In the efforts to fight crimes and terrorism, governments install video surveillance equipment that works like thousands of eyes in airports, ports, major roadways, government buildings, and important facilities. Howe...
详细信息
In the efforts to fight crimes and terrorism, governments install video surveillance equipment that works like thousands of eyes in airports, ports, major roadways, government buildings, and important facilities. However, such kinds of surveillance system were hardware dependence and high budget for the installation. This paper is addressed to the development of the web-based real-time video surveillance framework. The proposed real-time many-to-many surveillance system can provide users to dynamically plug in their digital photographic equipments, such as web camera and CCTV (digital video) through the Internet without the installation of extra software. The constructed system also achieves an adjustable motion detection facility which can trigger the video recording and the real-time e-mail notification via PC or 3G mobile message.
Smart home is one of the cutting-edge technologies in today's international intelligent building field. The smart home system has been used to adopt complex integrated wiring technology to achieve information inte...
详细信息
ISBN:
(纸本)9781424463343
Smart home is one of the cutting-edge technologies in today's international intelligent building field. The smart home system has been used to adopt complex integrated wiring technology to achieve information interaction. There are several disadvantages identified with this method, for example, it needs to design in advance, layout techniques is difficult, wiring is cumbersome and so on. We propose a hybrid network programs, which combines ZigBee-based wireless sensor networks with power line carrier network. The system not only avoids cabling but also greatly enhances the system's scalability and robustness.
Traditionally, the algorithm of ID3 takes the information gain as a standard of expanding attributes. During the process of selection of expanded attributes, attributes with more values are usually preferred to be sel...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
Traditionally, the algorithm of ID3 takes the information gain as a standard of expanding attributes. During the process of selection of expanded attributes, attributes with more values are usually preferred to be selected. To solve such problem, a kind of AED algorithm based on average Euclidean distance in decision tree is proposed in this paper. The algorithm uses the average Euclidean distance as heuristic information. The experiment results show that the improved AED algorithm can avoid the variety bias of ID3 algorithm, and has no worse classification precision and less time cost than ID3.
Services discovery based on syntactic matching cannot adapt to the open and dynamic environment of the web. In order to realize service selection for supporting QoS constraints, a Four-Level Matching Model for Semanti...
详细信息
Services discovery based on syntactic matching cannot adapt to the open and dynamic environment of the web. In order to realize service selection for supporting QoS constraints, a Four-Level Matching Model for Semantic Web Service based on QoS Ontology and the QoS ontology for web service are presented. The Matching Engine works with the concepts of domain ontology and QoS ontology;it executes application Domain Matching, Description Matching of Service, Function Matching of Service, QoS Matching in sequence for describing the user's service request and registered service advertising which could be interpreted under ontology, because they provide a formal and semantic specification of conceptualization for improveing efficiency and accuracy of services selection.
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC). The first self-adaptation method is inspired by...
详细信息
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC). The first self-adaptation method is inspired by a self-adaptive method for controlling mutation step size in Evolutionary Strategies (1/5 rule). The design of the second takes into account more of our previous experimental observations, that SSC works well only when a certain portion of events successfully exchange semantically similar subtrees. These two proposed methods are then tested on a number of real-valued symbolic regression problems, their performance being compared with SSC using predetermined sensitivities and with standard crossover. The results confirm the benefits of the second self-adaption method.
At present workflow management systems are widely used to manage business processes in an organization, while the workflow engine provides a runtime execution environment, manages the overall processing and execution ...
详细信息
The capacity problem is one of the main issues in researching the multi-channel IEEE 802.11 wireless networks. In this paper, we analyze the path capacity of the multi-channel wireless networks by estimating the RTS, ...
详细信息
The capacity problem is one of the main issues in researching the multi-channel IEEE 802.11 wireless networks. In this paper, we analyze the path capacity of the multi-channel wireless networks by estimating the RTS, CTS and the packet loss rate of the wireless links and calculating the average service time of the packet sending. We also analyze the channel assignment and channel switching problems and present the Neighborhood Channel Concentration Degree (NCCD) mechanism which can distribute network load into the available channels and increase the total throughput of the network. We use ns-2 as the simulator to simulate the network throughput using our NCCD and compare with the throughput of the MCR mechanism. The results show that NCCD can significantly increase the network throughput.
This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-tree...
详细信息
This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-trees. The second stage applies an interference-aware Steiner tree to connect the source to each multicast sub-tree. Finally, an algorithm generates the final multicast tree topology. Simulation results reveal that the proposed approach outperforms others in the construction of a multicast tree and significantly reduces the interference of a mesh network.
作者:
Fang WeiSchool of Computer and Software
Nanjing University of Information Science and technologyNanjing China JiangSu Province Support Software Engineering R&D Center for Information Technology Application in Enterprise Suzhou China
The situation and questions of basic computer education in characteristics university are discussed firstly. Then the reform and construction of university computer-Based teaching are proposed. The paper has analyzed ...
详细信息
ISBN:
(纸本)9781424455140
The situation and questions of basic computer education in characteristics university are discussed firstly. Then the reform and construction of university computer-Based teaching are proposed. The paper has analyzed the different teaching approaches and addressed some teaching experiences for basic computer education.
A daytime and nighttime color image fusion method based on IHS transform and Multi-Wavelet transform is presented. The method can automatically merge images of a scene captured under different illumination and can be ...
详细信息
A daytime and nighttime color image fusion method based on IHS transform and Multi-Wavelet transform is presented. The method can automatically merge images of a scene captured under different illumination and can be used for practical purposes. Specifically, the fused image can give more information of the context of night-time traffic videos, which makes them easier to be understood. The context is automatically captured by a camera in a fixed-position during daytime and then is fused into a nighttime image of the same scene. The advantages of this method are that it preserves the important local perceptual cues and it can avoid the problems with traditional methods such as aliasing, ghosting and haloing.
暂无评论