This paper describes a new approach for on-line multi-stroke sketch recognition. The approach is based on hidden Markov model (HMM). Sketches are modeled to HMM chains, and strokes are mapped to different HMM states. ...
详细信息
This paper describes a new approach for on-line multi-stroke sketch recognition. The approach is based on hidden Markov model (HMM). Sketches are modeled to HMM chains, and strokes are mapped to different HMM states. The proposed approach introduces a new method to determine HMM state-number, based on which an adaptive HMM sketch recognizer is constructed. A combined feature based on curvature, velocity and geometrical character of stroke for sketch recognition is also proposed to improve recognition accuracy. Finally, the experiments prove the effectiveness and efficiency of the proposed approach.
Coupled with the explosion of number of the network-oriented applications, Intrusion Detection as an increasingly popular area is attracting more and more research efforts. Although a number of algorithms have already...
详细信息
Coupled with the explosion of number of the network-oriented applications, Intrusion Detection as an increasingly popular area is attracting more and more research efforts. Although a number of algorithms have already been presented to tackle this problem, they are unable to achieve balanced detection performance for different types of intrusion and cannot respond as quickly as expected. Employing random forests algorithm (RFA) in intrusion detection, this paper devises an improved variation - IRFA and presents an IRFA based model for intrusion detection in information exchanged through network connections. The feasibility in balanced detection and the effectiveness of this approach are verified by experiments based on DARPA data sets.
Web services are emerging as a dominant paradigm for constructing and composing distributed business applications and enabling enterprise-wide interoperability. A critical factor to the overall utility of web services...
详细信息
Web services are emerging as a dominant paradigm for constructing and composing distributed business applications and enabling enterprise-wide interoperability. A critical factor to the overall utility of web services composition is a flexible services discovery mechanism. The goal of this paper is to propose an agent-based approach to web services discovery. Firstly, an agent-based framework for web services composition is presented. Next, web services QoS model and description are introduced and an algorithm of selecting services from the perspective of composition is given. Finally, web services discovery agent is designed and its implementation based on JADE platform is presented in detail.
As a new unsupervised learning technique, manifold learning has captured the attention of many researchers in the field of machine learning and cognitive sciences. The major algorithms include Isometric mapping (ISOMA...
详细信息
As a new unsupervised learning technique, manifold learning has captured the attention of many researchers in the field of machine learning and cognitive sciences. The major algorithms include Isometric mapping (ISOMAP) and Locally Linear Embedding (LLE). The approaches can be used for discovering the intrinsic dimensions of nonlinear high-dimensional data effectively and aim researchers to analyze the data better. How to quantitatively analyze the relationship between the intrinsic dimensions and the observation space, however, has fewer reports. And thus further works in manifold learning may have suffered some difficulties. The paper focuses on two kinds of manifold learning algorithms (ISOMAP, LLE), and discusses magnification factors and principal spread directions from the observation space to the intrinsic low-dimensional space. Also the corresponding algorithm is proposed. Experiments show the effectiveness and advantages of the research.
A Multimedia streams dynamic rate control algorithm based on Fuzzy adaptive PID (MFPID) has been proposed to implement multimedia streams' end sending rate on-line self-regulating and smoothing, and to track system...
详细信息
A Multimedia streams dynamic rate control algorithm based on Fuzzy adaptive PID (MFPID) has been proposed to implement multimedia streams' end sending rate on-line self-regulating and smoothing, and to track system resources in time, so that it can avoid system's regulating oscillation and guarantee system's stability. And, some work has been done to analyze adaptive session model of multimedia streams, to implement future available bandwidth estimation of IP network, to achieve PID parameters' on-line self-tuning by fuzzy controlling. Simulation validated the theoretical results of MFPID.
作者:
Ceng Xian-yiLi Shu-qinXia De-shenDepartment of Computer Science
NanJing University of Science & Technology P.R. China 210094State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P.R.ChinaComputer Science & Communication Engineering Institute of Jiangsu University. P.R. China 212013 Department of Computer Science
NanJing University of Science & Technology P.R. China 210094
A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology a...
详细信息
A good organization model of multiple mobile robot should be able to improve the efficiency of the system, reduce the complication of robot interactions, and detract the difficulty of computation. From the sociology aspect of topology, structure and organization, this paper studies the multiple mobile robot organization formation and running mechanism in the dynamic, complicated and unknown environment. It presents and describes in detail a Hierarchical-Web Recursive Organization Model (HWROM) and forming algorithm. It defines the robot society leader; robotic team leader and individual robot as the same structure by the united framework and describes the organization model by the recursive structure. The model uses task-oriented and top-down method to dynamically build and maintain structures and organization. It uses market-based techniques to assign task, form teams and allocate resources in dynamic environment. The model holds several characteristics of self-organization, dynamic, conciseness, commonness and robustness.
Web intelligence is a new research direction for researchers, which is an integration of artificial intelligence and information technology on the new platform of the Web and Internet, an enhancement or an extension o...
详细信息
Web intelligence is a new research direction for researchers, which is an integration of artificial intelligence and information technology on the new platform of the Web and Internet, an enhancement or an extension of them. Many fruits have been obtained in recent years, and many problems remain unsolved. The notion and research contents as well as the functions and technologic framework of Web intelligence are firstly discussed. Then some recent research developments that are related to the key aspects of Web intelligence, including semantic Web and ontology, Web agent, and Web mining, are deeply surveyed, and at the same time some further research stresses and trends are presented. Finally, the concept of wisdom Web that is viewed as the goal and challenge of Web intelligence is discussed.
Policies are increasingly used in the field of security management. Security policies confliction is one of the most difficult problems in this field. The shortcoming of previous methods on security policies conflicti...
详细信息
Policies are increasingly used in the field of security management. Security policies confliction is one of the most difficult problems in this field. The shortcoming of previous methods on security policies confliction detection is analyzed. Security policies are considered a kind of relation between subject and object about authority or obligation. Subjects and objects are elements in a distributed system. In researching relations among the elements in the distributed system, a conception of "field" is provided. The relations of fields can express the relations among the elements in the distributed system. A directed acycline graph model is given in order to precisely describe the relations of fields. A quantity method based on the model to detect security policy conflicts is then presented. A number of cases on security policy confliction are studied to prove the method correctness and availability. Finally, the algorithmic complexity is analyzed, which is in direct proportion to the number or square number of vertexes in the directed acycline graph. Data from experiments is also provided to support the conclusion. The way on security policy conflicts detection is extended and security policy practicability is provided.
This paper puts forward a new algorithm to generate multiresolution model of mesh. The algorithm is based on a mesh simplification method controlled by L∞, error. Edge contraction and vertex split are adopted as down...
详细信息
This paper puts forward a new algorithm to generate multiresolution model of mesh. The algorithm is based on a mesh simplification method controlled by L∞, error. Edge contraction and vertex split are adopted as downsampling and upsampling method respectively. The multiresolution model is represented as a base mesh and a list of refinement operations. Compared with former methods, the algorithm uses L∞ error to control the mesh simplification during the initial downsampling process. While constructing the multiresolution model, the algorithm decomposes the refinement operations into the modifications to the mesh and the dependency relations, thus ensures the robustness of the multiresolution model. Experiment results demonstrate the efficiency and stability of this method.
A platform-independent grid security model and several model-based security policies such as authentication and authorization are presented in this paper. The security policies include the public key infrastructure (P...
详细信息
A platform-independent grid security model and several model-based security policies such as authentication and authorization are presented in this paper. The security policies include the public key infrastructure (PKI) management model based on bridge certificate authority (CA), the authentication policy based on virtual organization and the access control policy such as delegation in grid environment. These policies can facilitate authentication among virtual organizations based on different PKI management policies, simplify security authentication in grid environment, and manage grid resources dynamically and effectively.
暂无评论