A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiva...
详细信息
Big tree is a hierarchical data model for efficiently managing large scale web resources. This paper presents a new type of hierarchical data model, which is inspired by resource space model. Also it could be thought ...
详细信息
Hand segmentation is the basis of many vision-based hand gesture applications in human computer interaction (HCI). This paper proposes a novel method of skin color weighted disparity competition to incorporate the ski...
详细信息
Traditional 1-best translation pipelines suffer a major drawback: the errors of 1- best outputs, inevitably introduced by each module, will propagate and accumulate along the pipeline. In order to alleviate this probl...
详细信息
Traditional 1-best translation pipelines suffer a major drawback: the errors of 1- best outputs, inevitably introduced by each module, will propagate and accumulate along the pipeline. In order to alleviate this problem, we use compact structures, lattice and forest, in each module instead of 1-best results. We integrate both lattice and forest into a single tree-to-string system, and explore the algorithms of lattice parsing, lattice-forest-based rule extraction and decoding. More importantly, our model takes into account all the probabilities of different steps, such as segmentation, parsing, and translation. The main advantage of our model is that we can make global decision to search for the best segmentation, parse-tree and translation in one step. Medium-scale experiments show an improvement of +0.9 BLEU points over a state-of-the-art forest-based baseline.
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi...
详细信息
Recently the mu rhythm by motor imagination has been used as a reliable EEG pattern for brain-computer interface (BCI) system. To motor-imagery-based BCI, feature extraction and classification are two critical stages....
详细信息
Recently the mu rhythm by motor imagination has been used as a reliable EEG pattern for brain-computer interface (BCI) system. To motor-imagery-based BCI, feature extraction and classification are two critical stages. This paper explores a dynamic ICA base on sliding window Infomax algorithm to analyze motor imagery EEG. The method can get a dynamic mixing matrix with the new data inputting, which is unlike the static mixing matrix in traditional ICA algorithm. And by using the feature patterns based on total energy of dynamic mixing matrix coefficients in a certain time window, the classification accuracy without training can be achieved beyond 85% for BCI competition 2003 data set Ⅲ. The results demonstrate that the method can be used for the extraction and classification of motor imagery EEG. In the present study, it suggests that the proposed algorithm may provide a valuable alternative to study motor imagery EEG for BCI applications.
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is...
详细信息
Based on illumination normalization and progressive thresholding, this paper presents a novel algorithm for automatic localization of human eyes in still images with complex background. First of all, Retinex method is used to realize normalizing of the face image. Secondly, a determination criterion of eye location is established by the priori knowledge of geometrical facial features. Thirdly, a range of threshold values that would separate eye blocks from others in a segmented face image is estimated. With the progressive increase of the threshold by an appropriate step in that range, once two eye blocks appear from the segmented image, they will be detected by the determination criterion of eye location. Finally, the 2-D correlation coefficient is used as a symmetry similarity measure to check the factuality of the two detected eyes. The experimental results demonstrate the high efficiency of the algorithm in runtime and correct localization rate.
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use case...
详细信息
Self-organizing networks (SON) for cellular systems are emerging as an important technology to reduce the cost of network deployment and maintenances. Mobility robustness optimization (MRO) is one of the main use cases of SON and has been intensively studied in 3GPP working groups. In this paper, we take the user equipment (UE) speed into account to solve the MRO problem. We propose a US-MRO algorithm, which assigns different Hysteresis parameters to UEs with different speed. The simulation results show that the success rate of Handover (HO) is improved and user experience is enhanced by the US-MRO algorithm.
In this paper, we introduced an intelligent call center platform (ICCP) for communication enterprises. The platform is based on two broad suites of technologies: Knowledge management and natural language processing. F...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an ...
详细信息
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas. That is, a polygon is divided into two parts by a line: S 1 and S 2 . Furthermore, we analyze the security and computational complexity, as well as the comparison of these two protocols. The results of analysis show that the proposed protocols are secure and efficient. We believe the two protocols will be useful in other geometric and combinatorial problems.
暂无评论