We consider the NP-complete problem of deciding whether an input graph on n vertices has k vertex-disjoint copies of a fixed graph H. For H = K3 (the triangle) we give an O(22klogk+1.869k n2) algorithm, and for genera...
详细信息
Most edge detection algorithms include three main stages: smoothing, differentiation, and labeling. In this paper, we evaluate the performance of algorithms in which competitive learning is applied first to enhance ed...
详细信息
ISBN:
(纸本)1604238216
Most edge detection algorithms include three main stages: smoothing, differentiation, and labeling. In this paper, we evaluate the performance of algorithms in which competitive learning is applied first to enhance edges, followed by an edge detector to locate the edges. In this way, more detailed and relatively more unbroken edges can be found as compared to the results when an edge detector is applied alone. The algorithms compared are K-Means, SOM and SOGR for clustering, and Canny and GED for edge detection. Perceptionally, best results were obtained with the GED-SOGR algorithm. The SOGR is also considerably simpler and faster than the SOM algorithm.
Several widely used methods have been proposed for fusing high resolution panchromatic data and lower resolution multi-channel data. However, many of these methods fail to maintain spectral consistency of the fused hi...
详细信息
The wealth of information available in the internet or local corpora has increased while our ability to search and retrieve relevant information is being reduced. Hypermedia, being complex information objects, are dif...
详细信息
The wealth of information available in the internet or local corpora has increased while our ability to search and retrieve relevant information is being reduced. Hypermedia, being complex information objects, are difficult to manage. In this paper we propose some new algorithms for searching and retrieving hypermedia documents from a local server by taking advantage content and context information. Besides presenting new solutions for hypertext, we review the state of the art in multimedia data mining and present future trends in this research area.
Light emitting diodes (LED) are usually the alternative optoelectronic devices for optical communications with moderate bandwidth efficiency and bit rates, compared to semiconductor lasers. Laser applications dominate...
详细信息
Light emitting diodes (LED) are usually the alternative optoelectronic devices for optical communications with moderate bandwidth efficiency and bit rates, compared to semiconductor lasers. Laser applications dominate the long distance communication networks. However LED seems to be a very good solution, especially in very short distance communication networks, where Plastic Optical Fibers, (POF) are used as the optical transmission medium. This paper investigates a qualitative technique of calculating the bandwidth, based on first principles of semiconductor physics. This technique is more convenient for a first approach of the subject on optical communication networks and its simplicity provides a very useful analytical tool. Finally these results are compared with the existing experimental ones.
In this paper, we discuss edge detection by first using a clustering algorithm followed by a known edge detection filter such as Canny or Generalized Edge Detector (GED). We developed a new clustering method called Se...
详细信息
This paper proposes a method for color gradient computation applied to morphological segmentation of color images. The weighted gradient (with weights estimated automatically), proposed in this paper, applied in conju...
详细信息
Virtual Enterprises are a, relatively, new business model that is greatly depended on network technology. Providing services in such an environment is a challenge in itself;architectural, technological and organisatio...
详细信息
Virtual Enterprises are a, relatively, new business model that is greatly depended on network technology. Providing services in such an environment is a challenge in itself;architectural, technological and organisational difficulties have not permitted yet the development of a framework for Virtual Enterprise enaction. In this paper we describe a Virtual Private Network architecture that uses special monitor and coordination processes in order to achieve efficient delivery of services and activities in Virtual Enterprise environments. We discuss the general architecture of the system, emphasising on the solutions used to monitor and co-ordinate various activities.
This paper provides a compact mathematical formulation for shared protection in communication networks with bandwidth guaranteed tunnels. The formulation is characterized by taking the most general definition of the S...
详细信息
暂无评论