Small sample space target recognition is a difficult problem in applications because the limited training samples cannot lead to satisfactory recognition accuracy. Combined with novel compression perception theory, we...
详细信息
Small sample space target recognition is a difficult problem in applications because the limited training samples cannot lead to satisfactory recognition accuracy. Combined with novel compression perception theory, we propose a new space target recognition method based on compressive sensing. This method avoids the sophisticated image preprocessing and feature extraction process. Firstly, a sparse representation dictionary is constructed according to the training samples. Secondly, the linear measurements of test samples are obtained by measurement matrix. Finally, the classification and recognition are done through solving an optimization problem. Simulation experiment results show that the proposed method has good recognition performance and stability.
The popularity of photo-sharing websites like Flickr give us a chance to observe what ordinary users do in their daily life. Particularly, Flickr allows the users to provide personalized tags when uploading photos, an...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals...
详细信息
Content sharing is one of the most significant issues of Digital Rights Management (DRM). There are many requirements of rational content sharing between different users who are not family members. But, the main goals of various sharing schemes are to solve the portability problem instead of rational content sharing between different users who are not family members. In this work, we propose an initial step toward the rational sharing between different users and present a sharing model based on proxy re-encryption. Our model supports flexible sharing mechanisms, with which the user can choose any of the purchased content to share with any legal device, and the content provider can know and limit the number of the sharing devices to achieve some novel DRM policies such as pay-per-sharing. To our best knowledge, our sharing model is the first model for the content sharing between different users' devices who are not family members using proxy re-encryption. With rational applications, our model can benefit both the user and content provider to achieve win-win development.
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit...
详细信息
There are always some noises in images because of the interferences existing in the process of getting and transmitting images. Salt and Pepper noise is one of the most important noise model. In order to remove this t...
详细信息
In order to generate novel 3D animation modellings automatically, an interactive genetic algorithm HAIGA based on C/S mode was proposed. In HAIGA, HSF synergy technology and ACIS rule were brought in. The ACIS rule ex...
详细信息
In order to generate novel 3D animation modellings automatically, an interactive genetic algorithm HAIGA based on C/S mode was proposed. In HAIGA, HSF synergy technology and ACIS rule were brought in. The ACIS rule expression was expressed by three binary trees, which were used to scale 3D entities unevenly in the x-axis, y-axis and z-axis direction separately. New rule expressions, which were used to generate new modellings by evolving automatically based on the existing 3D animation modellings , were generated by selection, crossover, mutation on binary trees. A prototype system in which 3D animation modellings could evolve automatically was developed. Experiments in the system show that the proposed method can support cooperative design effectively to generate a series of novel 3D animation modellings.
This paper presents a multi-agent cooperative system for crowd animation. It analyses related work about crowd animation first. Then, a multi-agent crowd animation system architecture is introduced, which offers a pro...
详细信息
This paper presents a multi-agent cooperative system for crowd animation. It analyses related work about crowd animation first. Then, a multi-agent crowd animation system architecture is introduced, which offers a promising framework for dynamically creating and managing agent communities in widely distributed environments. Next, a role modeling approach based on dynamic self-adaptive genetic algorithm and NURBS (Non Uniform Relational B Splines) technology is presented. Following, a group of fishes modelling example is illustrated for showing the modeling process in the system. Finally, the current work is summarised and an outlook for the future work is given.
A bivariate rational interpolation method with parameters was created which was based on function values and partial derivatives, it is called the bivariate rational interpolation with mixing conditions. This paper wi...
详细信息
A bivariate rational interpolation method with parameters was created which was based on function values and partial derivatives, it is called the bivariate rational interpolation with mixing conditions. This paper will deal with the bounded property and the point control method of the interpolating surface. It is proved that the values of the interpolating function in the interpolation region are bounded no matter what the parameters might be. Also, the approximation expressions of the interpolation are derived, it is not depends on the parameters. More important is that the value of the interpolating function at any point in the interpolating region can be modified under the condition that the interpolating data are not changed by selecting the suitable parameters, so the interpolation surface can be modified for the given interpolation data when needed in practical design.
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorab...
详细信息
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorable inter-operation in the access control of the Web Services, which are concluded from the comparison in both SOA strategic architecturesA collection of XACML policy combination algorithms and decision algorithms were discussed in the policy-based service-oriented computing, then the policy control and access control mechanism were also illustrated, and the corresponding decision model was described, at last the development of XACML was prospected.
Authorization mechanism is introduced to prevent the on-line original signer problem in this scheme. The semi-trusted third party's secret value in the proxy signature strengthens the unforgeability. The proxy sig...
详细信息
Authorization mechanism is introduced to prevent the on-line original signer problem in this scheme. The semi-trusted third party's secret value in the proxy signature strengthens the unforgeability. The proxy signer's common signature is added into the proxy signature which ensures the undeniability. And the time stamp makes it possible to revoke the proxy signer's power. What's more, the scheme needs shorter time to generate proxy signature since it is based on Schnorr signature.
暂无评论