A novel objective quality for image fusion based on structural similarity and visual attention mechanism (VAM) is presented. By giving higher weight to the salient areas in the input images, the quality measure can es...
详细信息
This report summarizes the work done at Kyoto University and the University of Melbourne for the TREC 2006 Genomics Track. The single task for this year was to retrieve passages from a biomedical document collection. ...
详细信息
This report summarizes the work done at Kyoto University and the University of Melbourne for the TREC 2006 Genomics Track. The single task for this year was to retrieve passages from a biomedical document collection. We devised a system made of two parts to deal with this problem. The first part was an existing IR system based on the vector-space model. The second part was a newly developed probabilistic word-based aspect model for identifying passages within relevant documents (or paragraphs).
It has been an important task of discovering frequent fragments as particular patterns from large sequence databases generated from a variety of applications. In general, the patterns to be discovered may partially an...
详细信息
It has been an important task of discovering frequent fragments as particular patterns from large sequence databases generated from a variety of applications. In general, the patterns to be discovered may partially and asynchronously exist in sequences, and even contain gaps. In addition, it is necessary to collect the information regarding the locations and frequencies of the patterns. How to enumerate candidate patterns for evaluation without exponentially increasing the computation is another problem. In this paper, the modified periodicity transform is proposed to meet the requirements mentioned above. Also, a distributed computing framework is implemented to perform the mining task more efficiently. Both synthetic and biological sequences are utilized to examine the approach. The experimental results demonstrate the efficiency and effectiveness the system.
Today, school students are first introduced to geom-etry and advanced mathematical concepts by plotting a graph in 2D and they struggle with 3D concepts since current technologies are either too difficult to grasp or ...
详细信息
This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f...
详细信息
Server consolidation is becoming an increasingly popular technique to manage and utilize system [1]. In server consolidation, multiple server workloads are deployed onto Virtual Machines (VMs), which then run on a sin...
详细信息
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode...
详细信息
As the Importance of Applications, Such as Ocean Sampling, Environmental Monitoring, Disaster Prevention, and Distributed Tactical Surveillance, Has Recently Grown, the Need for Underwater Communication Has Become Mor...
详细信息
ISBN:
(纸本)9789898565204
As the Importance of Applications, Such as Ocean Sampling, Environmental Monitoring, Disaster Prevention, and Distributed Tactical Surveillance, Has Recently Grown, the Need for Underwater Communication Has Become More Pronounced. unlike Terrestrial Sensor Networks, Underwater Sensor Networks (Uwsns) Have Different Characteristics Such as a Long Propagation Delay, a Narrow Bandwidth and High Packet *** the Various Challenges Posed by the Underwater Environment, a Routing Algorithm Has Been Proposed in This Paper. the Algorithm Consists of Special Features, including Three Different Types of Nodes in the Architecture Proposed, a Mathematical Formula in Order to Select the next Node to Be Used for Transmission. the Major Aim of the Algorithm Is to Select the next Node to Be Used for Successful Data Delivery, and Ensure Minimum Energy Consumption. the next Node Is Chosen With Utmost Care in Order to Increase the Probability of Successful Data Delivery. the Packet Is Transferred from the Source to the Sub-Destination by Exploiting Minimum Energy of the Nodes. the Simulation Studies for the Protocol Were Conducted using AQUA-GLOMO Network Simulator. the Protocol Was Benchmarked With DSR Routing Protocol. the Matrices That Were Considered for the Simulation Study Were Throughput, PDR, Energy Consumption and Delay and It Was Observed That Our Proposed Model Performed Better in the Underwater Environment.
This paper outlines the new Core Curriculum of the Carnegie Mellon University Master of softwareengineering Program. Unlike most MSE curricula, which typically organize their courses around aspects of a software deve...
详细信息
Nonsubsampled contourlet transform (NSCT) can provide flexible multiresolution, anisotropy, and directional expansion for images. Compared with the original contourlet transform, it is shift-invariant and can overcome...
详细信息
暂无评论