A quarry site is used to produce gravel with different granularities based on the customer's needs. The production process consists of different stages that need to be planned in order to achieve high productivity...
详细信息
Due to the dynamicity of MANET’s topology and its infrastructureless nature, various problems arise from those inherent properties which degrade the QoS. Those negative issues are the energy constraints, problems rel...
详细信息
We propose a hierarchical 3D facial modeling technique for realistic facial expression animation from the anatomical specification. We analyze the real human face to construct the facial model with a hierarchical biom...
详细信息
We propose a hierarchical 3D facial modeling technique for realistic facial expression animation from the anatomical specification. We analyze the real human face to construct the facial model with a hierarchical biomechanical structure, incorporating a physically-based approximation to facial skin tissue, a set of anatomically-motivated facial muscle actuators and underlying skull structure. The deformable skin model has multi-layer structure to approximate different types of soft tissue. It takes into account the nonlinear stress-strain relationship of the skin and the fact that soft tissue is almost incompressible. Different kinds of muscle models have been developed to simulate the distribution of the muscle force exerted to the skin due to muscle contraction. The 3D face model incorporates a skull structure which extends the scope of facial motion and facilitates facial muscle construction. The facial muscle construction is achieved by a muscle mapping approach which efficiently locates facial muscles at the anatomically correct positions between the skin and skull layers. To generate facial expressions, the resulting hierarchical facial model is animated by solving the governing dynamic equation. For computational efficiency, we use a localized, semi-implicit integration method in the numerical simulation. The dynamic facial animation algorithm runs at an interactive rate and synthesizes various realistic facial expressions.
In this paper, we propose a distributionally robust control synthesis for an agent with stochastic dynamics that interacts with other agents under uncertainties and constraints expressed by signal temporal logic (STL)...
详细信息
Covert channel of the packet ordering is a hot research *** technology is not enough to protect the security of both sides of *** channel needs to hide the transmission data and protect content of *** traditional meth...
详细信息
Covert channel of the packet ordering is a hot research *** technology is not enough to protect the security of both sides of *** channel needs to hide the transmission data and protect content of *** traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the ***,because the establishment of proxy communication needs to consume traffic,the communication capacity will be reduced,and in recent years,the tor technology often has vulnerabilities that led to the leakage of secret *** this paper,the covert channel model of the packet ordering is applied into the distributed system,and a distributed covert channel of the packet ordering enhancement model based on data compression(DCCPOEDC)is *** data compression algorithms are used to reduce the amount of data and transmission *** distributed system and data compression algorithms can weaken the hidden statistical probability of ***,they can enhance the unknowability of the data and weaken the time distribution characteristics of the data *** paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity,transmission efficiency,and transmission *** to the analysis results,it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering,which saves the transmission time and improves the concealment compared with the original covert channel.
The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., reco...
详细信息
A better understanding of binary code topology is essential in making execution path exploration method. The execution path exploration is closely related to code coverage in binary code dynamic analysis. Since the nu...
详细信息
ISBN:
(纸本)9781450324694
A better understanding of binary code topology is essential in making execution path exploration method. The execution path exploration is closely related to code coverage in binary code dynamic analysis. Since the number of execution paths in a program is astronomically high, the efficient exploration strategy is needed. In this paper, we analyze binary code topology in a viewpoint of basic blocks. We find that the incoming edges show unbalanced distribution which follows power law, instead of balanced distribution. This unbalanced distribution of incoming edges can help understanding binary code topology, and we propose our study for deciding efficient execution path exploration strategy of dynamic binary code analysis. Copyright 2014 ACM.
Recent work on Conditional Random Fields (CRFs) has demonstrated the need for regularisation to counter the tendency of these models to overfit. The standard approach to regularising CRFs involves a prior distribution...
详细信息
A type of network called the Contender Network (CN) was earlier proposed by Ng, Erdogan and Ng (1995). A classification algorithm is used to assign weighted vote in a monotonically decreasing function of the rank in C...
详细信息
Conditional Random Fields (CRFs) have been applied with considerable success to a number of natural language processing tasks. However, these tasks have mostly involved very small label sets. When deployed on tasks wi...
详细信息
暂无评论