Automatic image annotation, which aims at automatically identifying and then assigning semantic keywords to the meaningful objects in a digital image, is not a very difficult task for human but has been regarded as a ...
详细信息
Automatic image annotation, which aims at automatically identifying and then assigning semantic keywords to the meaningful objects in a digital image, is not a very difficult task for human but has been regarded as a difficult and challenging problem to machines. In this paper, we present a hierarchical annotation scheme considering that generally human s visual identification to a scenery object is a rough-to-fine hierarchical process. First, the input image is segmented into multiple regions and each segmented region is roughly labeled with a general keyword using the multi-classification support vector machine. Since the results of rough annotation affect fine annotation directly, we construct the statistical contextual relationship to revise the improper labels and improve the accuracy of rough annotation. To obtain reasonable fine annotation for those roughly classified regions, we propose an active semi-supervised expectation-maximization algorithm, which can not only find the representative pattern of each fine class but also classify the roughly labeled regions into corresponded fine classes. Finally, the contextual relationship is applied again to revise the improper fine labels. To illustrate the effectiveness of the presented approaches, a prototype image annotation system is developed, the preliminary results of which showed that the hierarchical annotation scheme is effective.
This paper presents an algorithm to improve the time and spacc complexity of reverse hash chain traversal. Mapping the traversing of a reverse hash chain to the inorder traversing of a binary tree, the proposed algori...
详细信息
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis...
详细信息
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanisms cannot meet the security requirements of MANET due to the limited communication bandwidth, computation power, memory and battery capacity, and dynamic deployment environment. Many approaches have been suggested to trade-off between the security strength and efficiency, and most of them focus on the confidentiality and integrity of MANET while pay less attention to the availability issue. Based on the analysis of availability related factors in MANET, we present an availability based trust model in this paper. Furthermore, a cluster based trust model (ABTMC, Availability Based Trust Model of Clusters) is presented with the consideration with the resource constrain of node, dynamic topology, and the unbalance of computing capability and resource capability among MANET nodes. Many availability oriented security service can be obtained based on this model.
In speech communication, humans are able to perceive not only the acoustic features but also the articulation state from speech sounds. Some specific articulation configurations can carry certain non-linguistic inform...
详细信息
In speech communication, humans are able to perceive not only the acoustic features but also the articulation state from speech sounds. Some specific articulation configurations can carry certain non-linguistic information such as emotion. However, the relation between articulation and acoustic features is still not clear. To clarify such a relation, we analyzed speech data from the emotions of cold anger and hot anger based on an emotional speech corpus and attempt to realize the observations using a physiological articulatory model. We measured the changes in acoustic features when altering articulation states for individual speech organs using the physiological articulatory model. It is found that the cold and hot angers both have emphasized components in high-frequency region, while the former controls articulation and the latter controls the sound source of the speech production system.
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent...
详细信息
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authentication during the communications between the vehicles and the road-side infrastructure units. In this paper, we propose an improved privacy-preserving mutual authentication protocol for vehicle ad hoc networks by using secure identity-based group blind signature, the private encryption system and the public encryption system. The proposed privacy-preserving mutual authentication protocol for vehicle ad-hoc networks satisfies mutual authentication, anonymity and unlinkability under Random Oracle Model and the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, the trusted center can trace malicious on-board units or road-Side infrastructure units in our protocol.
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ...
详细信息
As computersystems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE soft...
详细信息
As computersystems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE software is how to devise and implement a method that can effectively analyze requirements in varying operational conditions. In this paper, a Distributed Realtime Embedded net (DREN) is proposed as software design specification modeling tool. The basic tasks, function module and communication process are modeled by using DREN, thus forming the entire application by making use of Petri net’s synthesis operation. Time Reachability Graph is adopted to analyze the correctness of DRENmodel, the basic properties of DRE system are also considered. Finally, a specific example is given to simulate the analytical process, the results show that the method can be a good solution to analyze DRE software.
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on applying partial order reduction for verifying quantitative time properties and reward-based properties on actions. However, there are many situations that reward-based properties are expressed on states rather than on actions because actions are triggered in no time and the quantities can not be obtained easily. This paper presents reduction criteria for a probabilistic temporal logic that allows specification of restrictions on quantitative measures given by spatial resources function for the states of the considered system and provides the proof of the correctness.
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and r...
详细信息
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and randomicity. The syntax and semantics of the new model are shown based on the existing temporal logics such as CSRL and pathCSRL. The model checking procedure is discussed and thus the practicability of the new model is intuitive. Based on the existing models, the proposed model includes spatial resources labels only by adding the spatial information to the existing labels of states, so the treatment of the state explosion problem is similar to that in the existing models.
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angula...
详细信息
ISBN:
(纸本)9787894631046
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angular motion model, a four-degree-of-freedom hybrid model is created. system identification is done using the remote control experiment data. Model validation results demonstrate that the model can predict the motion of the miniature helicopter near hovering on the whole. The model can be used to optimize parameterized controller. Closed-loop simulation further validates the model.
暂无评论