Social brainstorming has become a popular group creativity technique to create a large number of ideas for solving problems. The social computing, for its advance in information processing and network communication, c...
详细信息
Social brainstorming has become a popular group creativity technique to create a large number of ideas for solving problems. The social computing, for its advance in information processing and network communication, collaborates the social intelligence and enhances the social creativity in brainstorming. However, facing the dilemma of quantity deficiency in idea pondering or quality submergence in idea deluge, cooperative participants essentially require needed information for their innovative work rather than unnecessary disturbance. Therefore, in purpose of enhancing the social creativity, we propose the needed information recycling based on multi-features in meta-data and also the similarity in social graph, helping participants keep a global and local image of previous work and focus on innovation tasks. Given an experimental demo, we discuss the essential merits of the novel brainstorming through the comprehensive but collaborative inter-merge of the social network and computer network, and conclude that the needed information recycling breeds the efficient and effective social creativity.
Mining log pattern to analyze the faults in large scale distributed system is affected by the existence of redundant and ambiguous noisy error logs. While existing works try to compress logs in a coarse granularity fr...
详细信息
Mining log pattern to analyze the faults in large scale distributed system is affected by the existence of redundant and ambiguous noisy error logs. While existing works try to compress logs in a coarse granularity from temporal and spatial view to remove the redundancy, they fail to reserve those ambiguous logs that might truly relate to a fault, which misleads the fault characterizing result. By modeling error logs as time series and examining the similarity between trash error log template and target error log, the ambiguous error logs are kept and the affected patterns can be effectively removed. Experiments in a practical complex service-based storage show that up to 92% of the affected patterns can be filtered.
With digital multimedia distribution, intellectual property rights (IPR) are at a more risk than ever, due to the possibility of unlimited copying without fidelity loss. Encryption and copy protection mechanisms do no...
详细信息
With digital multimedia distribution, intellectual property rights (IPR) are at a more risk than ever, due to the possibility of unlimited copying without fidelity loss. Encryption and copy protection mechanisms do not fully efficiently deal with the issue. Encryption usually protects the data only on the transport channel, and as soon as the data are decrypted for exhibit or playback, they can be copied. Copy protection mechanisms are difficult to realize in open systems as data are open to all. Thus, both encryption and copy protection offer only limited security. Watermarking has been proposed as a last line of defense in the protection of IPR. Watermarking methods embed information irremovably and invisibly into the host data. The watermark typically contains information about source and recipient of the distributed data. Thus, if pirated copies of the data are distributed, it can still be determined who owns the copyright and who the original, authorized recipient was. Thus, it allows tracing back illegally produced copies of the data. In the time of watermarking it is possible to assign some unique codeword to every copy to be distributed, by which it is possible to detect any alteration made to the watermarked copy. This paper presents spread spectrum watermarking of a specially designed colluder traceable codeword with help of combinatorial design in digital image.
An increased amount of large scale, collaborative biomedical research has recently been conducted on e-Science infrastructures. Such research typically involves conducting comparative analysis on large amounts of data...
详细信息
An increased amount of large scale, collaborative biomedical research has recently been conducted on e-Science infrastructures. Such research typically involves conducting comparative analysis on large amounts of data to search for biomarkers for diseases. Running these analysis manually can often be quite cumbersome, labour-intensive and error-prone. Significant work has been invested into automating such analysis with appropriately configured workflows. It is also important for biomedical researchers to validate analysis outcomes, to ensure the reproducibility of the results and to ascertain the ownership of specific scientific results. The detailed, traceable information required for this is often referred to as provenance data. Developing suitable methods and approaches to managing provenance data in large-scale distributed e-Science environments is another important area of research currently being investigated. We present an approach that has been adopted in the neu GRID project, which aims to develop an infrastructure to facilitate research into neurodegenerative disease studies such as Alzheimer's. To facilitate the automation of complex, large-scale analysis in neu GRID, we have adapted CRISTAL, a workflow and provenance tracking solution. The use of CRISTAL has provided a rich environment for neuroscientists to track and manage the evolution of both data and workflows in the neu GRID infrastructure.
The main theme of this paper is to develop a navigation vehicle system without GPS. With stereo vision, the geographic information ahead of the vehicle is obtained by the principle of plane induced parallax. The profi...
详细信息
The main theme of this paper is to develop a navigation vehicle system without GPS. With stereo vision, the geographic information ahead of the vehicle is obtained by the principle of plane induced parallax. The profiles of left and right vision are acquired by Canny Edge Detection algorithm. Then, an intersection line of the obstacle and the level ground is found by the way of imageprocessing. Finally, the position and distance of the obstacle is calculated by the homography matrix method. Integrating the above-distributed schemes unmanned vehicle can avoid collisions with obstacles and arrive at the target in difference scenario. Experimental results show that the proposed navigation and control methodology are practicable.
We propose a Scene Text Recognition (STR) system for recognizing text contained in natural images. The system is comprehensive of all three steps of STR - text localization, text extraction and text recognition - maki...
详细信息
We propose a Scene Text Recognition (STR) system for recognizing text contained in natural images. The system is comprehensive of all three steps of STR - text localization, text extraction and text recognition - making it easily applicable to mobile devices. The methods for each step are adopted and tuned from previous works to be more suitable for STR. Since STR is computationally intensive, in order to give faster results to the user, we seek to utilize the computing power of multicore processors. A multigrain parallelism method is proposed which varies the level of parallelism according to task properties and available resources during runtime. The proposed approach was tested on a set of natural scene images and an average speedup factor of 1.72 was achieved when run on a dual core processor. Our multigrain parallelism method can easily be applied to other complex imageprocessing algorithms that work on various units of data.
This paper addresses the problem of estimating the statistical distribution of multiple-tissue non-stationary ultrasound images of skin. The distribution of multiple-tissue images is modeled as a finite mixture of Hea...
详细信息
This paper addresses the problem of estimating the statistical distribution of multiple-tissue non-stationary ultrasound images of skin. The distribution of multiple-tissue images is modeled as a finite mixture of Heavy-Tailed Rayleigh distributions. An original Bayesian algorithm combined with a Markov chain Monte Carlo method is then derived to jointly estimate the mixture parameters and a label vector associating each voxel to a tissue. Precisely, a hybrid Metropolis-within-Gibbs sampler is proposed to draw samples that are asymptotically distributed according to the posterior distribution of the Bayesian model. These samples are then used to compute the Bayesian estimators of the model parameters. Simulation results are conducted on synthetic data to illustrate the performance of the proposed estimation strategy. The method is then successfully applied to the detection of an in-vivo skin lesion in a high frequency 3D ultrasound image.
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executin...
详细信息
The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executing overhead and long recovering duration. Active fault tolerance is expected to become another important fault-tolerant approach for Exascale system. Focusing on system failure prediction, which is one key step of active fault tolerance, we construct online failure prediction model and research on the effective method of system status pretreatment. In order to improve the accuracy and real-time feature of current methods, the proposed Improved Adaptive Semantic Filter (IASF) method processes the latest system logs regularly, filtering useless information out of them according to their semantics. Adopting the main idea of Vector Space Model (VSM), IASF method creates Event Vector corresponding to each log record. By calculating the cosine of vectorial angle, it evaluates the semantics correlation between different log records, and then executes temporal and spatial redundant filter considering the burst feature of log records. IASF method is insensitive to the type of system log and does not introduce any expert system or domain knowledge. The experiment result shows that system can eliminate about 99.6% of useless log records after executing IASF method.
This paper design and implement a parallel fast trilateral filter algorithm on GPU. The trilateral filter can be decomposed into two bilateral filters which are implemented by the parallelized bilateral filter on CUDA...
详细信息
This paper design and implement a parallel fast trilateral filter algorithm on GPU. The trilateral filter can be decomposed into two bilateral filters which are implemented by the parallelized bilateral filter on CUDA separately. The performance optimization strategies are intensively discussed. The occupancy of CUDA kernel for trilateral filter reaches 0.833 which is measured by Visual Profiler. The results indicate that more than two orders of magnitude speedup have been achieved in the GPU as compared to the CPU counterpart for trilateral filter (512×512 ***), which demonstrates the significance of parallelism.
image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous systems, and for efficient visualization of...
详细信息
image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous systems, and for efficient visualization of interior spaces. Since computational stereo is a highly ill-posed problem for the typically weakly textured, specular, and even sometimes transparent indoor environments, one has to incorporate very strong prior assumptions on the observed geometry. A natural assumption for building interiors is that open space is bounded (i) by parallel ground and ceiling planes, and (ii) by vertical (not necessarily orthogonal) wall elements. We employ this assumption as a strong prior in dense depth estimation from stereo images. The additional assumption of smooth vertical elements allows our approach to fill in plausible extensions of e.g. walls in case of (non-vertical) occlusions. It is also possible to explicitly detect non-vertical regions in the images, and to revert to more general stereo methods only in those areas. We demonstrate our method on several challenging stereo images of office environments.
暂无评论