We present a new approach for quickly designing 3D models of botanical trees using an iterative addition of new nodes to the tree branch structure. This process is guided by the proximity of points marking volume dens...
详细信息
We present a new approach for quickly designing 3D models of botanical trees using an iterative addition of new nodes to the tree branch structure. This process is guided by the proximity of points marking volume density data captured from photographs. Numerical parameters provide the user controls that are consistent with the characteristics of trees in landscaping and make it possible to generate a wide variety of tree styles. Meanwhile we synthesize visually believable motions for the generated tree models affected by a wind field. Our system enables the simulation of tree animation, by introducing physically-based transformation matrix calculations for hierarchical branch patterns. The system also supports the tree-shaping modes in which many branches and leaves are generated by interactively designed their distribution density. Experimental results show that our approach can design a variety of reasonably natural-looking trees and their motions.
In recent years the focus of grid computing shifted towards more data intensive applications, increasingly needing access to various public and private databases. Relocating the code for Data Preprocessing (DPP) close...
详细信息
Unlike conventional automatic continuous speech segmentation models that deal with each boundary time-mark individually, in this paper, we propose an interval-data-based linear regression model for syllable nucleus du...
详细信息
Unlike conventional automatic continuous speech segmentation models that deal with each boundary time-mark individually, in this paper, we propose an interval-data-based linear regression model for syllable nucleus durations estimation (LRM-DE), which treats syllable boundary time-marks in pairs. This characteristic of LRM-DE makes it more suitable for estimating syllable durations for English sentences, which can be used for sentence stress detection. LRM-DE combines the outcomes of multiple base automatic speech segmentation machines (ASMs) to generate final boundary time-marks that miminize the average distance of the predicted and reference boundary-pairs of syllable nuclei. Experimental results show that on TIMIT dataset, LRM-DE reduces the average difference between the predicted syllable nucleus durations and their reference ones from 13.64 ms (the best result of a single ASM) to 11.81 ms. Also, LRM-DE improves the syllable nucleus segmentation accuracy from 81.59% to 83.98% within a tolerance of 20 ms.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin...
详细信息
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to higher learning institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI information technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague a...
详细信息
ISBN:
(纸本)9780769537443
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and a...
详细信息
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and are not available for use. Through a survey on the needs for CSCL in Malaysia, it is confirmed that CSCL application is needed but the available one could not support CL activities. This paper discusses CSCL study in Malaysia, especially the relationship between user involvement and type of CSCL application needed. In particular, the CSCL application that could associate existing knowledge among students to build new knowledge for their better understanding and problem solving skills. We examine this need and assess its impact by developing Collaborative Environment for Teaching and Learning System (CETLs).
In this study, discusses enhancing the e-learning system by employing a distributed database that apply reusable learning object as one of the technologies that is applied to e-learning development. An e-learning syst...
详细信息
software Process Improvement (SPI) became known in the last twenty years. SPI is crucial to augment software process capabilities in software companies to face present demanding and global market. There were numerous ...
详细信息
software Process Improvement (SPI) became known in the last twenty years. SPI is crucial to augment software process capabilities in software companies to face present demanding and global market. There were numerous published studies in United States, Europe, Australia and North America. Yet, there was still being short of research and published studies on SPI in Malaysia. This research attempts to fill this gap by focusing to analyze the resistance factors that de-motivate the implementation of SPI project specifically software companies operated in Malaysia. This research has been conducted during March 2008 until August 2008 and it used a survey instrument to gather data from 39 companies operated across Malaysia with the total of 251 professionals responded. The findings showed that organizational factors specifically human factors are playing an important role in determining the success of the SPI project. Participation and commitments from all individuals across the organization are also vital and imperative to ensure success for SPI initiative.
In order to evaluate the structural complexity of class diagrams systematically and deeply, a new guiding framework of structural complexity is presented. An index system of structural complexity for class diagrams is...
详细信息
In order to evaluate the structural complexity of class diagrams systematically and deeply, a new guiding framework of structural complexity is presented. An index system of structural complexity for class diagrams is given. This article discusses the formal description of class diagrams, and presents the method of formally structural complexity metrics for class diagrams from associations, dependencies, aggregations, generalizations and so on. An applicable example proves the feasibility of the presented method.
暂无评论