Canonical views are referred to the classical three-quarter views of a 3D object, always preferred by human beings, because they are stable and able to produce more meaningful and understandable images for the viewer....
详细信息
ISBN:
(纸本)9781467348638
Canonical views are referred to the classical three-quarter views of a 3D object, always preferred by human beings, because they are stable and able to produce more meaningful and understandable images for the viewer. Unlike existing methods to measure features in the 3D space for view selection, this paper proposes to measure features on the viewing plane, taking into account the influence of feature deformation due to perspective projection on view evaluation. Meanwhile, we try to have more features perceptible instead of having preferred features displayed more in a good view, which is aimed by existing methods. As a result, we can effectively obtain canonical views with only geometry computation, without troublesome semantic computation, which are always needed in existing techniques for obtaining good views.
Binary Search Tree (BST) is an acyclic graph that is widely used to arrange the data for optimal search. In order to maintain the binary search tree in optimal shape several algorithms have been proposed. A recently p...
Binary Search Tree (BST) is an acyclic graph that is widely used to arrange the data for optimal search. In order to maintain the binary search tree in optimal shape several algorithms have been proposed. A recently proposed technique [1] applies single and double rotations to balance the binary search tree. However, due to double rotation it takes almost double time as compared to single rotation; ultimately increasing the demand for memory and processor. In this paper we propose a new technique which solves the double rotation problem in almost half of the steps of existing algorithm.
Generally speaking,sketch takes advantage in conciseness and storage *** with the cognitive features of users,sketch maybe a better choice to communicate image message,which contains the least information but sufficie...
详细信息
Generally speaking,sketch takes advantage in conciseness and storage *** with the cognitive features of users,sketch maybe a better choice to communicate image message,which contains the least information but sufficiently satisfies the general needs of users and *** the paper,we propose a novel sketch stylized method,which improves the approach of Kang et al.[1] to get rid of some abundant points and eliminate the hard edges of the sketch,and finally modify the existing algorithm to redraw the sketch to reach better visual *** method based on existing approach and our own algorithm is easy to implement,and the effect is *** order to examine the satisfaction,we design a questionnaire and invite some volunteers to evaluate the sketch generated by the integrated method,and finally reach a high evaluation score.
RC4 is a stream cipher that makes use of aninternal state table, S, which represents a permutation over Z 2 8 . GGHN is a relatively more efficient stream cipher whose design is inspired from RC4 but whose S table, ho...
详细信息
RC4 is a stream cipher that makes use of aninternal state table, S, which represents a permutation over Z 2 8 . GGHN is a relatively more efficient stream cipher whose design is inspired from RC4 but whose S table, however, does not represent a permutation over Z 2 m. In this paper, we point out one challenging aspect of the latter design principle. In particular, we assess GGHN-like algorithms with respect to weak states, in which all internal state words and output elements are even. Once GGHN is absorbed in a weak state, the least significant bit of the plaintext words will be revealed only by looking at the ciphertext. By modelling the algorithm by a Markov chain and calculating chain's absorption time, we show that the average number of steps required by these algorithms to enter this weak state can be lower than expected at first glance and hence caution should be exercised when estimating this number.
Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize milliseco...
详细信息
ISBN:
(纸本)9781467307734;9781467307758
Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize millisecond network flooding latency and sub-microsecond time synchronization accuracy, require no network state information and adapt to topology changes. However, constructive interference has a precondition to function, namely, the maximum temporal displacement Δ of concurrent packet transmissions should be less than a given hardware constrained threshold. We disclose that constructive interference based flooding suffers the scalability problem. The packet reception performances of intermediate nodes degrade significantly as the density or the size of the network increases. We theoretically show that constructive interference based flooding has a packet reception ratio (PRR) lower bound (95:4%) in the grid topology. For a general topology, we propose the spine constructive interference based flooding (SCIF) protocol. With little overhead, SCIF floods the entire network much more reliably than Glossy [1] in high density or large-scale networks. Extensive simulations illustrate that the PRR of SCIF keeps stable above 96% as the network size grows from 400 to 4000 while the PRR of Glossy is only 26% when the size of the network is 4000. We also propose to use waveform analysis to explain the root cause of constructive interference, which is mainly examined in simulations and experiments. We further derive the closed-form PRR formula and define interference gain factor (IGF) to quantitatively measure constructive interference.
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider...
详细信息
Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be in...
Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be inefficient in VANETs. In acknowledgment to the requirement for new VANET protocols addressing issues of routing, data dissemination, data sharing and security, this paper proposes a novel geographic routing technique called GROOV, which takes into account varying topographies and densities of highways as well as cities. To increase reliability, GROOV calculates transmission feasibility for each node, based on link quality (average acceleration), range weight (weightage to relative positions of nodes) and direction, instead of traditional greedy forwarding, in the selection of the next relay node. Taking volatility of critical city intersection scenarios into account, GROOV calculates new node coordinates of vehicles at intersections to make best route selections at intersections and thus, routes the data packet through the path directed at the intended recipient. This prevents the occurrence of a routing loop, thereby, decreasing delay and increasing packet delivery ratio. Simulation results show that GROOV achieves a high level of routing performance in terms of packet delivery ratio, end-to-end delay and average number of hops in both city straight road/highway and city intersection scenarios.
Aggressive MOS transistor size scaling substantially increase the probability of faults in NoC links due to manufacturing defects, process variations, and chip wire-out effects. Strategies have been proposed to tolera...
详细信息
Aggressive MOS transistor size scaling substantially increase the probability of faults in NoC links due to manufacturing defects, process variations, and chip wire-out effects. Strategies have been proposed to tolerate faulty wires by replacing them with spare ones or by partially using the defective links. However, these strategies either suffer from high area and power overheads, or significantly increase the average network latency. In this paper, we propose a novel flit serialization method, which divides the links and flits into several sections, and serializes flit sections of adjacent flits to transmit them on all available fault-free link sections to avoid the complete waste of defective links bandwidth. Experimental results indicate that our method reduces the latency overhead significantly and enables graceful performance degradation, when compared with related partially faulty link usage proposals, and saves area and power overheads by up to 29% and 43.1%, respectively, when compared with spare wire replacement methods.
Most of the neural networks in initial stage of enthusiasm, the field survived a period of frustration and disrepute. The reason for this is previous neuron doesn't do anything that conventional computers don'...
详细信息
Mining frequent itemsets from uncertain datasets is an emerging research in the field of data mining;it differs from traditional frequent itemset mining in that each item in an uncertain dataset has a probability valu...
详细信息
Mining frequent itemsets from uncertain datasets is an emerging research in the field of data mining;it differs from traditional frequent itemset mining in that each item in an uncertain dataset has a probability value associated with it. Existing algorithms in this field uses candidate generating and processing approaches to discover the frequent itemsets iteratively, but the number of candidates might be enormously huge and hence it is the bottleneck of the mining process. To reduce the number of candidates, we propose a strategy by adopting a weight value to decrease the estimated expected support of an itemset. We apply our strategy to the state of the art algorithm MBP to get a revised algorithm we call RMBP. The performance of RMBP was evaluated in comparison with MBP on sparse and dense datasets. Experimental results show that the algorithm RMBP outperforms the algorithm MBP in terms of running time and memory.
暂无评论