The synchronized collaborative design within heterogeneous CAD systems becomes a significant challenge because of the great difference between the modeling operations and underground data structures of different syste...
详细信息
To provide cost-effective protection for sensor networks, We introduce an immunization method where the percentage of required vaccinations for immunity are close to the optimal value of a targeted immunization scheme...
详细信息
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform ...
详细信息
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform (NSBT) domain is proposed. First, the Canny operator is utilized to detect and remove edges from the SAR image. Then the NSBT which has an optimal approximation to the edges of images and a hard thresholding rule are used to approximate the details while despeckling the edge-removed image. Finally, the removed edges are added to the reconstructed image. As the edges axe detected and protected, and the NSBT is used, the proposed algorithm reaches the state-of-the-art effect which realizes both despeckling and preserving edges and details simultaneously. Experimental results show that both the subjective visual effect and the mainly objective performance indexes of the proposed algorithm outperform that of both Bayesian wavelet shrinkage with edge detection and Bayesian least square-Gaussian scale mixture (BLS-GSM).
Tree-based statistical machine translation models have made significant progress in recent years, especially when replacing 1-best trees with packed forests. However, as the parsing accuracy usually goes down dramatic...
详细信息
VQ (Learning Vector Quantization) is kind of supervised and competitive learning artificial neural network and adopted in many domains, such as pattern categorization, products classification, mechanical detection. Th...
详细信息
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hop...
详细信息
ISBN:
(纸本)9781424435623
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hops from the source to the destination may not be the best path. Considered the remaining power and the node selfishness, we propose an improved AODV routing protocol, I-AODV in this paper. We use a new term, node status, regard the node status as a function of the remaining power and the fame and regard the node status as the basic condition for choosing the next hop in the new routing protocol.
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are working for expressing access policies in a formal way. But it is still an open problem. This paper defines a policy language, which is named as PDPL to express access policies and access control properties in PDAC model [1]. This language unifies ldquoBANrdquo logic with past- and future- time temporal logic. We give the syntax and semantics of PDPL, and provided some examples with their English equivalents. This logic language can express belief and authorization in access control model. And it can deal with delegations of decision-making directly. It is easy for us to formulate the properties of interest in distributed systems of PDAC model through PDPL. This logical language is part of a formal system, and it will be used in an automatic model checker in the future.
A DCT-domain based character detection algorithm is proposed for video stream. It utilizes the directional features of the texture in character blocks and the property that the characters in video usually distribute i...
详细信息
A DCT-domain based character detection algorithm is proposed for video stream. It utilizes the directional features of the texture in character blocks and the property that the characters in video usually distribute in row or column. The character/non-character blocks are effectively separated by a new adaptive threshold, then the noise and false text regions are further removed by morphological operation. Finally, the text regions are accurately obtained by horizontal and vertical projection. Experimental results demonstrate that the proposed approach can detect characters accurately even in video with complex background , and it is of good robustness and high practical value.
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp...
详细信息
Recent research has shown that keyword search is a friendly and potentially effective way to retrieve information of interest over relational databases. Existing work has generally focused on implementing keyword sear...
详细信息
暂无评论