For H.264/SVC, different layers or frames have different order of precedence according to their importance on video quality and the decoding process. Network should provide more protection for high priority layers or ...
详细信息
For H.264/SVC, different layers or frames have different order of precedence according to their importance on video quality and the decoding process. Network should provide more protection for high priority layers or frames when SVC stream is transmitted over IP network. This paper proposes an active queue management algorithm based on priority dropping and PID algorithm, called PID_PD, which first drops the least important packets when network congestion arises. PID_PD implements differentiated service in IP layer to provide high quality video for end user. In addition, PID_PD does not create a side effect for the performance of control system. In this paper, we use BCC (Binomial Congestion Control) as source rate control protocol. BCC and PID_PD form a close-loop control system. By using a classic control theoretic approach to analyze the stability of the close-loop system, we present a method to decide the PID_PD parameters. Simulation shows PID_PD can protect important video data well, lower the disturbance of background flow, and decrease the packet loss rate of SVC flow.
VCA (virtual client access) based grid information integration strategy is proposed in this paper that brings forward one efficient application framework with loosely coupled architecture. It encapsulates the virtual ...
详细信息
VCA (virtual client access) based grid information integration strategy is proposed in this paper that brings forward one efficient application framework with loosely coupled architecture. It encapsulates the virtual clients that are realized based on the API of the information systems as grid services to enable the grid can access the information systems as real client. VCA mode can be combined with local access control and task management seamlessly, and solve the resource conflicts between grid and local users so as to support the information sharing and cooperation widely and efficiently. The experiment shows that VCA modes can support the information sharing and cooperation widely and efficiently.
Shape similarity measure is an important and difficult problem in computer vision and has been extensively studied for decades. In this paper, we propose a kind of shape similarity measure methods based on partition b...
详细信息
Shape similarity measure is an important and difficult problem in computer vision and has been extensively studied for decades. In this paper, we propose a kind of shape similarity measure methods based on partition block statistic According to the difference of partition methods, we extend the idea into eight shape similarity measure methods. Zernike moments and Hu moments methods are also included for performance comparison. Shape retrieval experiments have been conducted on the MPEG-7 Core Experiment CE-Shape-1 database of 1400 images which illustrate the performance of the ten algorithms.
As an information carrier in trusted computing platform, the security issues about disk storage directly effected system security, dependability and data confidentiality. Therefore, introduced concept of trusted stora...
详细信息
As an information carrier in trusted computing platform, the security issues about disk storage directly effected system security, dependability and data confidentiality. Therefore, introduced concept of trusted storage (TS), and advanced implements about TS through analyzing several access scenarios in practice, and two examples were given to illustrate the application and effect of TS in trusted computing platform. Deep analysis and comparison show that using TS can help to extend trust chain of platform to peripherals to analyze the security risk of different operation environment. Moreover, TS can enhance communication protocol of storage device to improve security of data flow.
Through comprehensively utilizing color spectrum, texture and shape feature of the remote sensing images, a novel method of image classification is presented based on the fractal theory and ridgelet neural network. Th...
详细信息
Through comprehensively utilizing color spectrum, texture and shape feature of the remote sensing images, a novel method of image classification is presented based on the fractal theory and ridgelet neural network. The blue, green and red band spectrums is used as three-band-spectral characteristics, the DBC dimension and multi-fractal dimension calculated by fractal theory as two texture characteristics, the average unchanged moment as one shape feature, and the ridgelet neural network with a strong ability to identify the direction of curve is used as classifier in the proposed method. The experimental results indicated that the method used in color image classification has a high accurate rate and a strong antinoise ability.
This paper extended the set-covering model for single-skill call centers, proposed by Dantzig, to handle multi-skill cases. First is solves the staffing level of each period for each skill, using the classical formula...
详细信息
This paper extended the set-covering model for single-skill call centers, proposed by Dantzig, to handle multi-skill cases. First is solves the staffing level of each period for each skill, using the classical formulas in queueing system theory;second, it decomposes a multi-skill agent to a combination of single-skill agents in every period;and then it models the shift scheduling problem in a linear programming framework. The new model makes the most use of the flexibility of multi-skill agents. The experiments show that by the proposed model, solutions of high performance can be found stably in a short period of time, which are acceptable in practice. The solutions provide informative guidance for overall planning of the call center. The solutions also provide a new way to deal with the call routing problem.
A major unsolved problem in human-like agent is the construction and application of realistic human facial expression models. Human-like agents should interact with human by recognizing human facial expression and syn...
详细信息
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this pro...
详细信息
Based on El Gamal homomorphic encryption, a protocol of secure multi-party multi-data ranking problem was proposed. The problem extended millionaires' problem. Furthermore, the correctness and security of this protocol were shown in semi-honest model, using the definition of secure multi-party computation. The solution of secure multi-party multi-data ranking problem can form a fundamental basis of new-style electronic transaction, such as private biding and auction, secret online transaction and so on.
In many cases, the topology of communcation systems can be abstracted and represented as graph. Graph theories and algorithms are useful in these situations. In this paper, we introduced an algorithm to enumerate all ...
详细信息
Based on the newly appeared image editing and image processing techniques, a novel interactive, computer-assisted system is proposed for facial synthesis. This paper presents the architecture of this facial synthesis ...
详细信息
ISBN:
(纸本)3540334238
Based on the newly appeared image editing and image processing techniques, a novel interactive, computer-assisted system is proposed for facial synthesis. This paper presents the architecture of this facial synthesis system and gives a detailed description of the four key modules. The techniques used in these modules are also particularized. First, graph cut algorithm is used to automatically select region. Then gradient domain fusion is used to get better result. Finally, k-means method is used to improve efficiency. The experimental results show that our experimental facial synthesis system can produce visually good synthesized face images.
暂无评论