We introduce a new concept of management system based on the scalable communication framework effectively working on mixture of several. complex layers including private networks. Overlay network architecture with vir...
详细信息
ISBN:
(纸本)0769524869
We introduce a new concept of management system based on the scalable communication framework effectively working on mixture of several. complex layers including private networks. Overlay network architecture with virtual IP addressing has been applied to identify nodes uniquely. Inter-node communication on different private networks is ensured by defined Complex Network Protocol (CNP). We also develop a communication middleware for the cluster management system called SArK (Scalable Architecture routing Kernel). The total elapsed time for gathering all information and its system overhead are measured The scalability test performed on the cluster of clusters which contains 100 nodes, and,shows our proposed work would be scalable in the cluster of 4,000 nodes. Therefore, our scalable communication framework would be considered as a suitable monitoring and controlling a large cluster system on mixture of several complex network layers.
The computing environment for web applications is dynamic and complex as internet is heterogeneous, distributed, multi-platform, multimedia, multilingual and cooperative wide area network. The web software itself is a...
详细信息
Segmentation of pulmonary nodules in chest radiographs is a particularly challenging task due to heavy noise and superposition of ribs,vessels,and other complicated anatomical structures in lung field. In this paper,a...
详细信息
Segmentation of pulmonary nodules in chest radiographs is a particularly challenging task due to heavy noise and superposition of ribs,vessels,and other complicated anatomical structures in lung field. In this paper,an adaptive order polynomial fitting basedraycasting algorithm is proposed for pulmonary nodule segmentation in chest radiographs. Instead of detecting nodule edge points directly,the nodule intensity profiles are first fitted by using the polynomials with adaptively determined orders. Then,the edge positions are identified through analyzing the local minimum of the fitted *** performance of the proposed algorithm was evaluated over an image database with 148 nodule cases in chest radiographs that were collected from a variety of digital radiograph modalities. The preliminary results show the proposed algorithm can obtain a high rate of successful segmentations.
This paper presents an image tracking algorithm for surveillance system, electro-optical tracking system and missile image seeker based on phase correlation and Fourier-Mallin transform. The algorithm consists of an i...
详细信息
ISBN:
(纸本)9788995003893
This paper presents an image tracking algorithm for surveillance system, electro-optical tracking system and missile image seeker based on phase correlation and Fourier-Mallin transform. The algorithm consists of an image pre-processing module, a translation estimation module using phase correlation, a fine motion estimation module applied when confidence rate comes from correlation output can not fulfill threshold value, andreference image update module. The fine motion estimation can be used for measuring shift, rotate and scale between a reference and input image based on Fourier-Mellin transform. A sub-pixel registration method is used to enhance estimation accuracy. Proposed algorithm was evaluated its accuracy androbustness using some real indoor and outdoor image sequences.
The relationship between geometry (form) and physical behavior (function) dominates many engineering activities. The lack of uniform andrigorous computational models for this relationship has resulted in a plethora o...
详细信息
Learning surfaces from neural radiance field (NerF) became a rising topic in Multi-View Stereo (MVS). recent Signeddistance Function (SdF)-based methods demonstrated their ability to reconstruct accurate 3d shapes of...
详细信息
A peer-to-peer grid computing is complicated by heterogeneous capabilities, failures, volatility, and lack of trust because it is based on desktop computers at the edge of the Internet. In order to improve the reliabi...
详细信息
An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely ...
详细信息
Multiple pattern matching architecture is critical for content inspection based network security applications, especially for high speed network or large pattern sets. This paper presents a method to optimize the pote...
详细信息
There have been rapid advances in control and automateddriving aids in today's cars, with a concomitant rise in the breadth and complexity of driver interaction. Thus there is a need for a clear, consistent, logi...
详细信息
暂无评论