We introduce the concept of Complementary formula(COMF), which is a new and non-equivalent way for knowledge compilation(KC). Based on the Hyper extension rule(HER) which is an expansion of Extension rule(ER), we desi...
详细信息
We introduce the concept of Complementary formula(COMF), which is a new and non-equivalent way for knowledge compilation(KC). Based on the Hyper extension rule(HER) which is an expansion of Extension rule(ER), we design a compilation algorithm which can formula compile each Conjunctive normal form(CNF)formula to complementary Fully complementary connected diagram(c-FCCD), named as C2C(CNF formula to cFCCD). Theoretically, c-FCCD is a kind of complementary formulae of the input formulae and can support all queries and partial transformations in KC map. Experimentally,C2C is competitive with the EPCCL compilers KCER,C2E, UKCHER, DKCHER and IKCHER.
To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was *** angle is defined and a maximum angle-based marked graph is *** marked graph feature vector is provided to each...
详细信息
To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was *** angle is defined and a maximum angle-based marked graph is *** marked graph feature vector is provided to each SIFT key point via discrete polar coordinate *** points are matched to detect the copy-paste tampering *** experimental results show that the proposed algorithm can effectively identify and detect the rotated or scaled copy-paste regions,and in comparison with the methods reported previously,it is resistant to postprocessing,such as blurring,Gaussian white noise and JPEG *** proposed algorithm performs better than the existing algorithm to dealing with scaling transformation.
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati...
详细信息
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are act...
详细信息
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are activated by the agent when it is necessary. Sensor activation policies are the functions that determine which sensors are to be activated. One policy is considered to minimal, if any strictly less activation decided by the agent satisfies the feasibility. In this paper, a new algorithm is proposed to compute the minimal sensor activation policy. The algorithm, based on the operation of Reverse Change and the property of the Label-reached, calculates the minimal solution of sensor activation and achieves a lower complexity of computation relatively.
The low-altitude economy (LAE), driven by unmanned aerial vehicles (UAVs) and other aircraft, has revolutionized fields such as transportation, agriculture, and environmental monitoring. In the upcoming six-generation...
详细信息
This paper deals with a novel local arc length estimator for curves in gray-scale *** method first estimates a cubic spline curve fit for the boundary points using the gray-level information of the nearby pixels,and t...
详细信息
This paper deals with a novel local arc length estimator for curves in gray-scale *** method first estimates a cubic spline curve fit for the boundary points using the gray-level information of the nearby pixels,and then computes the sum of the spline segments’*** this model,the second derivatives and y coordinates at the knots are required in the computation;the spline polynomial coefficients need not be computed *** provide the algorithm pseudo code for estimation and preprocessing,both taking linear *** shows that the proposed model gains a smaller relative error than other state-of-the-art methods.
Data compression does not only save space for data storage, but also improve its safety and efficiency during data transport. As any data can be saved in the form of an integer directly or indirectly, it is a meaningf...
详细信息
XML documents cluster analysis is a hot research topic. Researchers proposed a number of methods to cluster XML document collections. Boosting is successful well-known methods for improving the quality of clustering. ...
详细信息
Hidden Naive Bayes (HNB) has demonstrated remarkable progress in classification accuracy, accurate class probability estimation and ranking. Since HNB is based on one-dependence estimators to get the approximate value...
详细信息
Diagnosability is an important property in the field of fault diagnosis. In this paper, a novel approach based on logical formula is proposed to verify diagnosability of Discrete event systems(DESs). CNFFSM is defined...
详细信息
Diagnosability is an important property in the field of fault diagnosis. In this paper, a novel approach based on logical formula is proposed to verify diagnosability of Discrete event systems(DESs). CNFFSM is defined to represent a new model for DES. Each transition in DES can be described as a clause. According to CNF-FSM, we construct a CNF-diagnoser. Based on the resolution principle and CNF-diagnoser, an algorithm is presented to test whether the failure events can be detected or not in a finite number of observable *** algorithm can be applied in both off-line diagnosis and on-line diagnosis. Experimental results show that our algorithm can solve the diagnosability problem efficiently.
暂无评论