The quadtree is a hierarchical data model based upon a regular recursive decomposition of space, which has been found useful in such areas as image processing, computer graphics, cartography and spatial information sy...
详细信息
The quadtree is a hierarchical data model based upon a regular recursive decomposition of space, which has been found useful in such areas as image processing, computer graphics, cartography and spatial information systems. The linear quadtree is a pointerless representation of the quadtree. In the paper, a number of linear quadtree algorithms are presented for a transputer array. These form a largely complementary set to those developed by Bhaskaret al.[1] for a similar multiprocessor architecture. Emphasis is placed on algorithms which require the neighbours of quadtree leaves to be accessed. These include perimeter computation, connected component labelling and image dilation. A quadtree generation algorithm is also described. Timing estimates have been carried out using a transputer development system. A price to be paid for the speed increases achieved is an increase in the complexity of the multiprocessor algorithms.
database computers are special-purpose storage and processing devices which are intended to relieve the database management (software) systems running on the general-purpose computers and provide improved storage and ...
详细信息
database computers are special-purpose storage and processing devices which are intended to relieve the database management (software) systems running on the general-purpose computers and provide improved storage and processing capabilities (via hardware) for the existing and new database application. However, to support existing database applications, two steps must be followed. First, the existing database must be transformed into the storage format of the new database computer. This one-time tranformation, known as database transformation, is required to preserve the semantics of the database and to take advantage of the advanced hardware features of the new computer. Second, the database sublanguage used in the existing application programs must be supported in real time by the new database computer so that application programs may be executed in the new environment without the need of program conversion. Such real-time translation of sublanguage calls to the instructions of the new database computer, known as query translation, must be straightforward with minimal software support.
This paper addresses the problem of creating, processing and querying semantically enhanced eContent from archives and digital libraries. We present an analysis of the archival domain, resulting in the creation of an ...
详细信息
ISBN:
(数字)9783642124365
ISBN:
(纸本)9783642124358
This paper addresses the problem of creating, processing and querying semantically enhanced eContent from archives and digital libraries. We present an analysis of the archival domain, resulting in the creation of an archival domain model and of a domain ontology core. Our system adds semantic mark-up to the historical documents content, thus enabling document and knowledge retrieval as response to natural language ontology-guided queries. The system functionality follows two main workflows: (i) semantically enhanced eContent generation and knowledge acquisition and (ii) knowledge processing and retrieval. Within the first workflow, the relevant domain information is extracted from documents written in natural languages, followed by semantic annotation and domain ontology population. In the second workflow, ontologically guided natural language queries trigger reasoning processes that provide relevant search results. The paper also discusses the transformation of the OWL domain ontology into a hierarchical data model, thus providing support for the efficient ontology processing.
data sharing is an important aspect of cloud storage. It is very imperative to ensure security during this sharing process. The basic idea of data security lies on encryption of data as well as delegation of decryptio...
详细信息
ISBN:
(纸本)9781509020287
data sharing is an important aspect of cloud storage. It is very imperative to ensure security during this sharing process. The basic idea of data security lies on encryption of data as well as delegation of decryption key. A data owner has to share the encrypted data as well as the decryption key of the corresponding data with another user, so that the latter can view the original data while maintaining the security of the data. This paper proposes a method of secure data sharing which is space and time efficient. In this method, data is encrypted based on a file identifier(id, which is an integer that ranges from 1 to a maximum number of branches in the hierarchical data model) and access policies. Access policies are represented using access tree structure. The key to be shared with the recipient provides fine-grained access to the files based on attributes of the recipient. This key is computed based on id and attributes of the user.
In this paper, we present a novel localization method of facial feature points with generalization ability based on a data-driven semi-supervised learning approach. Even though a powerful facial feature detector can b...
详细信息
ISBN:
(纸本)9783319209043;9783319209036
In this paper, we present a novel localization method of facial feature points with generalization ability based on a data-driven semi-supervised learning approach. Even though a powerful facial feature detector can be built using a number of human-annotated training data, the collection process is time-consuming and very often impractical due to the high cost and error-prone process of manual annotations. The proposed method takes advantage of a data-driven semi-supervised learning that optimizes a hybrid detector by interacting with a hierarchical data model to suppress and regularize noisy outliers. The competitive performance comparing to other state-of-the-art technology is also shown using benchmark datasets, Bosprous, BioID.
Traditionally, the design and implementation of a conventional database system begins with the selection of a datamodel, followed by the specification of a model- based data language. An alternative to this tradition...
详细信息
Traditionally, the design and implementation of a conventional database system begins with the selection of a datamodel, followed by the specification of a model- based data language. An alternative to this traditional approach to database system development is the multilingual database system (MLDS). This alternative approach affords the user the ability to access and manage a large collection of databases via several datamodels and their corresponding data languages. In this thesis we present the specification and implementation of a hierarchical /DL/ language interface for the MLDS. Specifically, we present the specification and implementation of an interface which translates DL/I data language calls into attribute-based data language (ABDL) requests. We describe the software engineering aspects of our implementation and an overview of the four modules which comprise our DL/I language interface.
Inheritance is a necessary condition for construction of an object-oriented datamodel (OODM), but it is not sufficient. This is because inheritance applies to only one hierarchy. The covering construct meets this def...
详细信息
Inheritance is a necessary condition for construction of an object-oriented datamodel (OODM), but it is not sufficient. This is because inheritance applies to only one hierarchy. The covering construct meets this deficiency because covering maps an object in one hierarchy to a class of objects in another hierarchy. To date, covering has not been implemented into an existing OODM application. This thesis implements the covering construct into a functioning object-oriented database environment. Implementation was achieved through modification of data constructs and the creation of a user-defined relation linking two or more hierarchies. Using the Multi-model Multi-lingual Dababase Supercomputer (MDBS), a sample, working application is described illustrating real world applications. The results of this thesis show that the covering property can be implemented into an existing OODM without sacrificing the integrity of the datamodel. The cross-hierarchical mapping afforded by covering is a powerful construct that expands the capabilities of the model beyond pure inheritance. This makes the OODM suitable for a far wider range of applications. Together, inheritance and crovering meet the necessary and sufficient conditions of the OODM.
暂无评论