In the recent years, the video-based approach is a popular choice for modeling and classifying facial expressions. However, this kind of methods require to segment different facial expressions prior to recognition, wh...
详细信息
In the recent years, the video-based approach is a popular choice for modeling and classifying facial expressions. However, this kind of methods require to segment different facial expressions prior to recognition, which might be a challenging task given real world videos. Thus, in this paper, we propose a novel facial expression recognition method based on extracting discriminative features from a still image. Our method first combines holistic and local distance-based features so that facial expressions could be characterized in more detail. The combined distance-based features are subsequently quantized to form mid-level features using the bag of words approach. The synergistic effect of these steps leads to much improved class separability and thus we can use a typical method, e.g., Support Vector Machine (SVM), to perform classification. We have performed the experiment on the Extended Cohn-Kanade (CK+) dataset. The experiment results show that the proposed scheme is efficient and accurate in facial expression recognition.
This paper deals with the implementation of a Nonlinear Interference Suppressor (NIS) into a wireless LTE transceiver. This within the context of high energy efficient multi-standard transceivers controlled by a cogni...
详细信息
Business transaction models prescribe the design freedom restrictions of a process-based organization and are useful to share a common understanding between the stakeholders that have a diverse interpretation of it. H...
详细信息
Business transaction models prescribe the design freedom restrictions of a process-based organization and are useful to share a common understanding between the stakeholders that have a diverse interpretation of it. However, business transaction models do not guarantee that the business actors perform them accordingly. Business actors, individually and/or collectively, operate the organization and also administrate and control (steer and transform) it, by means of observing the state of the world and then acting with purpose to change its state. Therefore, a business actor is simultaneous a controller agent and a controlled agent within an enterprise. Classical dynamic system control theories alone are not applicable in a straightforward way to an enterprise because of the prohibitive complexity needed for the comprehensive definition of the business transactions' dynamics. This paper conceptualizes the alignment of business transactions models with operations performed at run-time by the business actors, grounded on the emerging field of Enterprise engineering and well-known Dynamic Systems Control theory, to elicit purposeful design requirements for a full enterprise dynamic systems control solution. A preliminary Markov chain simulation aids in clarifying the design requirements intent for the observation concept. In this simulation, the business transactions are observed considering three distinct variables: state space, transition space and actor roles.
The extrusion-die is one of the main components in an extrusion line and influences the product quality as well as the whole process efficiency. The requirements on extrusion-dies are versatile and the design of extru...
详细信息
ISBN:
(纸本)9781622760831
The extrusion-die is one of the main components in an extrusion line and influences the product quality as well as the whole process efficiency. The requirements on extrusion-dies are versatile and the design of extrusion-dies is a very complex process with the necessity for huge know-how. Therefore the whole design process of a spiral-mandrel-die (SMD) based on a parametric 3D-CAD-mastermodel has been coupled with a 3D-CFD-simulation and implemented into a fully automized process. The flexibility of the extrusion dies to reach a high product quality for different materials is one of six criteria for the automatic interpretation of the extrusion die quality.
Signal-to-noise ratio (SNR) estimation plays an important role to adaptive modulation in Evolved Multimedia Broadcast Multicast Services (eMBMS). Based on the knowledge that the received signal space consists of signa...
详细信息
Signal-to-noise ratio (SNR) estimation plays an important role to adaptive modulation in Evolved Multimedia Broadcast Multicast Services (eMBMS). Based on the knowledge that the received signal space consists of signal subspace and noise subspace, we propose a subspace-based SNR estimation solution to cope with the time-varying channel with frequency selective effect and different OFDM pilot structure situations in eMBMS. The simulation is carried out on both PC and Aeroflex PXI platform. Simulation results show this proposed method gives good performance with different eMBMS pilot length and time-varying channels.
Voice morphing is a powerful tool for exploratory research and various applications. A temporally variable multi-aspect morphing is extended to enable morphing of arbitrarily many voices in a single step procedure. Th...
详细信息
Voice morphing is a powerful tool for exploratory research and various applications. A temporally variable multi-aspect morphing is extended to enable morphing of arbitrarily many voices in a single step procedure. The proposed method is implemented based on interference-free representations of periodic signals and found to yield highly-naturally sounding manipulated voices which are useful for investigating human perception of voice. The formulation of the proposed method is general enough to be applicable to other representations and easily modified depending on application needs.
Methods for evaluating concepts on an experiential level are either scarce or very limited in their focus. In this paper we present the Anticipated eXperience Evaluation (AXE) approach for evaluating early product con...
详细信息
ISBN:
(纸本)9780957071926
Methods for evaluating concepts on an experiential level are either scarce or very limited in their focus. In this paper we present the Anticipated eXperience Evaluation (AXE) approach for evaluating early product concepts with users. The approach utilizes opposed images as interview stimuli to facilitate the metaphorical thinking and reflection of participants. AXE is a qualitative method that has been designed to provide development teams insights on how future users might experience and value a product or service concept. Furthermore AXE aims at eliciting suggestions from participants that can serve as inspiration for refining concepts. In this paper we provide a detailed description of the AXE approach and its development in three pilot studies.
As the successor to the 3G standard, 4G provides much higher data rates to address cellular users' ever-increasing demands for high-speed multimedia communications. This paper analyzes the cellular operators' ...
详细信息
ISBN:
(纸本)9781467359443
As the successor to the 3G standard, 4G provides much higher data rates to address cellular users' ever-increasing demands for high-speed multimedia communications. This paper analyzes the cellular operators' timing of network upgrades and models that users can switch operators and services. Being the first to upgrade 3G to 4G service, an operator increases his market share but takes more risk or upgrade cost because 4G technology matures over time. This paper first studies a 4G monopoly market with one dominant operator and some small operators, where the monopolist decides his upgrade time by trading off increased market share and upgrade cost. The paper also considers a 4G competition market and develops a game theoretic model for studying operators' interactions. The analysis shows that operators select different upgrade times to avoid severe competition. One operator takes the lead to upgrade, using the benefit of a larger market share to compensate for the larger cost of an early upgrade. This result matches well with many industry observations of asymmetric 4G upgrades. The paper further shows that the availability of 4G upgrade may decrease both operators' profits due to increased competition. Perhaps surprisingly, the profits can increase with the upgrade cost.
With the rapid development of the Internet, many users start to take action putting personal or company information on it, and share with everyone. The Internet is public as it were, if we do not control its limit of ...
详细信息
With the rapid development of the Internet, many users start to take action putting personal or company information on it, and share with everyone. The Internet is public as it were, if we do not control its limit of authority to assure security, it's possible that those attackers do illegal access of important information and destroy them. Not only personal privacy is invaded, but the mass property damage. Therefore, effective access control system has been more and more emphasized these days. To fight against these network attacks, it is necessary to establish an effective and safe access control system; here we proposed a scheme, a key management which called Lagrange interpolation mainly takes access control model as framework, and use Elliptic Curve Cryptography system to enhance security. The fact we choose Lagrange interpolation is the key we use is randomized, no relationship between each key, so is relatively hard. As Elliptic Curve Cryptography system, we want attackers to encounter Elliptic Curve Discrete Logarithm Problem. Once the prime number is big enough, attackers will have trouble deciphering the key. Access control is so comprehensive, such as electronic documents, online television system sand wireless networks and so on, from previous literature; mobile agent technology applied in access control and key management would waste space and do exist some flaws in security, also we still have a lot of works to do on medical application. Hence, we propose these schemes in mobile agent in order to reach improvement, and then analyze of security and try to simulate what attackers will do. We conclude four common attacks: External Collective Attack, Internal Attack, Collusion Attacks and Equation Breaking Attack. As results, attackers are hard to decipher the key because of no relationship between each key and will face Elliptic Curve Discrete Logarithm Problem. We confirm that the proposed schemes can be more efficiently and safety to protect mobile agen
暂无评论