Fast CCD image matching is a keytechnology to achieve lunar three-dimensional reconstruction in China's lunar exploration project. In this paper, according to some available researches, a parallel CCD image match...
详细信息
Fast CCD image matching is a keytechnology to achieve lunar three-dimensional reconstruction in China's lunar exploration project. In this paper, according to some available researches, a parallel CCD image matching algorithm based on statistical model has been presented and implemented. In the algorithm, we study the load balancing problem for CCD image matching at first, and then we establish tasks decomposition method, which uses image data division. At last, we build a task scheduling strategy for CCD image matching algorithm, which not noly reduces the communication consumption, but also achieves better load balancing. Experiments show that the parallel matching algorithm for CCD image has good speedup and scalability. The algorithm is suitable for the ultra-large-scale CCD image matching.
The wide application of General Purpose Graphic Processing Units (GPGPUs) results in large manual efforts on porting and optimizing algorithms on them. However, most existing automatic ways of generating GPGPU code fa...
详细信息
More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, ...
详细信息
More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, such as swimming, flying, and walking, even when isolated from the brain and sensory inputs. If we could build up any models that have similar functions as CPGs, it will be much easier to design better locomotion for robots. In this paper, a self-training environment is designed and through genetic algorithm (GA), walking trajectories for every foot of AIBO are generated at first. With this acquired walking pattern, AIBO gets its fastest locomotion speed. Then, this walking pattern is taken as a reference to build CPGs with Hopf oscillators. By changing corresponding parameters, the frequencies and the amplitudes of CPGs' outputs can be adjusted online. The limit cycle behavior of Hopf oscillators ensures the online adjustment and the walking stability against perturbation as well. This property suggests a strong adaptive capacity to real environments for robots. At last, simulations are carried on in Webots and verify the proposed method.
This paper is concerned with the problems of H-two filtering for discrete-time Markovian jump linear systems subject to logarithmic quantization. We assume that only the output of the system is available, and therefor...
详细信息
This paper is concerned with the problems of H-two filtering for discrete-time Markovian jump linear systems subject to logarithmic quantization. We assume that only the output of the system is available, and therefore the mode information is nonaccessible. In this paper, a mode-independent quantized H-two filter is designed such that filter error system is stochastically stable. To this end, sufficient conditions for the existence of an upper bound of H-two norm are presented in terms of linear matrix inequalities. Considering uncertainty of system matrices, a robust H-two filter is designed. The proposed method is also applicable to cover the case where the transition probability matrix is not exactly known but belongs to a given polytope. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed approach.
Action recognition is a hot research topic, but the performance assessment strategies of algorithms have not had an accepted practice. In this paper, we adopt spatio-temporal features and support vector machine (SVM) ...
详细信息
Action recognition is a hot research topic, but the performance assessment strategies of algorithms have not had an accepted practice. In this paper, we adopt spatio-temporal features and support vector machine (SVM) model as our action recognition algorithm, and then well assess the effect of different assessment strategies on our action recognition algorithm in widely used public dataset KTH. Experimental results show that when different cross-experimental methods are employed, the performance fluctuation of algorithms reaches 10.5%. And when different division methods for KTH datasets are used, the performance fluctuation of algorithms gets 11.87%. Thus, according to conclusions in this paper, we can find the real difference among existing algorithms, and supply the reference for designing reasonable assessment strategy.
Recently, many efforts have been devoted to explore the integration of Internet of Things (IoT) and service-Oriented computing (SOC). These works allow the real-world devices to provide their functionality as web serv...
详细信息
Recently, many efforts have been devoted to explore the integration of Internet of Things (IoT) and service-Oriented computing (SOC). These works allow the real-world devices to provide their functionality as web services. However, two important issues, unreliable service providing and resource constraints, make the modeling and analysis of service composition in IoT a big challenge. In this paper, we propose a probabilistic approach to formally describe and analyze the reliability and cost-related properties of the service composition in IoT. First, a service composition in IoT is modeled as a finite state machine (FSM) which focuses on the functional part. Then, we extend this FSM model to a Markov Decision Process (MDP), which can specify the reliability of service operations. Furthermore, we extend MDP with cost structure, which can represent the different service quality attributes for each operation, such as energy consumption, communication cost, etc. The desirable quality properties of the service composition are specified by a probabilistic extension of temporal logic PCTL. We adopt a well-established probabilistic model checker PRISM to verify and analyze those properties of our service composition models.
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ...
详细信息
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are kept perfectly secure. However, due to viruses, worms or other break-ins allowed by operating-system holes, key exposure seems inevitable. To minimize the damage caused by key exposure in IBPS, we propose an identity-based key-insulated proxy signature (IBKIPS) scheme in the standard model, i.e. without random oracles.
In this paper a distributed weight mining algorithm is proposed based on FP-growth. As an important part of network fault management, the association rule takes effect on eliminating redundant alarms and preventing al...
详细信息
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and para-llelism is the key to continued performance scaling in modern microprocessors. In this paper, the achiev...
详细信息
With increment of personal data amount, how to allow users to efficiently re-find personal data items becomes an important research issue. According to general experience of persons, task is taken as a popular way to ...
详细信息
暂无评论