This study presents a new four-model based approach regarding the Ad hoc retrieval task. The approach combines dependence and relevance models with filed-based techniques and the resulted retrieval lists are processed...
详细信息
To solve the problem of seriously distortion while enlarging images via seam carving,we proposed an improved method in this ***,we enlarged the image with hierarchical interpolation model to the size of power of two t...
详细信息
To solve the problem of seriously distortion while enlarging images via seam carving,we proposed an improved method in this ***,we enlarged the image with hierarchical interpolation model to the size of power of two times of original,which is closest to target size,while applying iterative curvature-based interpolation algorithm to protected areas and nearest interpolation to non-protected *** then,some seams to the target size were avoided via seam carving *** the subjective analysis and objective evaluation,the experiment on both standard library images and spatial images showed that the proposed method gave satisfactory results.
Research in enterprise system security has largely focused on the development of theoretical models capable of demonstrating mathematically that they possess desired security properties. However, recent results confir...
详细信息
Research in enterprise system security has largely focused on the development of theoretical models capable of demonstrating mathematically that they possess desired security properties. However, recent results confirm that many of these models cannot be applied in practice because of the unpredictability of human participants' behavior in business processes. Moreover, while malicious attacks remain a significant problem, the majority of user-caused information leaks in Enterprise systems are unintentional (or have many unintentional components) and could potentially be prohibited if explicitly recognized and appropriately modeled. In this paper we argue that approaches for achieving information flow security in enterprises need to combine process and policy understandability with usability of the enforcement mechanisms. We present a modeling approach that allows security policies to be formulated in such a way that (1) they are aligned to the business processes executed in an enterprise, (2) are understandable by all relevant stakeholders, and (3) can be semi-automatically transformed into run-time enforcement mechanisms.
The common personalized searching technology can neither make full use of features of domain knowledge,nor understand the user's special needs in this *** at solving this issue,this paper studies personalized sear...
详细信息
The common personalized searching technology can neither make full use of features of domain knowledge,nor understand the user's special needs in this *** at solving this issue,this paper studies personalized searching technology combining the characteristics of *** tourism fields,this paper designs and realizes a user-based personalized searching system,and provides with its general framework and implementation of system *** tourism field knowledge database is firstly *** to the user's browsing history and personal information,this paper builds the user-interest model based on tourism areas,and then realizes the personalized information recommendation technology and information expanding *** results show that the information searching based on domain knowledge and tourism information achieves better results in recall rate,accuracy and recommend function than traditional searching engine.
Although dynamic non-dominated sorting algorithm II (DNSGA-II) is a well-known dynamic evolutionary multi-objective optimization algorithm, it lacks memory ability. For this reason, we propose a memory enhanced DNSGA-...
详细信息
When planning or controlling the system development process, a project leader needs to make decisions which take into account a number of aspects, including: availability of assets and competences, previously enacted ...
详细信息
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this ...
详细信息
This paper proposes key SaaS (software-as-a-Service) design strategies for those SaaS systems that run on top of a commercial PaaS (Platform-as-a-Service) system such as GAE (Google App Engine)[1]. Specifically, this paper proposes a model-based approach for customization, multi-tenancy architecture, scalability, and redundancy & recovery techniques for GAE. The ACDATER (Actors, Conditions, Data, Actions, Timing, Events, and Relationship) model is used for various features, and then automated code generation is used to generate code based on the model specified. Simulation can be performed to ensure correctness before deployment.
This article presents a recommender framework to provide personalised suggestions for learners taking introductory undergraduate courses. The framework utilises memory-based collaborative filtering algorithm combined ...
详细信息
This SIG examines the vexed question of evaluation of Digital Art and how lessons on evaluation can be exchanged between the arts and mainstream HCI. We start by looking at critiques of standard approaches to evaluati...
详细信息
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Larg...
详细信息
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Large bandwidth signals of optical soliton are generated by input pulse propagating within the MRRs, which can be used to form continuous wavelength or frequency with large tunable channel capacity. Therefore, distinguished discrete wavelength or frequency pulses can be generated by using localized spatial pulses via a networks communication system. Selected discrete pulses are more suitable to generate high-secured quantum codes because of the large free spectral range (FSR). Quantum codes can be generated by using a polarization control unit and a beam splitter, incorporating to the MRRs. In this work, frequency band of 10.7 MHz and 16 MHz and wavelengths of 206.9 nm, 1448 nm, 2169 nm and 2489 nm are localized and obtained which can be used for quantum codes generation applicable for secured networks communication.
暂无评论