The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image composition is a basic process in digital image editing. Its objective is to enable convenient image object copy-and-paste to generate new images which look natural and realistic. Seamless image composition systems often require users to successively choose a rough region of the inserted object and the target location for automatic which is rather tedious for using 2D input devices like mouse...
In this paper, we propose a method to recognize human behavior by combining motion history images (MHI) and non-negative matrix factorization (NMF). The MHI preserves the temporal information of a behavior by holding the temporal motion appearance. Then, NMF is applied to extract the middle-level features of the moving object. The experimental results show that the proposed scheme can achieve robust...
Community question answering (CQA) is widely used in Web information seeking. Web service selection (WSS) is often required to provide concurrent CQA services. WSS involves energy consumption of servers. However, existing techniques rarely consider energy consumption when dealing with concurrent WSS. To bridge this gap, we propose the mixed-integer optimization based green service selection (MIOGSS)...
We study how the search engine should update its reserve price in a sponsored search auction for a particular keyword given a certain number of ad links are sold. Different from a static auction where the optimal reserve price is proved to be constant, in a dynamic setting the optimal reserve price is dependent on not only advertisers' per-click values, but also the number of ad links sold. A search...
This paper defines the vulnerability of regional social and economic system. According to the principles of establishing evaluation indices, this paper attempts to construct a set of synthetic evaluation indices, including the most important causes of vulnerability produced by natural resources, population and artificial causes, and the results of vulnerability showing the economic, social and natural...
In order to enrich the culture connotation of modern landscape, we should make use of traditional art forms in modern landscape designing. Chu's Decorative Art is an important part of traditional Chinese art. Derivative form of Chu's Decorative Art is valuable for modern landscape designing. Methods of absorbing derivative form of Chu's Decorative Art in modern landscape designing mainly include applying...
In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space. However, a clever worm can develop a more intelligent scanning strategy to find target hosts. This paper presents a worm which uses the p2p-based...
This paper introduces a system that can recognize different type of paper-folding by users. The system allows users to register and use their desired paper in the interaction, and detect the folding by using Speed Up Robust Feature (SURF) algorithm. The paper also describes a paper-based tower defense game which has been developed as a proof of concept of our method. This method can be considered...
Let f be a strictly monotonic and continuous function from a connected subset S of [0, 1]. Let λ ∈ (0, 1) be given. The f-mean of two numbers a, b ∈ S is defined by a ⊗ b = f-1(λf(a) + (1 - λ)f(b)). Let Mn×n(S) be the set of all n × n matrices with all entries are in S. The max-generalized f-mean powers of A,B ∈ Mn×n(S) is defined by [A ⊗ B]ij = max1≤k≤n aik ⊗ bkj. In this paper, we consider the powers...
On the basis of analysis of the characteristics of network protocols to make students understand the concept of them and master the details of different protocols, application of task-driven method in teaching of network protocol is researched in this paper. An experiment framework is proposed based on task-driven method. The teaching task design, implement methods and comments on the tasks are discussed...
In this paper we propose an IEDL dynamic model for analyzing file diffusion in a peer-to-peer (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each peer not only shares the downloaded parts of the file, but also downloads the needed parts of the file. This behavior is similar to the spreading of epidemic diseases. We apply the well-known medical model SEIR to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.