Media types in heterogeneous source are usually represented in different dimensions; this makes cross-media retrieval hard to process. In this paper, we utilize a new domain adaptation to solve Heterogeneous domain ad...
详细信息
ISBN:
(纸本)9781479921898
Media types in heterogeneous source are usually represented in different dimensions; this makes cross-media retrieval hard to process. In this paper, we utilize a new domain adaptation to solve Heterogeneous domain adaptation (HDA) problem in cross-media retrieval using Heterogeneous Feature Augmentation (HFA). First, different dimensions of features are transformed into a common subspace by learning an intermediate variable, and augmented the transformed data with their original features and ones; second, in retrieval stage, we compute the similarity and rank the query results by bag-based reranking method. Experiments on two real-world large-scale image datasets and one text document dataset were conducted; we set two search tasks in the experiment, one is from image to text, and the other is from text to image, the experiment results demonstrate the superiority of our method compared with several newly proposed cross-media retrieval methods.
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a u...
详细信息
ISBN:
(纸本)9781479947249
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service(QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location,which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is *** privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
Sunspots are dark areas with respect to their surrounding area because the temperature of sunspot areas is lower than the average temperature of the solar surface. It provides essential information for many aspects of...
详细信息
ISBN:
(纸本)9781479947249
Sunspots are dark areas with respect to their surrounding area because the temperature of sunspot areas is lower than the average temperature of the solar surface. It provides essential information for many aspects of solar physics. A sunspot is composed of umbra and penumbra. It is a prerequisite for studying solar physics and spatial atmosphere to accurately segment and extract sunspot structures. Consequently, we propose an automated detection technique for segmenting and extracting them. The detection procedure is composed of two steps:(1) segmenting and extracting sunspot umbra with morphological reconstruction;(2) detecting and segmenting sunspot penumbra with region growing. For evaluating the accuracy of the detection procedure,we used a high-resolution observation obtained by Solar Optical Telescope onboard Hinode, and other obtained with the Dutch Open Telescope to illustrate the performance. The results demonstrate that our proposed technique is significant effective and accurate, and is suitable for studying the sunspot evolution and their physical phenomena.
This paper uses data warehouse technology to complete the heating data storage,and online analytical processing(OLAP) based on data warehouse for data *** analysis of the data accumulated in Tianjin heating informat...
详细信息
ISBN:
(纸本)9781467349994
This paper uses data warehouse technology to complete the heating data storage,and online analytical processing(OLAP) based on data warehouse for data *** analysis of the data accumulated in Tianjin heating information system and the heating analysis system requirements,a centralized heating data warehouse is designed and *** on the data warehouse,the heating data cube is *** order to take full use of the heating data,a series of forms for reporting statistics generated after multidimensional data analysis operations.
Image re-targeting is recently very popular in image processing. Effective re-targeting of images should not only use geometric constraints, but consider the image content as well. It is a challenging problem to resiz...
详细信息
A fast and effective double-level segmentation method is proposed to detect and segment the concealed objects adaptively in various real-time X-ray Compton backscatter (CBS) images. The double-level segmentation metho...
详细信息
This paper defines the existing navigation and location services data and six kinds of retrieval patterns. By contrasting to the existing trajectory index methods, we propose several index algorithms of different dime...
详细信息
It is essential to ensure the connection of data transmission link between sensors or other detection devices and the Data Processing Server (DPS) to the normal working of sensor network. Communication reachability ca...
详细信息
As the number of Web services grows and the diversity increases, it is imperative to bring semantics to Web services to provide richer descriptions. However, many solutions developed in the field of semantic annotatio...
详细信息
The WSDL document is an XML-based interface that is used for describing the abstract functionality offered by a service and the concrete details of how a service can be called. It thus serves the most important factor...
详细信息
暂无评论