The scattering of terahertz radiation on a graphene-based nano-patch antenna is numerically analyzed. The extinction cross section of the nano-antenna supported by silicon and silicon dioxide substrates of different t...
详细信息
Sports video analysis has attracted great attention in recent years. In the past decade, numerous sports video indexing approaches have been proposed at different semantic levels. In this paper, an individual level sp...
详细信息
ISBN:
(纸本)9781467316590
Sports video analysis has attracted great attention in recent years. In the past decade, numerous sports video indexing approaches have been proposed at different semantic levels. In this paper, an individual level sports video indexing (ILSVI) scheme is proposed. The individual level refers to the indexing of a sports video on a player basis, i.e. to recognize each player in a multi-player game. Since the jersey number is always "worn" by a player as the player's identity in a game, it is feasible to recognize jersey numbers for individual level indexing in sports videos. To solve the jersey number recognition problem, a principal-axis based contour descriptor is proposed. Compared to the state-of-the-art approaches, the proposed descriptor can achieve higher recognition rate and only consume much less computation power. In addition, we developed an interactive system to realize the individual level sports video indexing (ILSVI). This interactive system includes a player detection and a jersey number detection sub-systems. The interactive system can help complete the individual level sports video indexing task. We shall use basketball game videos as the basis to develop real-world systems.
The cable-driven mechanism is usually used in robotic systems for the efficient transmission of forces or torques from actuators to the end-effector. However, the control design is challenging for these systems due to...
详细信息
With the advanced Internet technology, business applications across multiple enterprises based on Composition web services (CWS) paradigm are widely used. Since business processes among enterprises become complex, loo...
详细信息
With the advanced Internet technology, business applications across multiple enterprises based on Composition web services (CWS) paradigm are widely used. Since business processes among enterprises become complex, loosely coupled, long running and unpredictable, tasks collaborate in a peer-to-peer fashion without central control, in which task dependency is inevitable. And when a system crash occurs, some tasks of the transaction flow may be committed while others unscheduled, in this situa- tion, it is important to accurately specify the dependency between tasks in Transactional composition service (TCS), contemporary technologies usually statically specify de- pendency point and avoid implicit interaction in parallel aggregation. In this paper, we propose a task dependency analysis method based on transaction execution logs. We present the formal description of atomic Web service (WS) and discuss properties of the atomic WS such as pivot, compensability, retriability and vitalness, then analyze ex- ecution logs of transactions, specify data flow dependency and behavior dependency between tasks in TCS, behavior dependency and properties of aggregation patterns. The TCS based application of Trip reservation process (TRP) shows that it is feasible to ensure consistent execution of reliable TCS.
MatchMaker is an automated collaborative filtering system that recommends friends to people on Facebook by analyzing and matching people's online profile with the profiles of TV characters. The goal of MatchMaker ...
详细信息
MatchMaker is an automated collaborative filtering system that recommends friends to people on Facebook by analyzing and matching people's online profile with the profiles of TV characters. The goal of MatchMaker is to produce friend recommendations with rich contextual information through collaborative filtering in the existing social network. Using relationships in TV programs as a parallel comparison matrix, MatchMaker projects these relationships into reality to help people find friends whose personality and characteristics have been voted to suit them well by their social network. MatchMaker also encourages more TV content viewing by using the social network context and connections to provoke people's curiosity of TV characters whom they have been matched with in their social network.
The deadlock control and liveness-enforcement are mostly implemented based on siphons in most existing work using structural theory. Our previous work has revealed a kind of intrinsically live structures in a class of...
详细信息
ISBN:
(纸本)9783902823281
The deadlock control and liveness-enforcement are mostly implemented based on siphons in most existing work using structural theory. Our previous work has revealed a kind of intrinsically live structures in a class of generalized Petri nets called systems of simple sequential processes with weighted resources allocation (WS3PR). The liveness-enforcement is achieved by analyzing the structure including weight information and reconfiguring the initial marking of resource places without considering the initial token counts in idle process places. This work extends it to a more general class than WS 3PR. Instead of siphons, a new concept of structural objects is defined to carry weight information and reflect the circular waits of resources. The numerical relationship between initial markings of resource places and weights of arcs is investigated to yield an intrinsically live structure-based liveness-enforcing method that requires no external monitors. The work provides an insight into structures of generalized Petri nets and a new revenue to achieve the desired deadlock control. Several examples are used to illustrate the proposed method.
In this paper, neural networks based impedance control is developed for a wearable rehabilitation robot in interactions with humans and the environments. The dynamics of the robot are represented by an n-link rigid ro...
详细信息
Two novel automatic anisotropic diffusion filters without conduction parameters were proposed in this paper. In the proposed first method, initially, the gradient of the noisy image to be filtered was calculated by So...
详细信息
Two novel automatic anisotropic diffusion filters without conduction parameters were proposed in this paper. In the proposed first method, initially, the gradient of the noisy image to be filtered was calculated by Sobel operator and then the center of gravity of gradient image was used as diffusivity parameter, K and edge threshold. It was observed that the center of gravity of gradient image changed with noise. In the second approach, the complement of gradient image was directly employed as heat conductivity parameter in image filter. Consequently, the user dependency was avoided. The proposed image filter was tested with well-known test images.
This paper presents a novel depth map generation method based on geometric information. Our method divides a 2d image into two parts-the foreground and the background. Through extracting the predominant lines and vani...
详细信息
ISBN:
(纸本)9781467313742
This paper presents a novel depth map generation method based on geometric information. Our method divides a 2d image into two parts-the foreground and the background. Through extracting the predominant lines and vanishing point of the background, the background depth map is determined. Then we use this depth map as a `scalar' to measure the depth value of the foreground object. Finally, the depth map of the foreground and the background are integrated into one depth map by a depth fusion algorithm.
The threat of terrorism is a constant reminder of the significance of developing effective strategies to safeguard the population. This is particularly important in large, densely populated areas, which can often be t...
详细信息
The threat of terrorism is a constant reminder of the significance of developing effective strategies to safeguard the population. This is particularly important in large, densely populated areas, which can often be the primary targets of a terrorist attack. In such a situation, the implementation of a depopulation plan becomes very challenging to manage. This paper explores one possible method of addressing rapid evacuation of densely populated urban environments in response to a terrorist threat through an in-vehicle embedded system model. The objective of the model is to determine feasible technologies that enable mobile ad-hoc mesh communication to safely depopulate an urban area.
暂无评论