A new feature based image mosaic method is presented in this paper. Our contributions can be generalized into two aspects: an improved RANSAC homography algorithm based on the modified media flow filter, to detect wro...
详细信息
A new feature based image mosaic method is presented in this paper. Our contributions can be generalized into two aspects: an improved RANSAC homography algorithm based on the modified media flow filter, to detect wrong matches for improving the stability of the normal RANSAC homography algorithm;and a new bundle adjustment algorithm based on the distance minimization of feature matches, to eliminate the accumulated errors over a sequence for seamless mosaic. Experiments show that our mosaic method is robust.
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sens...
详细信息
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sensors, it is usually impractical to directly monitor each node or link in wireless sensor network. We consider the problem of inferring the internal link loss characteristics from passive end-to-end measurement in this paper. Specifically, the link loss performance inference during the data aggregation is considered. Under the assumptions that the link losses are mutually independent, we elaborate a bias corrected link loss Cumulant Generating Function (CGF) algorithm. The simulation results show that the internal link loss CGF can be inferred accurately comparable to the sampled internal link loss CGF. At the end of this paper, we apply the result of internal link loss CGF inference to identify the lossy link in sensor network.
In an attempt to enhance the efficiency of searching Web services across multiple sources, a discovery approach based on information retrieval technology was proposed, which was designed for multi-source web service. ...
详细信息
In an attempt to enhance the efficiency of searching Web services across multiple sources, a discovery approach based on information retrieval technology was proposed, which was designed for multi-source web service. It could not only overcome the barrier among different publication strategies, but also support integrated management of diverse service description and the semantic information. The limitations of related work were analyzed and an original service discovery framework MWSD(Multi-source Web Service Discovery) was proposed. The function of each module was introduced in detail. Those mappings between different types of service description were illustrated. Results show that MWSD is capable of crawling multiple sources and establishing unified Web services' repository. It can support the complex semantic management of Web services and be applied to the discovery of the public Web services on the Internet.
The method of population generation in Gaussian dynamic particle swarm optimization algorithm (GDPSO) is analyzed detailedly. Aiming at the problem of premature convergence of Gbest version and the slow search speed o...
详细信息
The method of population generation in Gaussian dynamic particle swarm optimization algorithm (GDPSO) is analyzed detailedly. Aiming at the problem of premature convergence of Gbest version and the slow search speed of Lbest version in original particle swarm optimization, a novel neighborhood topology structure called multi-cluster structure is proposed. In the proposed population structure, particles in one cluster share the information with each other, and clusters exchange their experiences through loose connection between particles. Thus, neighborhood topology is designed to coordinate exploration and exploitation. GDPSO, with several population topologies including the multi-cluster structure, is tested on four benchmark functions which are commonly used in the evolutionary computation. Experimental results show that the GDPSO with the proposed neighborhood topology can significantly speed up the convergence and efficiently improve the global search ability.
A new method of video object segmentation is presented in this paper, which combines temporal information, spatial information and color feature effectively, adopting effective MRF inherit descending classification me...
详细信息
A new method of video object segmentation is presented in this paper, which combines temporal information, spatial information and color feature effectively, adopting effective MRF inherit descending classification method to extract semantic video object. Firstly, making use of color feature of video frame, the spatial-temporal watershed method is used to segment the moving object in the original video sequence, and a ST-RAG (spatial temporal region adjacency graph) is built. And then a Markov random filed (MRF) model based on ST-RAG is built. The method of using multi layer inherit descending is adopted to classify region reasonably in the process of segmentation. Finally, the morphological operations are used for post processing and segmenting the interesting object. Experimental results show that the selected method has the characteristics of flexibility and high precision.
This paper presents a novel approach for replacing textures of specified regions in the input image and video using stretch-based mesh optimization. The retexturing results have the similar distortion and shading effe...
详细信息
A Time-Action-Lock (TAL) is a state of a real-time system at which neither time can progress nor an action can occur. Behzad and Kozo presented a TAL-freeness detection method based on the geometry of Timed Automata. ...
详细信息
A Time-Action-Lock (TAL) is a state of a real-time system at which neither time can progress nor an action can occur. Behzad and Kozo presented a TAL-freeness detection method based on the geometry of Timed Automata. It is realized by means of translating the problem to Rational Presburger Sentences that has its drawback of efficiency. In this paper, the authors present an algebraic approach for TAL-freeness detection, which can detect the TAL-freeness directly. Detailed correctness proofs and performance analysis are provided.
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu...
详细信息
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.
With the rapid development of SOC (Service oriented computing), the automated service composition has become an important research direction. Through automated service composition, business processes need not to be co...
With the rapid development of SOC (Service oriented computing), the automated service composition has become an important research direction. Through automated service composition, business processes need not to be constructed in advance, which helps to improve the flexibility of service composition. The current research on automated service composition is mainly based on AI techniques, and a common domain-oriented knowledge base is usually required to perform the heuristic planning. In practice, it is impossible for the knowledge base to characterize the personalized requirements of different users, so the AI-based methods can not apply to the user-centric application scenarios. In this paper, we propose PASS, a novel approach to personalized automated service composition. With PASS, both the hard-constraints represented by user's initial state, and the soft-constraints represented by user preferences can be satisfied in the process of automated service composition. Furthermore, three algorithms are designed to implement preference-aware automated service composition. In these algorithms, the Pareto dominance principle and relaxation degree are used to select the most satisfied composite service for users. Finally, comprehensive simulations are conducted to evaluate the performance and effectiveness of the proposed algorithms.
We demonstrated a simple all-normal-dispersion Yb-doped femtosecond fiber laser, which delivers a pulse with 8.9 nJ and 33 MHz. After the extracavity compression with a grating pair, the pulse was compressed to 210 fs...
详细信息
暂无评论