In accordance with the researchers, students, and faculty' need to use the digital library for efficient literature investigation and knowledge learning, this paper proposes REPDL, a research-oriented e-learning p...
详细信息
In accordance with the researchers, students, and faculty' need to use the digital library for efficient literature investigation and knowledge learning, this paper proposes REPDL, a research-oriented e-learning platform based on digital library. REPDL includes the structural literature organization and reading route planning mechanism based on knowledge map, the personalized research progress management, the key information marker & sharing mechanism, and the Fine-grained multi-dimensional cooperative research network and multi-level communication mechanism. The design of REPDL is in accordance with the constructivism-based learning theory. The main target is to further integrate the massive literature resources and the communication channels of digital library, comprehensively use various advanced technologies such as data mining, artificial intelligence, machine learning, visualization technology and social networking, in order to provide the researcher-oriented professional knowledge architecture and the hierarchical literature navigation services to high-level learners, reduce the learners' cognitive load, and effectively prevent disorientation during learning. With REPDL, especially with the automatically personalized manage research progress and the key information marker interface, the literature reading can be more efficient and more satisfy personalized requirements of learners. The researcher cooperative communication network and positioning function of REPDL ensures that learners at different research phases can conduct clearer knowledge communications on multiple levels.
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM...
详细信息
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NMF), Graph regularized Non-negative Matrix Factorization (GNMF) and Locally Consistent Concept Factorization (LCCF). These methods possess respective strength and weakness. The common problem existing in these clustering algorithms is that they only use one kind of feature. However, different kinds of features complement each other and can be used to improve performance results. In this paper, in order to make use of the complementarity between different features, we propose an image representation method based on multi-features. Clustering results on several benchmark image data sets show that the proposed scheme outperforms some classical methods.
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b...
详细信息
ISBN:
(纸本)9789881404732
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also be used to access secret information of crypto chips, and thus threaten dramatically the security of the cipher keys. In this paper, we propose a secure scan DFT architecture to thwart scan-based side-channel attacks. This architecture provides the scan chain reset mechanism, and thus can prevent these attacks based on mode switching. Meanwhile, the secret key is isolated from scan chains of an advanced encryption standard (AES) design in the test mode. Therefore, it can also halt the test-mode-only scan attacks. The proposed secure scan DFT technique ensures the security without compromising the testability of original chip. Most important of all, the secure scan test is implemented with extremely low hardware overhead.
Attribute reduction is one of the key issues for data preprocess in data mining. Many heuristic attribute reduction algorithms based on discernibility matrix have been proposed for inconsistent decision tables. Howeve...
详细信息
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi...
详细信息
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of WiFi direct. In this paper, a network-coding-based video transmission scheme is proposed for such scenario. In the scheme, when a source user needs to transmit a video to others, it equally splits the original file into multiple segments. When a neighbour connects to it and requests a segment, the user will linearly generate a new segment with all the segments it buffers, and then send the re-encoded segment to other neighbours. After the neighbours receive all or part of the segments, they could become a new source and send data to their own neighbours through the technology of WiFi direct. The results show that compared with the traditional scheme, the transmission scheme based on network coding could be used to complete transmission at a higher rate.
The context of objects can provide auxiliary discrimination beyond objects. However, this effective information has not been fully explored. In this paper, we propose Tri-level Combination for Image Representation (Tr...
详细信息
The top-k dominating (TKD) query returns the k objects that dominate the maximum number of objects in a given dataset. It combines the advantages of skyline and top-k queries, and plays an important role in many decis...
详细信息
Now, the highway toll system still uses a single license plate recognition, this method has a problem of inaccurate identificationFor this kind of situation, this paper put forward to increase the appearance of the ve...
详细信息
ISBN:
(纸本)9781510828087
Now, the highway toll system still uses a single license plate recognition, this method has a problem of inaccurate identificationFor this kind of situation, this paper put forward to increase the appearance of the vehicle feature information and can improve the accuracy of recognitionIn this paper, we adopt the ORB algorithm to extract the exterior feature information of the vehicle and two-way matching、RANSAC algorithms to remove mismatching pointsAt the same time, we continue to iteration the scale parameter of the affine transformation and rotation angle at the matching point as a kind of judgment, which improves the robustness of the algorithm.
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image into a vector and then used L 1 or L 2 norm to measure the error matrix. However, in the stacking step, the structure information of the error image can be lost. Depart from the previous methods, in this paper, we propose a novel method by exploiting the low-rankness of both the data representation and each occlusion-induced error image simultaneously, by which the global structure of data together with the error images can be well captured. In order to learn more discriminative low-rank representations, we formulate our objective such that the learned representations are optimal for classification with the available supervised information and close to an ideal-code regularization term. With strong structure information preserving and discrimination capabilities, the learned robust and discriminative low-rank representation (RDLRR) works very well on face recognition problems, especially with face images corrupted by continuous occlusions. Together with a simple linear classifier, the proposed approach is shown to outperform several other state-of-the-art face recognition methods on databases with a variety of face variations.
暂无评论