With the popularization of Service-Oriented Computing (SOC) and web services technology, more and more developers have become accustomed to searching and utilizing the public web services on the Internet. In order to ...
详细信息
With the popularization of Service-Oriented Computing (SOC) and web services technology, more and more developers have become accustomed to searching and utilizing the public web services on the Internet. In order to identify, understand, and utilize needed web services efficiently, service consumers need useful descriptions of the web services. However, existing methods for services discovery could not provide enough descriptions for web services, because they usually try to get descriptions only from services’ WSDL files. But according to our investigation, currently a large number of web services do not contain enough available description information in their WSDL files. So, enriching descriptions for public web services using the information outside of WSDL files becomes a great challenge. In this paper, we propose an approach to enrich descriptions for public web services using the information captured from services’ related web pages on the Internet. Using our approach, considerable descriptions for web services could be enriched. An experimental study based on the real data acquired from the Internet has been carried out to verify the applicability of our approach.
In large-scale object tracking wireless sensor networks, multiple mobile nodes will bring large amount of communication overheads in maintaining the accuracy of localization tracking, which would possibly affect the c...
详细信息
Text based pictures called text art are often used in Web pages, email text and so on. They enrich expression in text data, but they can be noise for handling the text data. For example, they can be obstacle for text-...
详细信息
This letter focuses on making use of the new signer's unlabeled data toimprove the performance of sign language recognition (SLR) systems. First, anovel algorithm - polynomial segment model (PSM,) is introduced fo...
详细信息
The QMUL submission to IWSLT 2010 is a phrase-based statistical MT system. A multi-stack, multi-beam decoder with several features, with weights tuned on the provided development data through Minimum Error Rate Traini...
详细信息
Temperature uniformities within a wafer and from wafer to wafer have significant impact on the smallest feature size or critical dimension of integrated circuits. These are important issues with stringent specificatio...
详细信息
Accurate location of buried utilities is crucial if trenchless technologies are to fulfil their potential in urban areas, as inaccuracy adds risk to the design and hence cost. For techniques such as horizontal directi...
详细信息
ISBN:
(纸本)9781617821899
Accurate location of buried utilities is crucial if trenchless technologies are to fulfil their potential in urban areas, as inaccuracy adds risk to the design and hence cost. For techniques such as horizontal direction drilling, this increased risk could mean that new services have to be installed deeper than is really desired and this can lead to maintenance issues for this service in the future. The Mapping the Underworld: Location Phase 2 (MTU2) research project in the UK is a multi-university, multi-disciplinary project with support from 40+ partner companies and organisations. This second phase aims to produce a multi-sensor device for the improved location of buried utilities. This paper describes the latest research into the several sensor technologies that will be incorporated into the device, including ground penetrating radar, vibro-acoustics, low frequency electromagnetic and magnetic fields. It also reports on how the project is fusing the data from these sensors with current network records to produce enhanced information on the location of the buried utilities. The paper also describes the research investigating the issues of 'seeing' through the ground, and using ground condition information within a knowledge based system to aid tuning and use of the location device in the field.
This paper proposed an advanced logarithm cofactor difference operator (LogCDO) method to extract parameters of the MOS devices' post-breakdown current. The experimental results of the post breakdown current in MO...
详细信息
In this article, a recent metaheuristic method, cat swarm optimization, is introduced to find the proper clustering of data sets. Two clustering approaches based on cat swarm optimization called Cat Swarm Optimization...
详细信息
In this article, a recent metaheuristic method, cat swarm optimization, is introduced to find the proper clustering of data sets. Two clustering approaches based on cat swarm optimization called Cat Swarm Optimization Clustering (CSOC) and K-harmonic means Cat Swarm Optimization Clustering (KCSOC) are proposed. In the proposed methods, seeking mode and tracing mode are adopted to exploit and explore the solution space. In addition, K-Harmonic Means (KHM) operation is designed to refine the population and accelerate the convergence of the clustering algorithm. Experimental results on six real life data sets are given to illustrate the effectiveness of the proposed algorithms.
A novel scheme on reality-preserving image encryption is proposed in this paper. The chaos function and the linear canonical transform are employed. The unpredictability and initial sensitivity properties of chaotic s...
详细信息
A novel scheme on reality-preserving image encryption is proposed in this paper. The chaos function and the linear canonical transform are employed. The unpredictability and initial sensitivity properties of chaotic system are utilized to generate both the scrambling matrix and the masks for encryption. The image is processed in the linear canonical domain via saving half of the spectrum to construct the real encrypted image which is real-valued without data expanding. It can benefit the digital processing of images by electroniccomputers where speed of computation is important. The key space is large enough to make brute-force attacks infeasible. The robustness with respect to the blind encryption is performed. Simulation results show the validity of the proposed technique.
暂无评论