Surface model reconstruction from stereo vision is appealing to the rehabilitation industry, including the rehabilitation treatment equipment manufacturers. This article presents a systematic approach for constructing...
详细信息
Diagnosis is of great importance to wireless sensor networks due to the nature of error prone sensor nodes and unreliable wireless links. The state-of-the-art diagnostic tools focus on certain types of faults, and the...
详细信息
Diagnosis is of great importance to wireless sensor networks due to the nature of error prone sensor nodes and unreliable wireless links. The state-of-the-art diagnostic tools focus on certain types of faults, and their performances are highly correlated with the networks they work with. The network administrators feel difficult in measuring the effectiveness of their diagnosis approaches and choosing appropriate tools so as to meet the reliability demand. In this work, we introduce the D-vector to characterize the property of a diagnosis approach. The D-vector has five dimensions, namely the degree of coupling, the granularity, the overhead, the tool reliability and the network reliability, quantifying and evaluating the effectiveness of current diagnostic tools in certain applications. We employ a skyline query algorithm to find out the most effective diagnosis approaches, i.e., skyline points(SPs), from five dimensions of all potential D-vectors. The selected skyline D-vector points can further guide the design of various diagnosis approaches. In our trace-driven simulations, we design and select tailored diagnostic tools for GreenOrbs, achieving high performance with relatively low overhead.
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation...
详细信息
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation or re- trieval results. This paper presents a rigorous probabilis- tic framework to discover user preference from folkson- omy data. Furthermore, we incorporate three models into the framework with the corresponding inference methods, expectation-maximization or Gibbs sampling algorithms. The user preference is expressed through topical conditional distributions. Moreover, to demonstrate the versatility of our framework, a recommendation method is introduced to show the possible usage of our framework and evaluate the applica- bility of the engaged models. The experimental results show that, with the help of the proposed framework, the user pref- erence can be effectively discovered.
This article suggests and approach to verification of initializing sequences for sequential circuits. Binary method might be considered as providing optimistic results, as ternary - pessimistic ones. This article also...
详细信息
ISBN:
(纸本)9781634398008
This article suggests and approach to verification of initializing sequences for sequential circuits. Binary method might be considered as providing optimistic results, as ternary - pessimistic ones. This article also explains the difference between these two methods, the differences in results and why this is happening. Using ternary approach might prove useful if validation results for both methods differ greatly. Binary method appears to be more accurate at finding initializing sequences, because of reduction to states space after each of input patterns is used. This is not the case when using ternary logic testing under Verilog. To improve overall reliability of experiment results, dependency matrixes are introduced and used to gain valuable knowledge about the circuit working conditions.
In recent years, microservice architecture (MSA) has become popular. Emerging from the agile community, MSA implies a number of small, independently deployable microservices. They are characterized by low coupling, hi...
详细信息
Before autonomous driving vehicles are commercialized, they need to undergo a series of rigorous tests. This paper first proposes the general process of autonomous driving system testing, and then summarizes the resea...
详细信息
The necessity of achieving an effective balance between minimizing the losses associated with restricting human mobility and ensuring hospital capacity has gained significant attention in the aftermath of COVID-19. Re...
详细信息
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the use...
详细信息
Because of the increasing number of threats in the IoT cloud, an advanced security mechanism is needed to guard data against hacking or attacks. A user authentication mechanism is also required to authenticate the user accessing the cloud services. The conventional cryptographic algorithms used to provide security mechanisms in cloud networks are often vulnerable to various cyber-attacks and inefficient against new attacks. Therefore,developing new solutions based on different mechanisms from traditional cryptography methods is required to protect data and users' privacy from attacks. Different from the conventional cryptography method, we suggest a secure mutual authentication protocol based on the visual cryptography technique in this paper. We use visual cryptography to encrypt and decrypt the secret images. The mutual authentication is based on two secret images and *** user requests the ticket from the authentication server(AS) to obtain the permission for accessing the cloud services. Three shared secret keys are used for encrypting and decrypting the authentication process. We analyze the protocol using the Barrows-Abadi-Needham(BAN)-logic method and the results show that the protocol is robust and can protect the user against various attacks. Also, it can provide a secure mutual authentication mechanism.
Person re-identification(Re-ID) is the problem of matching a person from different cameras based on appearance. It has interesting algorithm challenges and extensive practical applications. This paper presents a weigh...
详细信息
Person re-identification(Re-ID) is the problem of matching a person from different cameras based on appearance. It has interesting algorithm challenges and extensive practical applications. This paper presents a weight-based sparse coding approach for person re-identification. First, three hypotheses are introduced to achieve a linear combination of images based on sparse coding. Then, we convert the person re-identification problem into an optimization problem with sparse constraints. To reduce the influence of abnormal residuals caused by occlusion and body variation, a weight-based sparse coding approach is proposed to achieve the optimal weights by the ordering statistics of square residuals iteratively. Experiments on various public datasets for different multi-shot modalities have shown good performance of the proposed approach compared with other state-of-the-art ones(more than 42% and 34% at rank-1 on CAVIAR4 REID and i-LIDS, respectively).
Time-frequency analysis is a successfully used tool for analyzing the local features of seismic ***,it suffers from several inevitable limitations,such as the restricted time-frequency resolution,the difficulty in sel...
详细信息
Time-frequency analysis is a successfully used tool for analyzing the local features of seismic ***,it suffers from several inevitable limitations,such as the restricted time-frequency resolution,the difficulty in selecting parameters,and the low computational *** by deep learning,we suggest a deep learning-based workflow for seismic time-frequency *** sparse S transform network(SSTNet)is first built to map the relationship between synthetic traces and sparse S transform spectra,which can be easily pre-trained by using synthetic traces and training ***,we introduce knowledge distillation(KD)based transfer learning to re-train SSTNet by using a field data set without training labels,which is named the sparse S transform network with knowledge distillation(KD-SSTNet).In this way,we can effectively calculate the sparse time-frequency spectra of field data and avoid the use of field training *** test the availability of the suggested KD-SSTNet,we apply it to field data to estimate seismic attenuation for reservoir characterization and make detailed comparisons with the traditional time-frequency analysis methods.
暂无评论