain 30 papers. The special focus in this conference is on Mobile computing, Applications, and Services. The topics include: Lowering the barrier for crowdsensing application development;towards user interface components for dashboard applications on smartphones;user-centric quality of experience measurement;online reviews as first class artifacts in mobile app development;a swipe gesture-based system for exploring urban environments for the visually impaired;smartphone interactions change for different intimacy contexts;geometric layout analysis in a wearable reading device for the blind and visually impaired;a wearable computer interaction device;intelligent energy-efficient triggering of geolocation fix acquisitions based on transitions between activity recognition states;fine-grained activity recognition of pedestrians travelling by subway;reconciling cloud and mobile computing using activity-based predictive caching;towards smartphone-based assessment of burnout;an improvement of NFC-SEC with signed exchanges for an e-prescription-based application;passive user authentication through micro-behavior modeling of soft keyboard interaction;a study of graphical password for mobile devices;a cloudlet-based proximal discovery service for machine-to-machine applications;designing human computation games to update street views;relaxation training through respiratory biofeedback in a mobile casual game;using low-power sensors to enhance interaction on wristwatches and bracelets;towards unsupervised remote therapy for individuals with aphasia;create your own mobile application for data collection in the cloud;a privacy-preserving contactless transport service for NFC smartphones and an approach for using mobile devices in industrial safety-critical embedded systems.
暂无评论