Reach-avoid analysis combines the construction of safety and specific progress guarantees, and is able to formalize many important engineering problems. In this paper we study the reach-avoid verification problem of s...
详细信息
This paper tackles the problem of generating safe exit controllers for continuous-time systems described by stochastic differential equations (SDEs). The primary aim is to develop controllers that maximize the lower b...
详细信息
Detection of contextual properties is one of the primary approaches to enabling context-awareness. In order to adapt to temporal evolution of the pervasive computing environment, context-aware applications often need ...
详细信息
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, mos...
详细信息
Originated from human immune system, artificial immune system has been widely applied in the computational fields, especially for the task of anomaly detection. Although intensively investigated in the literature, most of the artificial immune systems involve the process of model pre-definition according to the specific scenarios to be coped with. The pre-definition, however, could cause the system to be unreliable and inflexible. Instead, we propose in this paper an integrated artificial immune system platform, which can automatically adapt to various types of immune models. For a particular object to be detected, the platform is able to configure the model set dynamically based on the "pressure" produced during the course of training and testing. In addition, a hybrid evaluation of multi-AIS-models is employed in the integrated platform to improve the self-adaptability of the system.
Background subtraction has been widely used as the first step in various computer vision applications. It aims at segmentation of current frame in a video sequence into background (the relatively stationary scene) and...
详细信息
Background subtraction has been widely used as the first step in various computer vision applications. It aims at segmentation of current frame in a video sequence into background (the relatively stationary scene) and foreground (hopefully including the objects of interest). Among the most difficult problems for background subtraction methods, we will focus on how to update the background model efficiently and accurately in this paper. A modified codebook based background subtraction method is presented with its model updating guided by an object tracking module. Experiments are carried out to compare the presented method with the classical MoG background model and the original codebook based background model.
Owing to the fluent and lightweight nature, sketch-based user interface is becoming increasingly significant in graphical computing. This paper presents a strategy of sketch understanding for electric circuit diagramm...
详细信息
Owing to the fluent and lightweight nature, sketch-based user interface is becoming increasingly significant in graphical computing. This paper presents a strategy of sketch understanding for electric circuit diagramming in e-learning. It can be characterized in three aspects. Firstly, the LR grammar modeling technique is adopted to represent drawing contexts and shapes. So that stroke parsing and sketch recognition can be combined. Secondly, error correction based on fuzzy logic reasoning is introduced to deal with errors caused by the ambiguity of recognition. Further provided a guide for stroke parsing based on the context. Significantly, it recognizes drawings recursively without user's explicit mediations. Experiments proved the proposed method is both effective and efficient.
In Three Gorges reservoir area of China, 3D visualization and analysis functions are widely needed in many works of geological hazard survey, inspection, pre-warning and treatment of local landslides and collapses, an...
详细信息
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ...
详细信息
With the development of Grid technology and the extension of Grid application areas, it needs to provide core infrastructure platform and the necessary functional components for large-scale resources sharing and colla...
详细信息
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag...
详细信息
暂无评论