With the popularity of higher education, more and more people with visual impairment receiving higher education. Education is precondition for the people with disabilities to realize "equality participation share...
详细信息
According to the linear model of the camera imaging, the mapping between the world coordinates and the pixel coordinates is determined. Based on the analysis of a large number of experimental data, the variation relat...
详细信息
In this paper, we introduce a hybrid optimization algorithm with the Branch-and-Bound Method and the Ant Colony Optimization to solve the multi-chromosomal reversal median problem. We convert the large-scale genome in...
详细信息
ISBN:
(纸本)9783037853245
In this paper, we introduce a hybrid optimization algorithm with the Branch-and-Bound Method and the Ant Colony Optimization to solve the multi-chromosomal reversal median problem. We convert the large-scale genome into TSP maps at first. Then we use a hybrid optimization algorithm with the Branch-and-Bound Method and the Ant Colony Optimization to solve the problem. In our improved algorithm, we increase the search speed by implement multi-branch parallel search of ACO. Our extensive experiments on simulated datasets show that this median solver is efficient.
Magnetic field distributions in disc magnetic drivers are analyzed by theory of the equivalent magnet charge in present work. An analytical model for magnetic induction is established based on assumption of the equiva...
详细信息
Magnetic field distributions in disc magnetic drivers are analyzed by theory of the equivalent magnet charge in present work. An analytical model for magnetic induction is established based on assumption of the equivalent magnet charge. Effect of both dimensions and relative angle of magnets on the magnetic induction is analyzed by the established model to obtain the best ratio between the magnetic induction and magnet volume. The calculation shows that the components of magnetic flux density distribute periodically, and the bigger size isolation disc is more influenced in the magnet field.
To verify the existence of mental rotation and explore the impact of the angle rotation, we used the letter 'R' and the three-dimensional picture as the visual stimuli materials in the experiment. Two experime...
详细信息
To verify the existence of mental rotation and explore the impact of the angle rotation, we used the letter 'R' and the three-dimensional picture as the visual stimuli materials in the experiment. Two experiments were completed by psychology research method. We analyzed the experimental result and found that the greater degree of visual stimulation samples deviate from the right position, the longer time mental rotation time is required. And response time of the men in the mental rotation task is less than the women, and response time is related to the complexity of experimental materials. We used well-trained BP neural network to simulate the image recognition, and did a comparative analysis of the response time. In this paper, the experiment adopts the method of psychology to reveal the law of human visual information processing, which provides the foundation for modeling and simulation of computer vision.
Vehicular ad-hoc network (VANET) offers a large number of new potential applications. Drivers may benefit from collision warning, road sign alarms and in-place traffic view, and others. This network tends to operate w...
详细信息
Vehicular ad-hoc network (VANET) offers a large number of new potential applications. Drivers may benefit from collision warning, road sign alarms and in-place traffic view, and others. This network tends to operate without any infra-structure or legacy client and server communication. However, due to some special properties such as high mobility, network partitioning, and constrained topology, situations in which the network topology changes dynamically are tempting to attackers for various reasons, e.g. faked location and malicious information. In this paper, by using trusted computing technology we propose a security mechanism called TGPSR to provide a holistic protection for geographic information routing protocol (GPSR) which has great applied potential in VANET. TGPSR is expected to effectively prevent malicious behaviors especially for tampering with routing protocol or neighbor location table (NLT). Extensive simulations confirm that TGPSR is superior to GPSR in defending against malicious behaviors and without compromising performance through comparing many metrics such as throughput, packet loss rate, packet delivery rate, jitter, average delay, routing efficiency, and simulation time.
The risk management is a very essential part in Software project management. However, due to the lack of enough understanding, many organizations neglect the software project risk management. In this paper, we investi...
详细信息
The risk management is a very essential part in Software project management. However, due to the lack of enough understanding, many organizations neglect the software project risk management. In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for evaluating the software systems risk based on the intuitionistic fuzzy sets and intelligence computation. We utilize the induced intuitionistic fuzzy ordered weighted averaging (I-IFOWA) operator and intuitionistic fuzzy weighted averaging (IFWA) operator to aggregate the intuitionistic fuzzy information corresponding to each software system and get the overall value of the alternatives, then rank the software systems and select the most desirable one(s). Finally, an illustrative example is given.
In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for evaluating the software systems risk based on the intelligence computation with linguistic information. We utilize the pu...
详细信息
In this paper, we investigate the multiple attribute group decision making (MAGDM) problems for evaluating the software systems risk based on the intelligence computation with linguistic information. We utilize the pure linguistic weighted averaging (PLWA) operator to aggregate the linguistic information corresponding to each alternative and get the overall value of the alternatives, then rank the software systems and select the most desirable one(s). Finally, an illustrative example is given.
Based on the principle of biological visual perception, an autonomous visual attention perception method of agent is proposed in this paper. The method mainly includes three modules which are data driven module, task ...
详细信息
Based on the principle of biological visual perception, an autonomous visual attention perception method of agent is proposed in this paper. The method mainly includes three modules which are data driven module, task driven module and decision level module. Data driven module is used for extracting bottom-up visual information, task driven module is used for combining bottom-up visual information extraction with top-down guidance, while decision level module is used for judging to begin data driven module program or task driven module program based on current task condition, searching in visual imagery knowledge database, computing visual attributes of searching target and other information to guiding the execution of task driven module program. Experimental results of data driven module and task driven module demonstrate the method's effectiveness.
In this article, phenolic resin was modified by montmorillonite(MMT) carbon fiber and other addition agents. This composite phenolic foam was characterized by XRD, SEM, and TEM the mechanical properties of this compos...
详细信息
In this article, phenolic resin was modified by montmorillonite(MMT) carbon fiber and other addition agents. This composite phenolic foam was characterized by XRD, SEM, and TEM the mechanical properties of this composite foam were measured as well. The results show that exfoliated phenolic resin/montmorillonite nanocomposites are obtained from acidulated montmorillonite (H-MMT) and phenolic resin by in-suit polymerization, the thickness of MMT layers is about 20-40nm, and the affinity between the MMT and phenolic resin is very good. During the forming of phenolic foams, because of the inflation of bubbles and the streching of bubble walls, MMT layers possess a certain orientation in this composite foam, forming a structure in which bubbles are wrapped around by MMT layers. So the degree of pulverization is decreased, and the compressive strength of this foam is increased by 35%-40%. Besides, MMT layers dispersed in this foam contribute greatly to its antiflaming and better properties. However, when the content of H-MMT is above 7%, MMT agglomeration appears. On the other hand, when carbon fibers are added to phenolic resin as a crosslink, they can prevent cracks from developing. Due to the excellent mechanical property and thermostability of carbon fibers, the flexural strength is increased by 58%, and the carbon yield ratio of composite foam is improved by no less than 8% when it is heated to over 500°C.
暂无评论