A new approach to extract building objects was proposed. Firstly, rival penalized competitive learning(RPCL) algorithm was used to improve segmentation granularity of super-pixel algorithm based on graph theory;Second...
详细信息
A new approach to extract building objects was proposed. Firstly, rival penalized competitive learning(RPCL) algorithm was used to improve segmentation granularity of super-pixel algorithm based on graph theory;Secondly, the spatial envelope was used to classify the image patches using support vector machine (SVM) classifier, and distinguish building and non-building category in the image;Finally, building hypothesis in the image was verified based on structure of the building category. The experiments show on standard dataset that the proposed algorithm outperforms other similar algorithms on building extraction, and also meet the real-time requirements in general application.
This paper has surveyed the education evaluation method and technology both at home and abroad, and studied on the question of education evaluation information's mining. In view of the evaluation index system of h...
详细信息
ISBN:
(纸本)9781424465392
This paper has surveyed the education evaluation method and technology both at home and abroad, and studied on the question of education evaluation information's mining. In view of the evaluation index system of high and secondary vocational education, on the basis of AHP method it has improved the deficiency of AHP's quantitative analysis. The modified Genetic Algorithm method is used to constructed the data mining model on the basis of AHP method. This paper has taken a scientific quantitative analysis on the evaluation model's weight, and provided a vastitude future of education evaluation index system's quantification.
The type of the leaf vein can be a useful parameter in automatic identification of plant species. Leaf vein extraction is the precondition of discriminating the leaf vein type. In this paper a new method is presented ...
详细信息
The type of the leaf vein can be a useful parameter in automatic identification of plant species. Leaf vein extraction is the precondition of discriminating the leaf vein type. In this paper a new method is presented for leaf vein extraction based on mathematical morphology. Firstly, the color image of the plant leaf is transformed to gray image according to the hue and intensity information. Secondly, a combined operation of mathematical morphology is applied to the image to eliminate the color overlap between the whole leaf vein and the whole background. Thirdly, image segmentation is performed with OSTU method. Finally, the leaf vein can be got after some processing on details. Experiments have been conducted with several images and the results show the effectiveness of the method. The basic idea of the method is also applicable to other linear objects extraction.
Label placement is very important when we display the electronic map. It will affect the beauty of electronic map. Furthermore, in order to display label placement in real-time, the computational complexity can not be...
详细信息
Label placement is very important when we display the electronic map. It will affect the beauty of electronic map. Furthermore, in order to display label placement in real-time, the computational complexity can not be too high. A novel algorithm of label placement is expounded based on the thinking of grid. It first divides the screen simply, then those three objects of points, arcs and polygons will be dealt with. The label configuration is reasonable, and does not result in any overlap. The experimental result indicates this algorithm is simple and effective. It can meet the demand of high quality map dynamic label placement and is successfully applied in commercial GIS.
In this study, Multiwall Carbon Nanotube (MWNT)/Acrylonitrile-ButadieneStyrene(ABS) nanocomposites were prepared via direct compounding or twice fabrication *** was firstly modified by several modifiers,which are male...
详细信息
In this study, Multiwall Carbon Nanotube (MWNT)/Acrylonitrile-ButadieneStyrene(ABS) nanocomposites were prepared via direct compounding or twice fabrication *** was firstly modified by several modifiers,which are maleic anhydride (MA), glycidyl methacrylate (GMA), methyl methacrylate (MMA), allyl amine(AA) and Vinyl trimethoxy silane(VTMOS).After selecting the best modifier of carbon nanotube, VTMOS, we prepared the masterbatches MWNT/ABS nanocomposites.
Detecting and characterizing the community structure of complex network and social network is fundamental problem. Many of the proposed algorithm for detecting community based on modularity Q which fail to identify mo...
详细信息
Detecting and characterizing the community structure of complex network and social network is fundamental problem. Many of the proposed algorithm for detecting community based on modularity Q which fail to identify modules smaller than a scale community. In this paper, authors propose a new community detection algorithm based on genetic algorithm and modularity density (D value). We test our method on classical social networks whose community structure is already known and the results can be much easier compared with the method. Experiments show the capability of the method to successfully detect the community structure.
A new modification approach was proposed to prepare the multiwall carbon nanotube(MWNT) / polyethylene terephthalate(PET) nanocomposites.A modified MWNT was chemically reacted with the tougher, polyolefin grafted male...
详细信息
A new modification approach was proposed to prepare the multiwall carbon nanotube(MWNT) / polyethylene terephthalate(PET) nanocomposites.A modified MWNT was chemically reacted with the tougher, polyolefin grafted maleic anhydride The physical properties of these MWNT / PET resin nanocomposite were *** the results, adding MWNT can improve the tensile strength and flexural strength when MWNT content was below 2wt%; In thermal properties of nanocomposites, the heat deflection temperature was improved from 80.6℃ to 91.0℃ as the MWNT content was from 1wt% to 2.5wt%.
Notice of Violation of IEEE Publication Principles "A Study on Secure Multiparty Computation Problems and Their Relevance" by Shaikh, Z., Mishra, D.K published in the 2010 Second International Conference on ...
Notice of Violation of IEEE Publication Principles "A Study on Secure Multiparty Computation Problems and Their Relevance" by Shaikh, Z., Mishra, D.K published in the 2010 Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp.95-99 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee this paper has been found to be in violation of IEEE's Publication Principles. The committee has found Z. Shaikh to be the sole offending author and that D.K. Mishra was not involved in the offense. This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: "Secure multi-party computation problems and their applications: a review and open problems" by Wenliang Du and Mikhail J. Atallah published in the Proceedings of the 2001 workshop on New security paradigms (NSPW '01), 2001, pp. 13 - 23 The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information, two competing financial organizations might jointly invest in a project that must satisfy both organizations private and valuable constraints, and so on. Today, to conduct such computations, one entity must usually know the inputs from all the participants, however if nobody can be trusted enough to know all the inputs, privacy will become a pr
In the present work we studied the fabrication of ferroelectric film as PLZT by the sol-gel technique, and the birefringence optical property induced by the external voltage is measured by the electro-optic modulated ...
详细信息
ISBN:
(纸本)9781424455652
In the present work we studied the fabrication of ferroelectric film as PLZT by the sol-gel technique, and the birefringence optical property induced by the external voltage is measured by the electro-optic modulated heterodyne interferometer. The seeding layer as PT is deposited on the ITO glass substrate before the deposition of PLZT film. After the deposition of PLZT film, a conducting layer as SnO2 is then coated on the top of PLZT. Experimental results show that there exists birefringence on this ferroelectric film we made by sol-gel method.
暂无评论