Web Services are popular solutions that have been in recent years to implement software in every business domain. They provide an effective way to reuse functionality, which reduces development time and cost, and incr...
详细信息
Web Services are popular solutions that have been in recent years to implement software in every business domain. They provide an effective way to reuse functionality, which reduces development time and cost, and increases software reliability. software testing is a key issue of Web Services development in order to ensure quality of services. software testing aims to discover faults or defects in software to determine where its behaviors do not correspond with software requirements or test case specifications. software testing is used to evaluate functional correctness, reliability, robustness, and performance. We describe a Web Service contract with a Web Service Semantics Language (WSDL-S) and the Object Constraint Language (OCL). WSDL-S can be used to identify pre- and post- conditions of Web Service operation by referring service rule from OCL. This paper presents an approach for generating Web Service test cases using WSDL-S and OCL, while test case generation method is a pair-wise testing technique.
Image warping techniques are frequently used to render 3D scenes from images with depth information for VR applications. In this paper, we first propose a spherical representation of image-based models call the Spheri...
详细信息
In this paper a cumulant-based method for identification of gait using accelerometer data is presented. Acceleration data of three different walking speeds (slow, normal and fast) for each subject was acquired by the ...
详细信息
In this paper a cumulant-based method for identification of gait using accelerometer data is presented. Acceleration data of three different walking speeds (slow, normal and fast) for each subject was acquired by the accelerometer embedded in cell phone which was attached to the person's hip. Data analysis was based on gait cycles that were detected first. Cumulants of order from 1 to 4 with different number of lags were calculated. Feature vectors for classification were built using dimension reduction on calculated cumulants by principal component analysis (PCA). The classification was accomplished by support vector machines (SVM) with radial basis kernel. According to portion of variance covered in the calculated principal components, different lengths of feature vectors were tested. Six healthy young subjects participated in the experiment. The average person recognition rate based on gait classification was 90.3±3.2%. A similarity measure for discerning different walking types of the same subject was also introduced using dimension reduction on accelerometer data by PCA.
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource disseminati...
详细信息
ISBN:
(纸本)9781605588728
Trusted resource dissemination over Internet is still an open problem. However, it is crucial to the success of Internet-based or Internetware systems. We propose an approach that supports trusted resource dissemination between Internetware nodes. In this paper, we focus on an evidence-based trustworthiness-assurance mechanism in the approach. An architecture and a protocol that enforces this approach in Internetware systems are also described. Copyright 2009 ACM.
In this paper, we propose a new patch-based texture synthesis method. The core of the proposed method consists of two main components: (1) a feature-weighted similarity measurement to search for the best match and (2)...
详细信息
In this paper, we propose a new patch-based texture synthesis method. The core of the proposed method consists of two main components: (1) a feature-weighted similarity measurement to search for the best match and (2) a dynamically prioritized-based pixel re-synthesis to reduce discontinuity at the boundary of adjacent patches. Examples and experimental comparisons with other previous methods are demonstrated to verify the usefulness of our proposed method. In addition, we enhance the proposed method with a view warping technique to better synthesize non-frontal-parallel textures (NFPTs) that can not be synthesized well by traditional texture synthesis methods.
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the c...
详细信息
ISBN:
(纸本)9781601321190
The most scientific papers dealing with handwriting recognition systems make statements relating to recognition performance based on a forced-recognition rate. This rate describes the ratio between the number of the correct recognized samples and the number of all possible samples. This paper proposes a new technique to improve the previous research work in order to have a better result. As part of the preprocessing phase the image file is checked for skewing. If the image is skewed, it is corrected by a simple rotation technique in the appropriate direction. Character fragmentation process is done based on the existing technique. The improvement of feature extraction process is made by detecting details of glyph and used as an input for the classification process of ANN (Artificial Neural Network) to develop a full OCR system. Result indicated that some versions, even upon first using them, were at least as good as last methods of recognition.
Maximum margin principle has been successfully applied to many supervised and semi-supervised problems in machine learning. Recently, this principle was extended for clustering, referred to as Maximum Margin Clusterin...
详细信息
We present a particle-based method for viscoelastic fluids simulation. In the method, based on the traditional Navier-Stokes equation, an additional elastic stress term is introduced to achieve viscoelastic flow behav...
详细信息
The task-deployment models of simulation, is mainly used to solve the problem of the unreasonable tasks partition in the simulation of distributed computer network attack and defense exercises. This paper gives a task...
详细信息
Survivability has become a focal point of research. Simulation is a common method for experimental verification to identify the advantages and deficiencies of survivability models and architectures. This paper propose...
详细信息
暂无评论