In this poster, we present an approach to contex-tualized semantic image annotation as an optimization problem. Ontologies are used to capture general and contextual knowledge of the domain considered, and a genetic a...
详细信息
In this poster, we present an approach to contex-tualized semantic image annotation as an optimization problem. Ontologies are used to capture general and contextual knowledge of the domain considered, and a genetic algorithm is applied to realize the final annotation. Experiments with images from the beach vacation domain demonstrate the performance of the proposed approach and illustrate the added value of utilizing contextual information.
To acquire detection performance required for an operational system in the detection for satellite image for environmental change, it is necessary to use multiple images over years to know the environmental changes ov...
详细信息
ISBN:
(纸本)9608457564
To acquire detection performance required for an operational system in the detection for satellite image for environmental change, it is necessary to use multiple images over years to know the environmental changes over years. This paper describes a method for decision-level fusion technique where the fusion can compensate for correlation among images. The fusion is done using possibilistic combiners based on T-norms families that better represent the correlation of images. This technique was applied to Nile River Delta, Egypt (1973, 1987). These images show the dramatic urban growth within the Nile River delta and the expansion of agriculture into adjoining desert areas.
To acquire detection performance required for an operational system in the detection for satellite image for environmental changes, it is necessary to use multiple images over years to know the environmental changes o...
详细信息
ISBN:
(纸本)9608457564
To acquire detection performance required for an operational system in the detection for satellite image for environmental changes, it is necessary to use multiple images over years to know the environmental changes over years. This paper describes a method for decision-level fusion technique where the fusion can compensate for correlation among images. The fusion is done using possibilistic combiners based on T-norms families that better represent the correlation of images. This technique was applied to satellite images for free vegetation of Africa (1998 April 01, 1998 September 01). The performance of this technique, compared to the other techniques such as naïve Bayes, Dempster-Shafer, voting, rule-based and linear discriminant, is evaluated by simple theoretical models.
In this paper the impact of user's hand holding a Multiple-Input-Multiple- Output (MIMO) terminal on the system performance is investigated. A 4×4 MIMO system is considered with a Personal Digital Assistant (...
详细信息
ISBN:
(纸本)9290929375
In this paper the impact of user's hand holding a Multiple-Input-Multiple- Output (MIMO) terminal on the system performance is investigated. A 4×4 MIMO system is considered with a Personal Digital Assistant (PDA) terminal equipped with a compact array of 4 patch elements. The radiation patterns of the antenna elements are simulated in the presence of the other elements and in the presence of a user's hand. The obtained patterns are used to evaluate the covariance matrix of the receive antenna which is incorporated in a correlation-based MIMO channel model. MIMO channel capacity is calculated to demonstrate the capacity degradation caused by the user's hand.
In this paper we introduce a new test-data compression method for IP cores with unknown structure. The proposed method encodes the test data provided by the core vendor using a new, very effective compression scheme b...
详细信息
ISBN:
(纸本)9783981080100
In this paper we introduce a new test-data compression method for IP cores with unknown structure. The proposed method encodes the test data provided by the core vendor using a new, very effective compression scheme based on multilevel Huffman coding. Specifically, three different kinds of information are compressed using the same Huffman code, and thus significant test data reductions are achieved. A simple architecture is proposed for decoding on-chip the compressed data. Its hardware overhead is very low and comparable to that of the most efficient methods in the literature. Additionally, the proposed technique offers increased probability of detection of unmodeled faults since the majority of the unknown values of the test set are replaced by pseudorandom data generated by an LFSR.
We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in ...
详细信息
We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in the system. However, due to the network’s size, economic and performance reasons, it is capable to provide safety, i.e. clean nodes from the possible presence of attackers, only to a limited part of it. The objective of the defender is to place itself in such a way as to maximize the number of attackers caught, while each attacker aims not to be caught. In [7], a basic case of this problem was modeled as a non-cooperative game, called the Edge model. There, the defender could protect a single link of the network. Here, we consider a more general case of the problem where the defender is able to scan and protect a set of k links of the network, which we call the Tuple model. It is natural to expect that this increased power of the defender should result in a better quality of protection for the network. Ideally, this would be achieved at little expense on the existence and complexity of Nash equilibria (profiles where no entity can improve its local objective unilaterally by switching placements on the network). In this paper we study pure and mixed Nash equilibria in the model. In particular, we propose algorithms for computing such equilibria in polynomial time and we provide a polynomial-time transformation of a special class of Nash equilibria, called matching equilibria, between the Edge model and the Tuple model, and vice versa. Finally, we establish that the increased power of the defender results in higher-quality protection of the network.
The study of the path coloring problem is motivated by the allocation of optical bandwidth to communication requests in all-optical networks that utilize Wavelength Division Multiplexing (WDM). WDM technology establis...
详细信息
The majority of the systems and platforms developed for supporting distributed virtual environments are based on the concept of distribution from the early beginning of their development. In this paper we present the ...
详细信息
The majority of the systems and platforms developed for supporting distributed virtual environments are based on the concept of distribution from the early beginning of their development. In this paper we present the migration to a distributed virtual environment from a traditional client-server architecture. In particular, this paper describes the case of EVE, a networked virtual environment originally aimed to support small-scale applications. EVE started as a standard client-multi server architecture, which could support multiple concurrent virtual worlds with a maximum number of seventeen simultaneous participants in each of these worlds. However, the need to support larger-scale applications revealed that the traditional architecture, upon which EVE was based, is insufficient to meet the needs of these applications, which are large both in the sense of virtual space and graphics and in regard to the number of concurrent participants. This paper discusses the migration of EVE to a distributed platform, which is able to support large-scale networked virtual environments. In particular, the paper describes the modifications realized in the architectural model of the initial platform for supporting effectively large-scale applications. The basic entities of the distributed model are presented, their operations, as well as the interconnection among them. In addition, the paper presents an initial approach of the algorithm that is adopted for the efficient partitioning of the virtual world and the assignment of the clients to the entities and resources of the distributed platform. The approach presented is space-object driven, in the sense that both the actual size of the virtual space along with the number of objects with which the user can interact is taken into account during the partitioning
For eventually providing terahertz science with compact and convenient devices,terahertz (1~10THz) quantum-well photodetectors and quantum-cascade lasers are *** design and projected detector performance are presente...
详细信息
For eventually providing terahertz science with compact and convenient devices,terahertz (1~10THz) quantum-well photodetectors and quantum-cascade lasers are *** design and projected detector performance are presented together with experimental results for several test devices,all working at photon energies below and around optical *** limited infrared performance (BLIP) operations are observed for all samples (three in total),designed for different *** temperatures of 17,13,and 12K are achieved for peak detection frequencies of 9.7THz(31μm),5.4THz(56μm),and 3.2THz(93μm),respectively.A set of THz quantum-cascade lasers with identical device parameters except for doping concentration is *** δ-doping density for each period varies from 3.2×1010 to 4.8×*** observe that the lasing threshold current density increases monotonically with doping ***,the measurements for devices with different cavity lengths provide evidence that the free carrier absorption causes the waveguide loss also to increase *** the observed maximum lasing temperature is best at a doping density of 3.6×1010cm-2.
暂无评论