Conventional models based on crisp regions can not deal with the Direction Relations between Uncertain Regions (DRUR). Using broad boundary to represent the uncertain boundary, a novel approach is proposed based on mo...
详细信息
This paper presents two parallel semantics of constraint logic programs: multiset answer constraint semantics and game semantics, which differ entirely from the traditional semantics. When giving the first semantics, ...
详细信息
The satisfiability(SAT) problem is a core problem of artificial intelligence. Research findings in SAT are widely used in many areas. The main methods solving SAT problem are resolution principle, tableau calculus and...
详细信息
The accurate automatic recognition of cell locations is of great significance for downstream tasks in pathology. Due to the various size and distribution of different cell types, previous cell detection methods applie...
详细信息
Constraint satisfaction problems play a significant role in the field of Artificial Intelligence. Reducing the search space can improve the efficiency of solving the problems before the search of solutions. Applying i...
详细信息
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function an...
详细信息
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function and f(u) = O(u3). It is proved that for all m ∈ (0, M*] R (M* is a fixed large number), but a set of small Lebesgue measure, the above equations admit small-amplitude quasi-periodic solutions corresponding to finite dimensional invariant tori for an associated infinite dimensional dynamical system. The proof is based on an infinite dimensional KAM theory and a partial Birkhoff normal form technique.
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac...
详细信息
ISBN:
(纸本)9781601321916
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system;and use phase correlation method to obtain rotation angle, scaling size and position offset;and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copy-paste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.
There may be many groups of candidate results after the step of candidate generation in model-based diagnosis. Hwee Tou Ng proposed the Inc-Diagnose approach to further reduce the candidate results. However, the effic...
详细信息
We propose a parallel MAX-MIN Ant System (MMAS) algorithm that is suitable for an implementation on graphics processing units (GPUs). Multi ant colonies with respective parameter settings are whole offloaded to the GP...
详细信息
Particle swarm optimization (PSO) algorithm is a robust and efficient approach for solving complex real-world problems. In this paper, a modified particle swarm algorithm (IMPSO) is introduced for unconstrained global...
详细信息
暂无评论