To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was *** angle is defined and a maximum angle-based marked graph is *** marked graph feature vector is provided to each...
详细信息
To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was *** angle is defined and a maximum angle-based marked graph is *** marked graph feature vector is provided to each SIFT key point via discrete polar coordinate *** points are matched to detect the copy-paste tampering *** experimental results show that the proposed algorithm can effectively identify and detect the rotated or scaled copy-paste regions,and in comparison with the methods reported previously,it is resistant to postprocessing,such as blurring,Gaussian white noise and JPEG *** proposed algorithm performs better than the existing algorithm to dealing with scaling transformation.
Fault diagnosis of discrete-event system(DES) is important in the preventing of harmful events in the system. In an ideal situation, the system to be diagnosed is assumed to be complete; however, this assumption is ra...
详细信息
Fault diagnosis of discrete-event system(DES) is important in the preventing of harmful events in the system. In an ideal situation, the system to be diagnosed is assumed to be complete; however, this assumption is rather restrictive. In this paper, a novel approach, which uses rough set theory as a knowledge extraction tool to deal with diagnosis problems of an incomplete model, is investigated. DESs are presented as information tables and decision tables. Based on the incomplete model and observations, an algorithm called Optimizing Incomplete Model is proposed in this paper in order to obtain the repaired model. Furthermore, a necessary and sufficient condition for a system to be diagnosable is given. In ensuring the diagnosability of a system, we also propose an algorithm to minimize the observable events and reduce the cost of sensor selection.
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati...
详细信息
Integrity constraint is a formula that checks whether all necessary information has been explicitly provided. It can be added into ontology to guarantee the data-centric application. In this paper,a set of constraint ...
详细信息
Integrity constraint is a formula that checks whether all necessary information has been explicitly provided. It can be added into ontology to guarantee the data-centric application. In this paper,a set of constraint axioms called IC-mapping axioms are stated. Based on these axioms,a special ontology with integrity constraint,which is adapted to map ontology knowledge to data in relational databases,is defined. It's generated through our checking and modification. Making use of the traditional mapping approaches,it can be mapped to relational databases as a normal ontology. Unlike what in the past,a novel mapping approach named IC-based mapping is proposed in accordance with such special ontology. The detailed algorithm is put forward and compared with other existing approaches used in Semantic Web applications. The result shows that our method is advanced to the traditional approaches.
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation...
详细信息
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are act...
详细信息
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are activated by the agent when it is necessary. Sensor activation policies are the functions that determine which sensors are to be activated. One policy is considered to minimal, if any strictly less activation decided by the agent satisfies the feasibility. In this paper, a new algorithm is proposed to compute the minimal sensor activation policy. The algorithm, based on the operation of Reverse Change and the property of the Label-reached, calculates the minimal solution of sensor activation and achieves a lower complexity of computation relatively.
XML documents cluster analysis is a hot research topic. Researchers proposed a number of methods to cluster XML document collections. Boosting is successful well-known methods for improving the quality of clustering. ...
详细信息
Hidden Naive Bayes (HNB) has demonstrated remarkable progress in classification accuracy, accurate class probability estimation and ranking. Since HNB is based on one-dependence estimators to get the approximate value...
详细信息
Data compression does not only save space for data storage, but also improve its safety and efficiency during data transport. As any data can be saved in the form of an integer directly or indirectly, it is a meaningf...
详细信息
Particle Swarm Optimization with Migration (MPSO) is proposed to solve the issue that PSO will encounter unbearable time cost problems when dealing with High-dimension, Expensive and Black-box objective function tasks...
详细信息
暂无评论