Withthe huge amount of data available on social media, it will be challenging to analyze, summarize, and present useful information extracted from social media in an understood, effective, and communicable form, whic...
详细信息
According to the Problems that predicate counting algorithm used for Message-oriented with Publish/Subscribe model on TT&C computer has incomplete preprocessing and complex counting when processing large-scale inf...
详细信息
ISBN:
(纸本)9781479944194
According to the Problems that predicate counting algorithm used for Message-oriented with Publish/Subscribe model on TT&C computer has incomplete preprocessing and complex counting when processing large-scale information exchange. A grouping matching algorithm was put forward, it grouped subscription by binary tree according to message name and deleted subscription group whose message name set was not subset of the event. As for remaining subscription group, it constructed different index structure according to covered relationship between different predicates and filtered corresponding attributes. the result show that time efficiency of grouping matching algorithm is higher than traditional predicate counting algorithm.
Novel smart frame of the computer-aided clothing design algorithm based on camera image positioning is studied in the paper. Before making an interior floor plan, it is necessary to fully consider the basic principles...
详细信息
the paper proposes an effective motion information computation method, called Motion information Image, which can aggregate motion information of multiple frames into one frame to represent the dynamic process of comp...
详细信息
Knowledge Maps as knowledge-management-tools support individual learning processes by processing relevant knowledge and information and by making it available, searchable and usable. thus, Knowledge Maps can serve as ...
详细信息
ISBN:
(纸本)9781424404056
Knowledge Maps as knowledge-management-tools support individual learning processes by processing relevant knowledge and information and by making it available, searchable and usable. thus, Knowledge Maps can serve as a learning platform by the active work with, e.g. expert information addressed in direct bilateral exchanges or project-oriented documents. In this case knowledge is not a static supply of interlocked learning processes, but is continuously generated and associated withthe actors. the paper is based upon the project WeKnow funded by the EU Socrates Programme in the field or information and Communication technology and Open and Distance Learning in education. the project seeks to develop a web-based Knowledge Map as an educational competence-based learning environment.
Tensor decomposition is an essential tool for analyzing data in many fields, such as sociology, financial encryption and signal processing. According to the "Curse of Dimensionality,"the time and the space c...
详细信息
CAA software is developed to extend the scope of applications of CATIA, whereas the CAA provides no API to implement the encryption of CAA software, which is to the disadvantage of protecting the security of CAA softw...
详细信息
the common problems of less user information and missing item ratings in recommended systems greatly affect the accuracy of recommending users. Aiming at this problem, a collaborative filtering algorithm based on comp...
详细信息
this paper presents an approach to optical blur estimation in images based on the measuring of the spread of edges. Two measures based on this approach are proposed. the first measure defines a model of amplified gaus...
详细信息
ISBN:
(纸本)9780769529837
this paper presents an approach to optical blur estimation in images based on the measuring of the spread of edges. Two measures based on this approach are proposed. the first measure defines a model of amplified gaussian with background for the profile of edges. the second measure is an approximation that does not require the extraction of profiles at edges. Both measures do not depend on the content or illumination of the image, making them suitable for dynamic videos. the behaviour of the proposed measures is finally presented in the context of dynamic videos from a surveillance camera embedded in a transportation vehicle.
Model checking verification is a formal and fully automatic method widely used for checking critical and complex systems. It is based on reachability analysis, which often encounters the state space explosion problem....
详细信息
暂无评论