This article examines the basic concepts and offers an analysis of the strengths and weaknesses of common XML watermarking methods. It presents a notational system to describe XML documents and its structures. Then, t...
详细信息
As Wireless Mesh network (WMN) is self-organizing, self-adaptive, low-cost and multi-hop, it has gradually become one of the next generation wireless networks for communication. The routing security is an important as...
详细信息
Gaussian convolution is of fundamental importance in linear scale-space theory and in numerous applications. We introduce iterated extended box filtering as an efficient and highly accurate way to compute Gaussian con...
详细信息
ISBN:
(纸本)9783642247842
Gaussian convolution is of fundamental importance in linear scale-space theory and in numerous applications. We introduce iterated extended box filtering as an efficient and highly accurate way to compute Gaussian convolution. Extended box filtering approximates a continuous box filter of arbitrary non-integer standard deviation. It provides a much better approximation to Gaussian convolution than conventional iterated box filtering. Moreover, it retains the efficiency benefits of iterated box filtering where the runtime is a linear function of the image size and does not depend on the standard deviation of the Gaussian. In a detailed mathematical analysis, we establish the fundamental properties of our approach and deduce its error bounds. An experimental evaluation shows the advantages of our method over classical implementations of Gaussian convolution in the spatial and the Fourier domain.
In this paper, we examine the effectiveness of a hierarchical approach for the optical character recognition of printed mathematical symbols in a document. We make use of a number of features extracted from the charac...
详细信息
ISBN:
(纸本)9781601322258
In this paper, we examine the effectiveness of a hierarchical approach for the optical character recognition of printed mathematical symbols in a document. We make use of a number of features extracted from the character bitmaps, and experiments were performed to determine the effectiveness of these features in identifying the actual character. The characters are first classified using k-means clustering with a subset of these features into smaller groups, and the final recognition is performed using support vector machines (SVM) in each group. The recognition rate of this approach is over 97% and compares favourably with existing methods.
作者:
Karpics, IvarsInstitute of Computer Control
Automation and Computer Engineering Faculty of Computer Science and Information Technology Riga Technical University Riga Latvia
In the article a therapy selection method by using topological modelling and multi- objective optimization is presented. In a medicine practice a doctor by taking into the count patients' health state and laborato...
详细信息
The study on human movements and animal locomotion has revealed various principles based on physics, biomechanics, physiology, and psychology. Many of existing animation techniques rely on those principles, which may ...
详细信息
Task scheduling is one of the main parts of Cloud Computing (CC). We understand this process as mapping users tasks to appropriate resources to execute. Since we use virtual machines (VM) to hide physical resources fo...
详细信息
ISBN:
(纸本)9783642275487
Task scheduling is one of the main parts of Cloud Computing (CC). We understand this process as mapping users tasks to appropriate resources to execute. Since we use virtual machines (VM) to hide physical resources form user the critical problem is how to schedule this machines (sub tasks) in given resources (ie. host machines). Tasks scheduling algorithms for CC systems are discussed in literature [2][4][5]. The most authors use mathematical model without consideration of many problems with desktop virtualization. In this paper we consider a new model for tasks scheduling of VM deployment for business and educational purposes. We also introduce genetic algorithm [1] for task scheduling in CC.
Recent years an extensive literature appears using the Lie groups theory to solve the problems of computer vision. Lie groups theory is the natural representation of a space of transformations. Lie algebra is the tang...
详细信息
The electric welding of soft biological tissues is difficult object for research. The properties of biological tissues are changed by high-frequency currents. Monitoring of these properties allows managing the process...
详细信息
Nowadays one of the main means for computer attack organization are botnets. One of botnets' goals is to break computer defense system and the goal of defense system is to neutralize botnets, staying resistant to ...
详细信息
暂无评论