In this paper, a Kansei landscape image retrieval system named KIRCK is proposed, which is based on color feature and Kansei factors. Color feature is extracted in HSV color space and the similarity of color feature i...
详细信息
In this paper, a Kansei landscape image retrieval system named KIRCK is proposed, which is based on color feature and Kansei factors. Color feature is extracted in HSV color space and the similarity of color feature is estimated by color accumulation histogram intersection method. Multi-class Support Vector Machine is applied for the mapping between high-level Kansei lab.ls and low-level image characteristics. After the multi-class SVM is trained, Kansei factors of images can be lab.led automatically, and the similarity of images in Kansei space also can be estimated. Thus integrated retrieval results using color and Kansei factors can be obtained, and the experiment shows that these retrieval results are more satisfied than only using color feature or Kansei factors. Correlative feedback is also introduced to improve the performance of our color feature and Kansei factors image retrieval.
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digi...
详细信息
Self-certified public keys are proposed to eliminate the burden of verifying the public key before using. To alleviate reliance on system authority and strengthen the security of system, Chang et al propose a new digital signature schemes, no redundancy is needed to be embedded in the signed messages in this scheme. Moreover, Chang et al claimed that the schemes are still secure even - without the trustworthy system authority, and only the specified recipient can recover the message in his authentication encryption schemes. Unfortunately, In this work, we analyze the security of Chang et al scheme and show that if the system authority is trustless, the scheme is insecure, namely, the system authority can recover the message without the private key of the recipient in Chang' authentication encryption schemes. Finally, we propose an improved scheme to overcome the weakness of Chang et al scheme.
Currently the mainstream technology of SAN is SAN storage virtualization and its implementation. The switch-based storage virtualization embeds the virtualizer in the core of the storage networking fabric in an "...
详细信息
Currently the mainstream technology of SAN is SAN storage virtualization and its implementation. The switch-based storage virtualization embeds the virtualizer in the core of the storage networking fabric in an "intelligent switch" rather than an appliance or a host. This paper describes the SV-FC SAN switch's hardware and software architecture. The main aid of design and implementation the switch is to give a new way to realize FC-SAN storage virtualization. Storage virtualization modules are embedded in the switches firmware. The switch can provide simple and friendly interfaces for users to configure and manage the FC SAN.
Grid Computing receives growing attention from scientists and scholars these years, of which Grid Information Service is the highlight and one of the most difficult subjects. Grid Information Service is characterized ...
详细信息
Data Grid is one of the important research fields for Grid Computing, To improve the system efficiency, this paper puts forward the strategies of ring replication and thread replication. Compared with many other repli...
详细信息
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA s...
详细信息
ISBN:
(纸本)1581139551
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA sub key distribution scheme, each party that shares the private key must keeps C nt sub keys secretly in order to enable the whole system to reconstruct the original private key by any t out of n parties. This paper presents a scalab.e searching algorithm, which can find out the optimized sub key distribution scheme that can significantly decrease the number of sub keys that should be held by each party without weakening the system's security. Thus it can reduce the complexity of key management and related operations. Copyright 2004 ACM.
To calculate the inter-reflection between real objects and virtual ones in augmented reality, recovery of material for the real objects is necessary. In this paper, an approach is proposed to recover the material prop...
详细信息
ISBN:
(纸本)1581138849
To calculate the inter-reflection between real objects and virtual ones in augmented reality, recovery of material for the real objects is necessary. In this paper, an approach is proposed to recover the material properties from a single high dynamic range image for a homogeneous object under complex illumination conditions. By the method, we first acquire a high dynamic range image for the object, and one or a few environment maps in high dynamic range as illumination of the object. Then a simulated annealing algorithm is employed to solve the inverse rendering problem. Finally, we obtain optimal parameter values for the reflection model in approximating the material of the object. In the course of optimization, image-based lighting and ray tracing techniques are used, and as a result the inter-reflection can be calculated in convenience. In addition, the transparent and translucent properties can be also recovered.
This paper models the behavior of Ada tasks with Petri nets according to the semantics and the syntax of them, and this net is called an Ada net. Moreover our Ada net can improve the rendezvous model proposed by the *...
详细信息
ISBN:
(纸本)0769522165
This paper models the behavior of Ada tasks with Petri nets according to the semantics and the syntax of them, and this net is called an Ada net. Moreover our Ada net can improve the rendezvous model proposed by the *** as well as describing the task type. At the same time, we present the semantics and the syntax of computation tree logic with the transition relations of the Ada net's transition system, and provide an approach to model check the safety not upon the transition system, but rather directly upon the Ada net. At the end of this paper, a prototype system under this approach is implemented, and our experimental results demonstrate that the complexity of model checking with computation tree logic is polynomial.
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order...
详细信息
ISBN:
(纸本)0780384032
Probabilistic methods are widely used in intrusion detection especially in computer audit data analysis. There are many famous probabilistic algorithm such as Decision Tree, Hotelling's T2, Chi-Square, first-order and high-order Markov model. These algorithms focus on some data features to mark anomaly state. New features are introduced into these algorithms and proper combination of these features will provide excellent result. But these algorithms are used single metric generated by multi-events so as to detect intrusion by comparison with a certain threshold. Experiment shows that using per event-based metric can improve accuracy of intrusion detection but not improve complexity of algorithm. In our paper we will provide a metric vector based on algorithm to detection intrusion that is more accurate and effective than traditional ones. Also, we will provide some intrusion detection methods to our algorithm.
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existen...
详细信息
We introduce a novel intelligent system which can generate new Chinese calligraphic artwork that meets certain aesthetic requirements automatically. In the machine learning phase, parametric representations of existent calligraphic artwork are derived from input images of calligraphy. Using a six-level hierarchical representation, the acquired knowledge is organized as a small structural stroke database, which is then exploited by a constraint-based analogous reasoning component to create artwork in new styles. A set of geometric constraints is proposed and incorporated into the system for rejecting the aesthetically unacceptable results. The combination of knowledge from various input sources creates a huge space for the intelligent system to explore and produce new calligraphy.
暂无评论