An increasing number of databases have become Web accessible through HTML form-based search interfaces, which is so-called deep Web. For full utilization of deep Web resources and improving Web intelligence, which is ...
详细信息
An increasing number of databases have become Web accessible through HTML form-based search interfaces, which is so-called deep Web. For full utilization of deep Web resources and improving Web intelligence, which is essential for many applications such as deep Web data collection and comparison shopping, they need to be extracted out and assigned meaningful labels. In this paper, we present a synchronous-annotation approach that introduce domain ontology as a global schema ordered by Web databases to the annotation process. We combine ontology, interface schema and result schema and adopt the strategy of query ontology instance to implement annotation. In order to verify the effectiveness of the method proposed in this paper, we test on a number of different areas of Web databases. The experimental results indicate that the proposed approach is more effective than existing approaches.
This paper proposed an adaptive shadows detection algorithm based on Gaussian Mixture Model to improve the performance of video object segmentation. This method takes advantage of luminance weight to model the backgro...
详细信息
This paper proposed an adaptive shadows detection algorithm based on Gaussian Mixture Model to improve the performance of video object segmentation. This method takes advantage of luminance weight to model the background of the image and obtains a primary segmentation in CIE Luv color space. In this way, it improves the real-time ability of detection. It also becomes more efficient, comparing with the existing shadow detection algorithms which often need to set the threshold manually or get them through a training process. By using the Gaussian distribution, it is able to realize an adaptive shadow detection. At same time, the authors deal with the noise or the aim points uneven distribution by using horizontal filling and vertical filling. It improves the accuracy of segmentation. The experimental results have shown that this method achieves adaptive shadows detection and has strong robustness, high segmentation accuracy.
An approximate strategy is designed for the static data management in geometric network. If all parameters is given, a constant approximation ratio is achieved. Here, we suppose that the link cost don't satisfy tr...
详细信息
An approximate strategy is designed for the static data management in geometric network. If all parameters is given, a constant approximation ratio is achieved. Here, we suppose that the link cost don't satisfy triangle inequality, but the ratio of the maximum link cost to the minimum value is known.
This paper concerns the problem of stability analysis for a class of continuous-time planar linear systems with state saturation. Both full state saturation and partial state saturation are considered. The effect of s...
详细信息
This paper concerns the problem of stability analysis for a class of continuous-time planar linear systems with state saturation. Both full state saturation and partial state saturation are considered. The effect of state saturation on stability issue is first analyzed, based on which, necessary and sufficient conditions for continuous-time planar linear system with full or partial state saturation to be global asymptotic stable are given. These conditions are easy to check numerically.
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the...
详细信息
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the paper introduced the FRete net algorithm on the basis of Rete net algorithm constituting an inference machine based on FRete matching algorithm, which could infer logical suspicious facts. Then the authors discussed and designed an intrusion detection system based on high-speed networks, and finally established a simulation and experiment platform to test the performance of IDS.
This paper studies the reverse logistics vehicle routing problem of simultaneous distribution of commodities and collection of reusable ones the same size as the initial state with a single depot and a homogeneous fle...
详细信息
This paper studies the reverse logistics vehicle routing problem of simultaneous distribution of commodities and collection of reusable ones the same size as the initial state with a single depot and a homogeneous fleet of vehicles with limited capacities and maximum distance, and constructs a mixed integer programming model. To solve this problem, an Ant Colony System (ACS) approach combining with the pheromone updating strategy of ASRank (Rank-based Version of Ant System) and MMAS (MAX-MIN Ant System) is proposed. A new heuristic factor is designed to improve the vehicle loading ability as well as the vehicle distance, and the initial vehicle load is designed to be a random value correlated to the delivery and pick-up demand of the rest customers on the path. The experimental study indicates that the approach could improve the vehicle load rate and get rid of the additional total distance caused by the fluctuating vehicle load and the limited capacity. It could obtain the satisfied solution with high convergence speed in the acceptable time.
In this paper, biomimetic pattern recognition is employed to construct double weighted elliptical neuron sequence which is used to extract basic stroke segments to cover the handwritten Chinese character image. The to...
详细信息
In this paper, biomimetic pattern recognition is employed to construct double weighted elliptical neuron sequence which is used to extract basic stroke segments to cover the handwritten Chinese character image. The topological property of the stroke segment neurons is analyzed. An image of handwritten Chinese characters is transformed into geometric figures composed by six styles of Chinese character strokes with fault tolerance. To imitate typing methods of human Chinese characters font code, the style, the number, the position, the number of joint and the crossover of stroke neurons with redundant fault tolerant shapes are counted. Data structures of characteristic knowledge of handwritten Chinese characters are built. Handwritten Chinese characters from SCUT-IRAC HCCLIB are tested and the results confirm the proposed method has the ability of recognizing handwritten Chinese characters.
The problem of roust stabilization for linear time-varying uncertain periodic descriptor systems is revisited. Based on the concept of robust stability for linear time-varying uncertain periodic descriptor systems, a ...
详细信息
The problem of roust stabilization for linear time-varying uncertain periodic descriptor systems is revisited. Based on the concept of robust stability for linear time-varying uncertain periodic descriptor systems, a necessary and sufficient condition for robust stability is put forward. The robust stabilization problem is also studied and the corresponding necessary and sufficient condition is given using the notation of dual system. The obtained matrix inequality conditions can be transformed to linear matrix inequality ones with the introduction of some free matrices, which makes the analysis and design procedure simple and reliable.
This article investigates the reverse logistics vehicle routing problem with a single depot, simultaneous distribution and collection of the goods by a homogeneous fleet of vehicles under the restrictions of maximum c...
详细信息
This article investigates the reverse logistics vehicle routing problem with a single depot, simultaneous distribution and collection of the goods by a homogeneous fleet of vehicles under the restrictions of maximum capacities and maximum distance. A mixed integer programming model is established. To solve the model, an Ant Colony System (ACS) approach combined with the pheromone updating strategy of ASRank and MMAS ant algorithm is proposed. In such approach, the vehicle residual loading capacity is introduced into the heuristic function considering the complex feature of fluctuating vehicle load. Moreover, the initial load is designed to be a random value correlated to the delivery and pick-up demands of the rest clients. The experimental study indicates that the proposed approach could improve the vehicle load rate and avoid the added total distance caused by the fluctuating load and the maximum capacity constraint. It could reach the satisfied solutions with high convergence speed in an acceptable computational time.
暂无评论