A red tide damages sea farming on the coast of many countries, and generally has a bad influence on the coastal environment and sea ecosystem. To enhance the prediction of red tide blooms, this paper proposes a red ti...
详细信息
In the paper, we proposed a gender recognition scheme based on multi-model information fusion. The proposed gender recognition scheme is composed of four parts: face detection and rectification, eye detection, feature...
详细信息
In the paper, we proposed a gender recognition scheme based on multi-model information fusion. The proposed gender recognition scheme is composed of four parts: face detection and rectification, eye detection, feature extraction, and gender classifier. To evaluate the proposed scheme, a large number of images containing different-size faces are captured by using low-cost webcam. Experimental results show that our proposed scheme can detect facial regions as well as eyes well. In addition, the accuracy of our gender recognition scheme is more than 95%. These results demonstrate that our proposed scheme can achieve not only face and eye detection but also gender recognition.
In automatic video summarization, visual summary is constructed typically based on the analysis of low-level features with little consideration of video semantics. However, the contextual and semantic information of a...
详细信息
Numerical computation of p+nn+ SDR IMPATT structure is carrier out at X-band and Ka-band by double iterative method involving simultaneous solution of Poisson's equation, continuity equation and space-charge equat...
详细信息
Most of biological databases provide cross links that point to data records describing the same object in other databases. However, as more and more databases are available, manually creating and maintaining cross lin...
详细信息
ISBN:
(纸本)9789898425362
Most of biological databases provide cross links that point to data records describing the same object in other databases. However, as more and more databases are available, manually creating and maintaining cross links becomes very time consuming, if not impossible. Existing databases provide only a small portion of all possible links. In this paper, we present a database cross link server BioDBLink that can automatically collect and generate cross links among biological databases. The core of BioDBLink is a data matching technique that identifies and matches data records or elements describing the same object among pathway databases. Experiment on a data set collected from several pathway, enzyme and compound databases shows that our approach is able to identify most of the cross links provided by current databases, discover a large number of missing links, and detect inconsistency and duplicate errors.
As semiconductor manufacturing technology continues towards reduced feature sizes, timing yield will degrade due to increased process variation. This work proposes the use of architectural symmetry in FPGA so that mul...
详细信息
The use of digital media for improving the effectiveness of teaching methodologies in Universities is increasing. In this contribution the experience performed at University of Roma TRE is presented. Since 2005 an onl...
详细信息
The multimedia application through mobile Ad-hoc network is gradually becoming very popular. The traffic patterns of multimedia applications are quite different from the traditional data applications. The constant bit...
详细信息
ISBN:
(数字)9783642227097
ISBN:
(纸本)9783642227080
The multimedia application through mobile Ad-hoc network is gradually becoming very popular. The traffic patterns of multimedia applications are quite different from the traditional data applications. The constant bit rate (CBR) traffic does not accommodate the specific features of multimedia applications. To characterize, the multimedia application, Exponential or Pareto traffic sources have been explored. The popular routing protocols for mobile ad hoc network were developed considering the Constant Bit Rate (CBR) traffic only. In case of multimedia traffic they do not work as expected. In this article, we have tried to study the behavior of mobile ad hoc network routing protocols considering Exponential and Pareto traffic. To the best of our knowledge, this is the first attempt to analyze the effect of traffic patterns on mobile ad hoc network routing. We have chosen the Normalized routing load and Packet Delivery Fraction as our figure of merit to compare various protocols. The Normalized Routing Load is high for both Exponential and Pareto traffic in Dynamic Source Routing (DSR) protocol. The Packet Delivery Fraction is very high for Ad hoc On Demand Distance Vector (AODV) routing protocol in all types of traffic patterns whereas it is less in Dynamic Source Routing (DSR) for both Exponential and Pareto traffic.
The great white shark is a large marine animal that is a potential threat to swimmers. There were many shark attack reports worldwide and many of the attacks happened in shallow waters. One way to reduce the incidence...
详细信息
Mobile pervasive healthcare technologies can support a wide range of applications and services including patient monitoring and emergency response. At the same time they introduce several challenges, like data storage...
详细信息
暂无评论