Automatic image annotation assigns semantic labels to images thus presents great potential to achieve semantic-aware image retrieval. However, existing annotation algorithms are not scalable to this emerging need, bot...
详细信息
Automatic image annotation assigns semantic labels to images thus presents great potential to achieve semantic-aware image retrieval. However, existing annotation algorithms are not scalable to this emerging need, both in terms of computational efficiency and the number of tags they can deal with. Facilitated by recent development of the large-scale image category recognition data such as ImageNet, we extrapolate from it a model for scalable image annotation and semantic-aware image retrieval, namely ObjectBook. The element in the ObjectBook, which is called an ObjectWord, is defined as a collection of discriminative image patches annotated with the corresponding objects. We take ObjectBook as a high-level semantic preserving visual vocabulary, and hence are able to easily develop efficient image annotation and inverted file indexing strategies for large-scale image collections. The proposed retrieval strategy is compared with state-of-the-art algorithms. Experimental results manifest that the ObjectBook is both discriminative and scalable for large-scale semantic-aware image retrieval.
This paper studies consensus control problems for a class of second-order multi-agent systems without relative velocity measurement. Some dynamic neighbour-based rules are adopted for the agents in the presence of ext...
详细信息
This paper studies consensus control problems for a class of second-order multi-agent systems without relative velocity measurement. Some dynamic neighbour-based rules are adopted for the agents in the presence of external disturbances. A sufficient condition is derived to make all agents achieve consensus while satisfying desired H∞ performance. Finally, numerical simulations are provided to show the effectiveness of our theoretical results.
Security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies...
详细信息
Security assessment of Thermal Power Plants (TPPs) is one of the important means to guarantee the safety of production in thermal power production enterprises. Essentially, the evaluation of power plant systems relies to a large extent on the knowledge and length of experience of the experts. Therefore in this domain Case-Based Reasoning (CBR) is introduced for the security assessment of TPPs since this methodology models expertise through experience management. Taking the management system of TPPs as breakthrough point, this paper presents a case-based approach for the security assessment decision support of TPPs (SATPP). First, this paper reviews commonly used approaches for TPPs security assessment and the current general evaluation process of TPPs security assessment. Then a framework for the Management System Security Assessment of Thermal Power Plants (MSSATPP) is constructed and an Intelligent Decision Support System for MSSATPP (IDSS-MSSATPP) is functionally designed. MSSATPP involves several key technologies and methods such as knowledge representation and case matching.
The propagation and attack of malicious codes in Peer-to-Peer networks (P2P) is getting more and more serious. The propagation of malicious code was divide into two types, passive and active propagations, and then a n...
详细信息
The propagation and attack of malicious codes in Peer-to-Peer networks (P2P) is getting more and more serious. The propagation of malicious code was divide into two types, passive and active propagations, and then a novel four-state passive propagation (4SPP) model of malicious code in P2P networks proposed. The model divides peers into four types, including susceptible peers, exposed peers, infected peers and healed peers, based on situation of peers infected by malicious codes. The differential equations showing how the numbers of peers in the various states migrating over time were also provided. The experiment results about the parameters of the model and two initial values of the number of infected peer and the number of exposed peer in different situations were presented, and the basic passive propagation law of malicious code in P2P network was obtained.
In this article, a low power consumption wireless sensor for binary gas mixtures real-time quantitative analysis is presented. This small size wireless gas sensor, which is developed based on an improved time-of-fligh...
详细信息
Nanoimprint lithography (NIL) is an important nanolithography process with low cost, high throughput and high resolution. It creates patterns by mechanical deformation of imprint resist. Fabricating gratings by NIL ca...
详细信息
This system mainly consists of the PDA control terminal which is responsible for collecting the result data, the PDA client terminal which is used for transmitting data and sending instructions to the PDA client termi...
详细信息
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and...
详细信息
Triangular patch resonators have important applications in microwave filters and antennas design. In this report, new isosceles right-angled triangular patch resonator bandpass filters with two-path coupling are devel...
详细信息
Dual-band and tri-band SIR bandpass filters with compact coupling and sizes reduction are proposed, and two paths coupling is introduced. In the new design, split ring SIR and DGS techniques are applied to not only re...
详细信息
暂无评论