Face detection and facial feature extraction plays an important role in video surveillance, human computer interaction and face recognition. Color is a useful piece of information in computer vision especially for ski...
详细信息
The rapid urbanization in Kerala has led to increased generation of municipal solid waste (MSW), which will seriously affect the society and the quality of life of people. Although some action has taken from the part ...
详细信息
When dealing with business processes, modeling and managing temporal aspects, either properties or constraints, is crucial. In this paper, we propose a set of structured BPMN process diagrams for specifying duration c...
详细信息
ISBN:
(纸本)9781450344869
When dealing with business processes, modeling and managing temporal aspects, either properties or constraints, is crucial. In this paper, we propose a set of structured BPMN process diagrams for specifying duration constraints at different levels of abstraction, starting from BPMN atomic tasks and up to consider the duration of selected process sub-regions. Moreover, we suggest suitable techniques for addressing their violation at process run-time. Copyright 2017 ACM.
Routes in an ad hoc network may fail frequently because of node mobility. Stability therefore can be an important element in the design of routing protocols. The node escape probability is introduced to estimate the l...
详细信息
Routes in an ad hoc network may fail frequently because of node mobility. Stability therefore can be an important element in the design of routing protocols. The node escape probability is introduced to estimate the lifetime and stability of link between neighboring nodes and the escape probability based routing (EPBR) scheme to discover stable routes is proposed. Simulation results show that the EPBR can discover stable routes to reduce the number of route rediscovery, and is applicable for the situation that has highly dynamic network topology with broad area of communication.
In this paper we present a novel system for content-based retrieval and classification of cultural relic images. First, the images are normalized to achieve rotation, translation and scaling invariant similarity retri...
详细信息
Reading of a text in a given sentence have lot of parameters to consider for expressing an opinion on a given text to conclude nature of the text. The data which need to be formed in the form of data sets based on spe...
详细信息
In a hybrid peer-to-peer (P2P) system, flooding and DHT are both employed for content locating. The decision to use flooding or DHT largely depends on the population of desired data. Previous works either use local in...
详细信息
In this paper, we analyze the performance of graph convolutional networks (GCNs) in predicting COVID-19 incidence in states and union territories (UTs) in India as a semi-supervised learning task. By training the mode...
详细信息
With the exponential growth and rapid development in the fields of deep learning and neural networks, chatbots have gained a lot of popularity and have become a proven, and efficient tool to interact and provide servi...
详细信息
Nowadays, it is prohibitive for apps market places, such as Google App Store, to thoroughly verify an app’s resource permission requests to be legitimate or malicious. As a result, mobile users are left to decide for...
详细信息
暂无评论