Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Multi view technology is a hot spot in research of the current display, multiple viewpoints of freedom stereo display technology not only can let the viewer's feel lifelike three-dimensional effect, still can make the viewer from wearing the aid equipment trouble, which makes more and more colleges and universities, research institutes and companies engaged in multiple viewpoints freedom stereo display...
Synonyms extraction is a fundamental research, which is helpful to text mining and information retrieval. In this paper, we propose method to extract synonymy from text, the method employs spectral clustering and word2vec. First, the word2vec model is trained by a large-scale English Wikipedia corpus. Then, we extract keywords from a text and use the trained model to generate similarities among these...
Social emotion analysis of online users has become an important task for mining public opinions, which aims at detecting the readers' emotions evoked by online news articles. In this paper, we focus on building a social emotion analysis system (SEAS) for online news. The system has implemented a text data crawler for mainstream online news websites, the modules of document preprocessing, document...
A rumor is commonly defined as a statement whose true value is unverifiable. As rumor can spread misinformation around people, causing social problems such as panic, and the rapid growth of online social media has made it possible for rumors to spread more quickly, it is important to automatically identify rumors for social media. Existing methods on rumor detection always concentrate on telling rumor...
This paper studies the method of using word clouds to visualize 110 incidents data. It has been reported that word clouds have become a simple and visual appeal of the visualization method for text. Lots of data are stored in the police intelligence system without a novel visualization method. In this study, we therefore explore the possibility of using word clouds to visualize 110 incidents data...
Aiming at the identification difficulty of texture-rich veneer defect images, a new variation model based on coupling image texture-structure decomposition and edge extraction is proposed in this paper. Firstly, An advanced AAFC structure-texture decomposition model is obtained through extending the regular items of AAFC model; Secondly, using the semi-quadratic regularization method to obtain a new...
Mining bilingual parallel sentence pair from Web data is the most effective way to get large-scale of bilingual corpus. In this paper, we put forward both the set of method and the series of process for extracting parallel sentence pair from nonspecific web date source. considering 1.1 billion page as the web data input, with a sequence of steps we get several sentences pair which has 81% recall and...
The remote sensing (RS) technology was applied in ecological environment investigation, its principle and method were discussed in this context, in which ENVI software was used to process RS images. Based on above, taking as one campus as an example, its ecological environment investigation were carried out by RS technology. Results show that RS images can completely used to extract the ecological...
In this paper, we introduce a new envisioned application for speech which allows users to enter restaurant reviews orally via their mobile device, and, at a later time, update a shared and growing database of consumer-provided information about restaurants. During the intervening period, a speech recognition and NLP based system has analyzed their audio recording both to extract key descriptive phrases...
Introducing the similarity discovery algorithm based on time series into virtual throwing action recognition is a new attempt. Four key sub-patterns from the whole throwing action process were defined, and the corresponding sub-patterns discovery algorithms were designed. The similarity matching between the target time series and the template was done to implement the recognition of virtual throwing...
Many reversible watermarking algorithms have been proposed in the literature, and all of these solutions put emphasis on high embedding capacity with low distortion. In this paper, a novel reversible image watermarking method based on integer transform is presented. Through taking pixel block of arbitrary size as embedding unit, the method can provide a very high embedding capacity. For instance,...
Reversible watermarking is a special watermarking technique which allows one to extract both the hidden data and the exact original signal from the watermarked content. In this paper, a recently introduced reversible image watermarking method based on prediction-error expansion is further investigated and improved. Instead of taking the pixels with small prediction-error as embedding pixels (i.e.,...
In recent years, digital maps are used more and more widely, it plays a significant role in the national economy and defense construction, illegal duplication and distribution or forgery of the maps is also easy. Digital watermarking algorithms for vector data are an efficient method to counter such abuses of the maps. Considering the characteristic of vector geo-spatial data for digital watermarking,...
A novel images fusion method based on bidimensional empirical mode decomposition (BEMD) is proposed, aiming at solving the fusion problem of multi-focus images. BEMD is a new form of fully two-dimensional multi-scale decomposition and has superior quality in extracting salient features in multi-focus images. This paper uses BEMD to decompose the source images into their components adaptively without...
In order to apply non-grid-connected wind power to the aluminum electrolysis industry, it is necessary to describe and study characteristics of temperature field of present cell. In this paper, a thermo-electric mathematical model was built up by using ANSYS finite element analysis software, and the 3D coupled thermo-electric field of 400 kA aluminum electrolysis cell was analyzed. It is concluded...
Biometrics is an effective technology for personnel identity authentication (PIA), but unimodal biometric systems which use a single trait for authentication, will suffer from problems like noisy sensor data, nonuniversality, lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. These problems can be tackled by using multi-biometrics in the system. This paper...
The reasons of applying for teaching reform projects and the current situation are introduced in this paper, the teaching reform project pool management system is given and the operation methods with operation rules are analyzed which are helpful to improve the applied college teaching management quality.
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the original signer. Any t or more proxy signers can cooperatively sign messages on behalf of the original signer. Recently, Qian et. al. proposed a pairing-based threshold proxy signature scheme. However, we show that their...
This paper proposes a bidirectional generation method with a set of consistent bidirectional generation rules between SmartC models and codes. Based on these rules, the consistency of the bidirectional generation between SmartC models and codes is demonstrated by a case study. Extensive tests are conducted to show the performance of this bidirectional generation method. And the efforts of different...
In order to solve the problem that BLP model directly canpsilat be applied to application systems, an application system-oriented mandatory access control (ASOMAC) model extended from BLP is proposed. Combining with role and security label , this model achieves the principle of least privilege and separation of duty, and not only improve effectively the agility of mandatory access control, but also...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.