Despite the success of constraint programming (CP ) for scheduling, the much wider penetration of mixed integer programming (MIP ) technology into business applications means that many practical scheduling problems ar...
详细信息
advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur...
详细信息
Using physically based computational models coupled with remote sensing technologies,photogrammetry techniques,and GIS applications are important tools for flood hazard mapping and flood disaster ***,information proce...
详细信息
Using physically based computational models coupled with remote sensing technologies,photogrammetry techniques,and GIS applications are important tools for flood hazard mapping and flood disaster ***,information processing of massive input data with refined accuracy allows us to develop and to improve urban-floodmodeling at a detailed *** topographical information from digital surface model(DSM) or digital terrain model(DTM) is essential for flood managers who actually require this high accuracy and resolution of input data to set up their practical *** detecting and ranging(LiDAR) techniques are mainly used,but these costly techniques can be appraised by equipments,maintenance,and operations which include *** advances in photogrammetry and computer vision technologies like structure form motion(SfM) technique are widely used and offer cost-effective approaches to reconstruct 3D-topographical information from simple 2D photos,so-called 3D *** terms of input data for flood modeling,the SfM technique can be comparable to other *** this paper,there are one experimental and two case ***,a result of the experiment showed a similarity between flood maps by applying the SfM process form the 3D-reconstruction and using benchmark *** 3D-reconstruction processes started from 2D photos,which were taken from virtual scenes by using multidimensional-view *** photos can be used to generate 3D information which is later used to create the DSM from multidimensional fusion of views(MFV-DSM).then,the DSM was used as input data to set up 2D flood ***,when using the DSMs as topographical input data,comparison between a benchmark DSM and MFV-DSM shows similarity flood-map results in both flood depths and flood ***,the two cases from real world scenes also showed possibilities of using the SfM technique as an alternative acquisition tool,prov
In recent years, mobile phones have become very popular due to technologyadvances. However, unprotected personal photos and videos can easily be leaked when the phone falls into the hands of a malicious user. In this...
详细信息
the paper proposes a method to improve authoring by displaying a simplified view of an Adaptive Educational Hypermedia (AEH) system via a user role functionality matrix. Adaptive presentations are starting to appear i...
详细信息
ISBN:
(纸本)9780889868885
the paper proposes a method to improve authoring by displaying a simplified view of an Adaptive Educational Hypermedia (AEH) system via a user role functionality matrix. Adaptive presentations are starting to appear in many applications, in education, but also beyond. For instance, the mobile phone world is increasingly applying adaptation to location, user, etc. However, a known bottle-neck in adaptation is the authoring process. In this paper, we propose a solution to this problem, by building on top of the visualisation paradigm. More precisely, we propose a method to improve authoring by displaying a simplified view of the authoring process via a user-role functionality matrix (FM). We aim to implement this feature in PEAL (a strategy authoring tool) to evaluate the FM's usefulness in applying adaptations for diverse authors.
A plug computer is essentially a cross between an embedded computer and a traditional computer, and with many of the same capabilities. However, the architecture of a plug computer makes it difficult to apply commonly...
详细信息
theories of embodied cognition and active vision suggest that perception is constructed through interaction and becomes meaningful because it is grounded in the agent's activity. We developed a model to illustrate...
详细信息
ISBN:
(数字)9783642239601
ISBN:
(纸本)9783642239601;9783642239595
theories of embodied cognition and active vision suggest that perception is constructed through interaction and becomes meaningful because it is grounded in the agent's activity. We developed a model to illustrate and implement these views, Following its intrinsic motivation, the agent autonomously learns to coordinate its motor actions withthe information received from its sensory system. Besides illustrating theories of active vision, this model suggests new ways to implement vision and intrinsic motivation in artificial systems. Specifically, we coupled an intrinsically motivated schema mechanism with a visual system. To connect vision with sequences, we made the visual system react to movements in the visual field rather than merely transmitting static patterns.
Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support in...
详细信息
Authorship attribution is an important and emerging security tool. However, just as criminals may wear gloves to hide their fingerprints, so too may criminal authors mask their writing styles to escape detection. Most...
详细信息
Mobile devices are rapidly becoming the default communication device of choice. the rapid advances being experienced in this area has resulted in mobile devices undertaking many of the tasks once restricted to desktop...
详细信息
ISBN:
(数字)9783642216053
ISBN:
(纸本)9783642216053
Mobile devices are rapidly becoming the default communication device of choice. the rapid advances being experienced in this area has resulted in mobile devices undertaking many of the tasks once restricted to desktop computers. One key area is that of voice recognition and synthesis. advances in this area have produced new voice-based applications such as visual voice mail and voice activated search. the rise in popularity of these types of applications has resulted in the incorporation of a variety of major languages, ensuring a more global use of the technology.
暂无评论