In this study, an adaptive image segmentation algorithm based on a modified Dynamic Window-based gray-level Run-Length Coding (DW-RLC) is developed. We propose an adaptive method for determining the range which is use...
详细信息
ISBN:
(纸本)1595931082
In this study, an adaptive image segmentation algorithm based on a modified Dynamic Window-based gray-level Run-Length Coding (DW-RLC) is developed. We propose an adaptive method for determining the range which is used in the (DW-RLC) algorithm for image segmentation. First, the modes are estimated and identified from the image histogram automatically. Secondly, the adaptive range (R) is calculated using the statistics estimated from the mode distribution. Then, the actual interval for the segmentation is updated based on the seed pixel value and the adaptive range (R). The proposed adaptive algorithm can be categorized as a region growing method. The proposed method is compared with the mean shift and K-means algorithms. This method improves the DW-RLC algorithm by making it less dependent on the randomly chosen range for segmentation, hence more stable. Copyright 2006 ACM.
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ...
详细信息
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly.
Based on the analysis of the bottleneck performance for Apriori-like algorithm, an efficient algorithm for faster mining frequent itemset is proposed which is named the Classification Tree Based Association Rule (CTBA...
详细信息
Based on the analysis of the bottleneck performance for Apriori-like algorithm, an efficient algorithm for faster mining frequent itemset is proposed which is named the Classification Tree Based Association Rule (CTBAR). The CTBAR scans the database only twice. It adopts classification tree to store the data in database and utilizes all or some of the classification tree to calculate the frequent itemset, which can reduce the times to access database and decrease the comparative times during calculating the frequent itemset. CTBAR improves the efficiency of data mining by combining the two methods;reducing the time and space complexity, ensuring the correctness of the mined results. Several experiments assess the relative performance of the algorithm in comparison with the Apriori and its extended algorithm. The experiment evaluation shows that the algorithm is faster than the other two algorithms by a factor from two to eight.
In order to apply support vector machine to parallel computation setting, a parallel learning algorithm based on multiple support vector machine classifiers is proposed. The deficiencies of w-model algorithm are analy...
详细信息
In order to apply support vector machine to parallel computation setting, a parallel learning algorithm based on multiple support vector machine classifiers is proposed. The deficiencies of w-model algorithm are analyzed, Classifiers are updated by circular feedbacks to avoid the potential impact of training samples' distribution to the classifiers and improve training accuracy of classifiers during the training. The mean classification precision is taken as a threshold to select parts of classifiers which need be trained again and the performance optimization of the whole learning system is achieved. The experimental results on the UCI standard test datasets show that the proposed circular feedback strategy is effective to balance the classification performance of multiple classifiers, and the proposed algorithm has higher training and classification efficiencies compared with w-model algorithm.
We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the si...
详细信息
ISBN:
(纸本)9781581139648
We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the simulation, the Fuzzy method produces the best result. The final identification could be improved if specific features of each type of aircraft are available. To get more accurate object identification, the results from each method can be combined with the best assignment of values for each method. Copyright 2005 ACM.
Active Queue Management (AQM) is an effective method to enhance congestion control, and to achieve tradeoff between link utilization and delay. The de facto standard, Random Early Detection (RED), and most of its vari...
详细信息
Gabor filter is a widely used feature extraction method, especially in image texture analysis. The selection of optimal filter parameters is usually problematic and unclear. This study analyzes the filter design essen...
详细信息
ISBN:
(纸本)1581138709
Gabor filter is a widely used feature extraction method, especially in image texture analysis. The selection of optimal filter parameters is usually problematic and unclear. This study analyzes the filter design essentials and proposes two different methods to segment the Gabor filtered multi-channel images. The first method integrates Gabor filters with labeling algorithm for edge detection and object segmentation. The second method uses the K-means clustering with simulated annealing for image segmentation of a stack of Gabor filtered multi-channel images. Various experiments with real images demonstrate the effectiveness of these approaches. Copyright 2004 ACM.
This paper proposes a high-speed communication module for a Linux cluster file system using M-VIA. One of the purposes of a cluster file system (CFS) is to provide high I/O bandwidth by parallelizing I/O operations. I...
详细信息
In this paper, a simple and applied approach was presented, which can automatically locate pupils. On the basis of skin detection of human face, it combines such techniques as edge extraction and geometrical features ...
详细信息
ISBN:
(纸本)0780384032
In this paper, a simple and applied approach was presented, which can automatically locate pupils. On the basis of skin detection of human face, it combines such techniques as edge extraction and geometrical features to confirm the coarse eye regions with ways of gray integration projection, region combination and LAT to fix on the precise location of pupils. By using this method, one could attain the accurate localization of eyes in color images, so it is suitable for processing identification photos.
暂无评论