Since 2005 the term web 2.0 has gradually become a hot topic on the Internet. Users' participation is the core of web 2.0. Open, Shared, Communication and Growing-up together, as its primary characteristics, has b...
详细信息
ISBN:
(纸本)9780769532738
Since 2005 the term web 2.0 has gradually become a hot topic on the Internet. Users' participation is the core of web 2.0. Open, Shared, Communication and Growing-up together, as its primary characteristics, has been an inspiration to everyone. Contemporarily, the enthusiasm for Mandarin learning has been worming up for a long time. Aiming at continuously developing language, modern factors should constantly merge into the indigenous language. the fact means that it is considerably insufficient to only rely on webmasters or web coders to refreshing the learning materials. web 2.0 can compensate for this pressing problem perfectly. All of learners, viewers, professors, who log in our website, without any restrictions on time and places, can express their perspective about how to advance Mandarin learning freely on the web pages. We justifiably believe Mandarin learning by integrating web 2.0 and real-time pronunciation evaluation can become more and more effective and abstractive.
Typically web pages always contain a large amount of banner ads, navigation bars, and copyright notices etc. Such irrelevant information is not part Of the main contents of the pages, they will seriously harm web mini...
详细信息
ISBN:
(纸本)9780769532738
Typically web pages always contain a large amount of banner ads, navigation bars, and copyright notices etc. Such irrelevant information is not part Of the main contents of the pages, they will seriously harm web mining and searching. In this paper, we develop and evaluate a method that utilizes boththe visual features and the semantic information to extract informative blocks. We first partition a web page into semantic blocks using vision-based page segmentation. the visual and the semantic information got by LSI (Latent Semantic Indexing) are extracted to form the feature-vector of the block. Second we manually annotate informative or uninformative labels to the blocks. the labeled blocks are used as training dataset to train a classification model. then the informative blocks can be extracted through the model. Our experiments show that the proposed EIBA (Extract Informative Block Arithmetic) is able to dramatically improve the results in near-duplicate detection and classification tasks.
Most of fire detection system used the heuristic fixed threshold values in their specific methods. However, input images may be changed, in general, so the heuristic fixed threshold values used in the fire detection s...
详细信息
ISBN:
(纸本)9780769532738
Most of fire detection system used the heuristic fixed threshold values in their specific methods. However, input images may be changed, in general, so the heuristic fixed threshold values used in the fire detection systems might be modified on a case by case basis. In this paper, an automatic fire detection system without the heuristic fixed threshold values was studied. We presented an automatic method using the statistical color model and the binary background mask. We did the experiment using 600 frames from 6 typical different fire video clips. As the experimental results the proposed method showed a good performance of about overage 85% detection rate without false positive, compared withthe other methods withthe heuristic fixed threshold values.
Embedded Mini web Server is difficult access of many users like general web server. However, if many users should access to Embedded system, this system need access certification and service management about users. In...
详细信息
ISBN:
(纸本)9780769532738
Embedded Mini web Server is difficult access of many users like general web server. However, if many users should access to Embedded system, this system need access certification and service management about users. In this paper, we attempt RFID access that is characteristic access method that is not method that is log of general web server. Also, many users must consider segment that manages occasion and majority Embedded systems accessing to Embedded system. One administrator must be able to control easily Embedded equipments to manage many several Embedded systems efficiently. And discrete embedded environment is important efficient remote management. When it is environment that many users use embedded system need user each differentiation vicinity and control. We study plan for security access and efficient control about Embedded system resource.
the QoS routing is based on the computing of each flow as regards the dynamic request, the routing computing is more frequent and the granularity of resource distribution is more smaller. Aiming at fast routing comput...
详细信息
ISBN:
(纸本)9780769532738
the QoS routing is based on the computing of each flow as regards the dynamic request, the routing computing is more frequent and the granularity of resource distribution is more smaller. Aiming at fast routing computing, the method of pre-computing for parallel computing based on QoS matrices is proposed: the Pareto subset of viable path which satisfy routing constrain will be taken into account, the suitable route will be selected among the Pareto subset. In other words, the routing problem can be divided into two problem: suitable path selection unconcerned with practical routing request and route optimize concerned with practical routing request.
this paper proposes a new approach for generating smart 3D speech animation. the basic idea is to synthesize the animated faces using prosodic information edited by user with a kind of markup language. the proposed te...
详细信息
ISBN:
(纸本)9780769532738
this paper proposes a new approach for generating smart 3D speech animation. the basic idea is to synthesize the animated faces using prosodic information edited by user with a kind of markup language. the proposed technique takes advantage of both performance-driven and parameter-driven approaches. So it greatly reduces the workload of manual modeling used in the traditional key frame animation and the animation generating process can be easily control. To relate the prosody text withthe 3D animation, our technique builds up a parametric model based on the exponential formula. It takes the pre-obtained 3D dynamic visemes and prosodic tag recorded in CPML (Chinese Prosody Markup language) as input data, and outputs a segment of vivid speech animation. Experimental results show that (1) the proposed technique synthesizes animation of different effects depending on the availability withthe prosodic information, and (2) the new technique produces realistic results using less data than the conventional methods.
Ubiquitous digital libraries are being developed with various web-based services. For the most part, these libraries support only searching, lending, and reservation services for users. However, the focus of a library...
详细信息
ISBN:
(纸本)9780769532738
Ubiquitous digital libraries are being developed with various web-based services. For the most part, these libraries support only searching, lending, and reservation services for users. However, the focus of a library's service should change from general content management to personalized service. For example, a library system should be able to predict what content a user is looking for, recommending it before the user begins his search. Such a library system has to be aware of a users context, such as the users id, access level, name, address, and interests. In this paper, we propose LIML (Library lnterface Markup language) to express user context awareness and provide personalized user interfaces in ubiquitous digital library environments. We show the validity of the proposed scheme with implementation results.
In common, machine learning methods, there is a basic assumption that training data and test data are sampled from the same distribution. However, this assumption is commonly violated in practical fields. the situatio...
详细信息
ISBN:
(纸本)9780769532738
In common, machine learning methods, there is a basic assumption that training data and test data are sampled from the same distribution. However, this assumption is commonly violated in practical fields. the situation. where the training and test data are generated from different distributions is so-called covariate shift. In natural languageprocessing, it is highly possible to occur covariate shift due to the size of sample space. Natural language data have theoretically infinite size, which causes that the distribution of training data can not reflect that of entire data. In this paper, we try to verify that the performance of methods on natural languageprocessing can be improved by reducing error from covariate shift. For this purpose, we propose the importance weighted k-NN for base noun detection. In the proposed method, the weights are set as a difference between the training and test distribution. theoretically, the performance under covariate shift can be improved using importance weight method. In the experiment, the proposed method shows better performance than normal k-NN.
Example-based machine translation (EBMT) is an important branch of machine translation. Sentence similarity measure is certainly one of the most significant problems addressed in EBMT. For EBMT from Chinese to English...
详细信息
ISBN:
(纸本)9780769532738
Example-based machine translation (EBMT) is an important branch of machine translation. Sentence similarity measure is certainly one of the most significant problems addressed in EBMT. For EBMT from Chinese to English, the performance of similarity measure of Chinese sentences greatly affects the final translation result of an input Chinese sentence. In this paper, we present an approach to Chinese Sentence Similarity Measure (CSSM) together with word sequence and sentence structure information. the new method in our experiments yields a good efficiency and effectiveness without conducting a complex and deep syntactic analysis of Chinese sentences, which can he applied to an EBMT system for CSSM for a better performance in Chinese-to-English translation.
According to the Potential Ambiguity theory, this article analyzes syntactic and semantic features of the forward and backward parts of verb 'you'. then based on the complex features and unification withthe i...
详细信息
暂无评论