Sparse bundle adjustment is widely used in many computer vision applications. In this paper, we propose a method for performing bundle adjustments using the L 1 norm. After linearizing the mapping function in bundle ...
详细信息
Sparse bundle adjustment is widely used in many computer vision applications. In this paper, we propose a method for performing bundle adjustments using the L 1 norm. After linearizing the mapping function in bundle adjustment on its first order, the kernel step is to compute the L 1 norm equations. Considering the sparsity of the Jacobian matrix in linearizing, we find two practical methods to solve the L 1 norm equations. The first one is an interior-point method, which transfer the original problem to a problem of solving a sequence of L 2 norm equations, and the second one is a decomposition method which uses the differentiability of linear programs and represents the optimal updating of parameters of 3D points by the updating variables of camera parameters. The experiments show that the method performs better for both synthetically generated and real data sets in the presence of outliers or Laplacian noise compared with the L 2 norm bundle adjustment, and the method is efficient among the state of the art L 1 minimization methods.
This paper presents an efficient heuristic algorithm to minimize the overhead on the reconfiguration for two-dimensional VLSI/WSI arrays in the presence of faulty processing elements (PEs). According to the locations ...
详细信息
is paper presents an efficient heuristic algorithm to minimize the overhead on the reconfiguration for two-dimensional VLSI/WSI arrays in the presence of faulty processing elements(PEs).
is paper presents an efficient heuristic algorithm to minimize the overhead on the reconfiguration for two-dimensional VLSI/WSI arrays in the presence of faulty processing elements(PEs).
Petri net systems synthesis can construct large systems without the requirement of reachability analysis so that it can reduce the high complexity of analyzing global system. In a synthesis process, such good properti...
详细信息
Semiconductor manufacturing (SM) system is one of the most complicated hybrid processes involved continuously variable dynamical systems and discrete event dynamical systems. The optimization and scheduling of semicon...
详细信息
Semiconductor manufacturing (SM) system is one of the most complicated hybrid processes involved continuously variable dynamical systems and discrete event dynamical systems. The optimization and scheduling of semiconductor fabrication has long been a hot research direction in automation. Bottleneck is the key factor to a SM system, which seriously influences the throughput rate, cycle time, time-delivery rate, etc. Efficient prediction for the bottleneck of a SM system provides the best support for the consequent scheduling. Because categorical data (product types, releasing strategies) and numerical data (work in process, processing time, utilization rate, buffer length, etc.) have significant effect on bottleneck, an improved adaptive network-based fuzzy inference system (ANFIS) was adopted in this study to predict bottleneck since conventional neural network-based methods accommodate only numerical inputs. In this improved ANFIS, the contribution of categorical inputs to firing strength is reflected through a transformation matrix. In order to tackle high-dimensional inputs, reduce the number of fuzzy rules and obtain high prediction accuracy, a fuzzy c-means method combining binary tree linear division method was applied to identify the initial structure of fuzzy inference system. According to the experimental results, the main-bottleneck and sub-bottleneck of SM system can be predicted accurately with the proposed method.
In order to reduce cost and improve efficiency, many data centers adopt virtualization solutions. The advent of virtualization allows multiple virtual machines hosted on a single physical server. However, this poses n...
详细信息
Generally speaking,sketch takes advantage in conciseness and storage *** with the cognitive features of users,sketch maybe a better choice to communicate image message,which contains the least information but sufficie...
详细信息
Generally speaking,sketch takes advantage in conciseness and storage *** with the cognitive features of users,sketch maybe a better choice to communicate image message,which contains the least information but sufficiently satisfies the general needs of users and *** the paper,we propose a novel sketch stylized method,which improves the approach of Kang et al.[1] to get rid of some abundant points and eliminate the hard edges of the sketch,and finally modify the existing algorithm to redraw the sketch to reach better visual *** method based on existing approach and our own algorithm is easy to implement,and the effect is *** order to examine the satisfaction,we design a questionnaire and invite some volunteers to evaluate the sketch generated by the integrated method,and finally reach a high evaluation score.
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Sy...
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Systems, Man and Cybernetics Society (SMCS) Chapter, a chapter of the IEEE South Africa Section. The upcoming conference is held under the auspices of the University of Johannesburg academy for computerscience and softwareengineering, the University of South Africa School of Computing and the University of Pretoria School of Information Technology.
Background: software systems must evolve in order to adapt in a timely fashion to the rapid changes of stakeholder needs, technologies, business environment and society regulations. Numerous studies have shown that co...
详细信息
ISBN:
(纸本)9781622762538
Background: software systems must evolve in order to adapt in a timely fashion to the rapid changes of stakeholder needs, technologies, business environment and society regulations. Numerous studies have shown that cost, schedule or defect density of a software project may escalate as the requirements evolve. Requirements evolution management has become one important topic in requirements engineering research. Aim: To depict a holistic state-of-the-art of requirement evolution management. Method: We undertook a systematic review on requirements evolution management. Results: 125 relevant studies were identified and reviewed. This paper reports the preliminary results from this review: (1) the terminology and definition of requirements evolution; (2) fourteen key activities in requirements evolution management; (3) twenty-eight metrics of requirements evolution for three measurement goals. Conclusions: Requirements evolution is a process of continuous change of requirements in a certain direction. Most existing studies focus on how to deal with evolution after it happens. In the future, more research attention on exploring the evolution laws and predicting evolution is encouraged.
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t...
详细信息
暂无评论