A brief review of color-matching technology and its application of printing RGB images by CMY or CMYK ink-jet printers is presented, followed by an explanation to the conventional approaches that are commonly used in ...
详细信息
A brief review of color-matching technology and its application of printing RGB images by CMY or CMYK ink-jet printers is presented, followed by an explanation to the conventional approaches that are commonly used in color-matching. Then, a four-color matching method combining neural network with genetic algorithm is proposed. The initial weights and thresholds of the BP neural network for RGB-to-CMY color conversion are optimized by the new genetic algorithm based on evolutionarily stable strategy. The fourth comp.nent K is generated by using GCR (Gray comp.nent Replacement) concept. The simulation experiments show that it is well behaved in both accuracy and generalization performance.
The microarray technique has been widely used in recent years since it can capture the expressions of thousands of genes in a single experiment. To meet the challenge of high volume and comp.exity of microarray data, ...
详细信息
The microarray technique has been widely used in recent years since it can capture the expressions of thousands of genes in a single experiment. To meet the challenge of high volume and comp.exity of microarray data, various data mining methods and applications have been proposed for analysing gene expressions. Although numerous clustering methods have been studied, they can not provide automation, high quality and high efficiency simultaneously for the biologists during the analysis process. In this research, we propose an integrated approach that can analyse large volume of gene expression data automatically and efficiently. Our approach integrates efficient clustering algorithms with a novel validation technique such that the quality of the discovered gene expression patterns can be evaluated on the fly. Through practical implementation and applications on real gene expression data, our approach was shown to outperform other methods in terms of efficiency, clustering quality and automation.
In today's highly comp.titive manufacturing environment, the supplier selection process becomes one of crucial activities in supply chain management. In order to select the best suppliers, it is not only necessary...
详细信息
In today's highly comp.titive manufacturing environment, the supplier selection process becomes one of crucial activities in supply chain management. In order to select the best suppliers, it is not only necessary to continuously tracking and benchmarking performance of suppliers but also to make a tradeoff between tangible and intangible factors some of which may conflict. In this paper an integration of case-based reasoning (CBR), analytical network process (ANP) and linear programming (LP) is proposed to solve the supplier selection problem.
More and more out-of-core problems that involve solving large amounts of data are researched by sci.ntists. The comp.tational grid provides a wide and scalable environment for those large scale comp.tations. A new met...
详细信息
More and more out-of-core problems that involve solving large amounts of data are researched by sci.ntists. The comp.tational grid provides a wide and scalable environment for those large scale comp.tations. A new method supporting out-of-core comp.tations on grids is presented in this paper. The framework and the data storage strategy are described, and based on that, an easy and efficient out-of-core programming interface is provided for the programmers.
In order to process video data efficiently, a video segmenting technique must be required. We propose a fast shot transition detecting algorithm directly on MPEG comp.essed video sequence. The algorithm can detect not...
详细信息
In order to process video data efficiently, a video segmenting technique must be required. We propose a fast shot transition detecting algorithm directly on MPEG comp.essed video sequence. The algorithm can detect not only abrupt transition, but also gradual transition. The comp.ting cost of the algorithm is low, because we directly use the type of macroblocks and motion vectors that MPEG comp.essed video provides. The result of experiment is rather well.
In 1996, Mambo et al. introduced the concept of proxy signature. However, a proxy signature only provides the delegated authenticity and doesn't provide the confidentiality. Chan and Wei proposed a threshold proxy...
详细信息
In 1996, Mambo et al. introduced the concept of proxy signature. However, a proxy signature only provides the delegated authenticity and doesn't provide the confidentiality. Chan and Wei proposed a threshold proxy signcryption scheme (denoted as Chan-Wei scheme), which extended the concept of proxy signature. The authors demonstrate Chan-Wei scheme does not satisfy strong unforgeablity, strong nonrepudiation and strong identifiability. Based on Chan-Wei scheme, a nonrepudiable threshold proxy signcryption scheme with known proxy agents is proposed. The proposed scheme overcomes the weaknesses of Chan-Wei scheme. comp.eteness proof and security analysis of the proposed scheme are presented. In addition, comp.red with Chan-Wei scheme, the proposed scheme exactly finds out which proxy agents present bogus secret shadow or tamper secret shadow.
This paper models the sequential states of each interaction participant and their corresponding information seeking actions with a Hidden Markov Model (HMM), and then proposes a common framework with the Influence Mod...
详细信息
This paper models the sequential states of each interaction participant and their corresponding information seeking actions with a Hidden Markov Model (HMM), and then proposes a common framework with the Influence Model to analyze the dynamic inter-influencing relationships of all participants on selecting material or seeking desired information from digital libraries. Furthermore, an incremental gradient-based algorithm is presented for the training problem of the above model. The experimental results show that authors' model and its learning algorithm can effectively characterize the influences people have on each other during online social interactions.
In this paper, a detailed experimental study of face detection algorithms based on "Skin Color" has been made. Three color spaces, RGB, YCbCr and HSI are of main concern. We have comp.red the algorithms base...
详细信息
In this paper, a detailed experimental study of face detection algorithms based on "Skin Color" has been made. Three color spaces, RGB, YCbCr and HSI are of main concern. We have comp.red the algorithms based on these color spaces and have combined them to get a new skin color based face detection algorithm which gives higher accuracy. Experimental results show that the proposed algorithm is good enough to localize a human face in an image with an accuracy of 95.18%.
In mobile telecommunications operation, radio channels are scarce resources and should be carefully assigned. One possibility is to deploy the hierarchical cellular network (HCN). We study a HCN channel assignment sch...
详细信息
In the system on a chip, some cells should be placed along a predefined coordinate within a relatively small region. This constraint comes from the requirement that the data should be ready on the common bus at the sa...
详细信息
In the system on a chip, some cells should be placed along a predefined coordinate within a relatively small region. This constraint comes from the requirement that the data should be ready on the common bus at the same time. The module placement problem is studied where some modules have the predefined coordinate alignment (PCA) constraint. The relations are given between constrained modules, from which a necessary condition is induced. A polynomial-time algorithm is developed that can guarantee that a feasible placement is always obtainable. The algorithm is implemented and tested on ami33 and ami49. The experimental results show that it is effective.
暂无评论