We present a novel graph-based framework for timeline summarization, the task of creating different summaries for different timestamps but for the same topic. Our work extends timeline summarization to a multimodal se...
详细信息
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (Io...
详细信息
ISBN:
(纸本)9781467313285
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (IoT) concept is a new trend for efficient managing and processing of sensor data online. This paper presents a platform based on Cloud Computing for management of mobile and wearable healthcare sensors, demonstrating this way the IoT paradigm applied on pervasive healthcare.
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar...
详细信息
ISBN:
(纸本)9781467321112
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primary methods to make the morphing based information hiding technology practically useful is interactive evolutionary algorithm (IEA). When using IEA, however, the user who is rating the images for their naturalness must rate a large amount of images. During this period of time, it is possible for the user to subconsciously shift the rating criteria, thus skewing the results of the algorithm. To help solve this problem, we propose a k-nearest neighbor (k-NN) reminder, which analyzes the user's previous inputs and creates an estimated fitness rating for images to aid the user in grounding his or her ratings. We ran experiments testing the differences in using the IEA with and without the k-NN reminder, looking to see what impact the algorithm had on the speed of the analysis and the ease of the user's rating ability. Results show that in many instances, the k-NN makes it easier for the user to maintain a standard criterion for the rating of images, with no noticeable impact on the speed of the process.
The work presented in this paper has been carried out with the aim of interpreting the data of a GNSS Reflectometer (GNSS-R) over land. The problem involves the analysis of bistatic scattering of the incoming signal c...
详细信息
ISBN:
(纸本)9781467311601
The work presented in this paper has been carried out with the aim of interpreting the data of a GNSS Reflectometer (GNSS-R) over land. The problem involves the analysis of bistatic scattering of the incoming signal collected around the specular direction. This requires to model the coherent component associated to the mean surface but at the same time the diffuse incoherent component due to roughness at wavelength scale. In presence of vegetation, both components will be affected, the former mainly because of the canopy attenuation and the latter for the combined effect of attenuation and volume scattering. The paper reviews the problem and presents the approach followed to develop a simulator of GNSS-R data over land, aiming to support potential applications of GNSS-R for soil moisture and biomass retrieval.
In the paper we describe a generalized net GACOA realizing an arbitrary algorithms for ant colony optimization. In this sense, this net is universal for all standard algorithms for ant colony optimization, since it de...
详细信息
K-nearest neighbor (k-NN) classification is one of the most fundamental classification methods and should be one of the first choices for a classification study when there is little or no prior knowledge about the dis...
详细信息
A hybrid differential evolution-binary particle swarm optimization (DE-BPSO) algorithm is proposed as a feature selection algorithm in the development of quantitative structure-activity relationship (QSAR) models. DE ...
详细信息
Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence ...
详细信息
We propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path between ness centrality. Both heuristics are relatively simple adaptations of the standard algorithm for between ...
详细信息
We propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path between ness centrality. Both heuristics are relatively simple adaptations of the standard algorithm for between ness centrality. Consequently, they generalize the computation of edge between ness and most other variants, and can be used to further speed up between ness estimation algorithms, as well. In the first heuristic, structurally equivalent vertices are contracted based on the observation that they have the same centrality and also contribute equally to the centrality of others. In the second heuristic, we first apply a linear-time between ness algorithm on the block-cut point tree and then compute the remaining contributions separately in each biconnected component. Experiments on a variety of large graphs illustrate the efficiency and complementarity of our heuristics.
This article consists of a collection of slides from the author's conference presentation on Ivy Bridge, power management applications of the third generation core Intel micro architecture. Some of the specific to...
详细信息
ISBN:
(纸本)9781467388801
This article consists of a collection of slides from the author's conference presentation on Ivy Bridge, power management applications of the third generation core Intel micro architecture. Some of the specific topics discussed include: an overview of the Ivy Bridge architecture and supported applications; power scaling and management facilities; core product features; power efficiency; voltage control and optimization technqiues; power sharing capabilities; and system architecture.
暂无评论