The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The identification accuracy of dynamic loadings for the rock roadheader has significant impact on economic benefits and safety productions in coal mines. Aiming at the problems that there are difficulty regarding dynamic load real-time identification when the rock road-header is performing cutting tasks under changing loads, this paper designs software real-time identification when the rock road-header...
We applied a speech-to-text recognition (STR) and computer-aided translation (CAT) systems to support multi-lingual communications students participating in cross-cultural learning project. The participants were engaged in interactions and information exchanges in order to learn and understand cultures and traditions of their peers. Their communications were carried out in their native languages on...
There are some independent cyber security knowledge bases for different aspect now. In the internet, there is also much cyber security related content which exists in the form of text. Fusion of these cyber security related information can be a meaningful work. In this paper, we propose a framework to integrate existing cyber security knowledge base and extract cyber security related information from...
Scene recognition is an important and challenging task in computer vision. We propose an end-to-end pipeline by combing convolutional neural networks (CNNs) with explicit attention model to determine several meaningful regions of original images for scene recognition. In the proposed pipeline, the spatial transformer network is leveraged as the attention module, which can automatically learn the scales...
People drive on the road and eat in the kitchen. Can the road imply driving or the kitchen imply eating? This paper addresses such a problem by studying the relations between actions and scenes. To get effective scene representation, we use a deep convolutional neural networks (CNN) model trained from a scene-centric database to predict scene responses for videos. We employ two encoding schemes based...
Many constraint conditions should be considered in the design of the cap of pile foundation, and the work is very tedious. So it's necessary to complete the design work with the aid of the software. This paper is based on secondary development way of ObjectARX, with using the parametric approach to develop the software for designing pile foundation. By using the extended record of the graph database,...
Pedestrian detection is one of the challenging research topics in computer vision and efficient feature representation of a pedestrian attracts more and more attention. Traditional features such as Histogram of Oriented Gradients (HOG) were widely used in pedestrian detection, but because of their poor texture description ability, these feature based methods cannot achieve satisfactory pedestrian...
Subspace clustering aims to reveal the latent subspace structure underlying high dimensional data by segmenting the data into corresponding subspaces. It has found wide applications in machine learning and computer vision. Most recent works on subspace segmentation focus on subspace representation based methods, which constructs the affinity matrix from the subspace representation of data points....
More and more cloud services emerging because of increased demand, but there is significant room for improvement. We propose architecture to integrate public cloud services for reducing costs. We consider three issues: (1) The general cloud storage services are unsuitable for large and complex data. A NoSQL datastore, the most common type of database for big data, can process operational information...
Collaborative filtering recommendation is a popular recommendation algorithm in electronic commerce, but the disadvantage of cold start still exists in the reason of new coming users and items. CBR (case-based reasoning) is used to get source case in history according to the notation of target case, and the source case plays a guiding role in solving the problem of the target case. It is a useful...
Sky is one of the most significant subject matter commonly seen in outdoor photos. We propose a highly efficient sky detection algorithm. First, we detect a rough sky-ground boundary. Then, we calculate the parameters related to appearance of sky. Finally, we use these parameters to construct a hybrid probability model that indicates how possible a pixel belongs to sky. Moreover, an image processing...
Image blur is a common type of image distortion in our daily life. Though traditional image quality assessment (IQA) is increasingly drawing the attention of the research community, the uncertainness and uniqueness which exists in blur images bring unexpected difficulties. We present a simple yet effective automatic method on assessing global invariant blurred images. Different from the traditional...
This paper investigates the problem of cross-modal retrieval, where users can search results across various modalities by submitting any modality of query. Since the query and its retrieved results can be of different modalities, how to measure the content similarity between different modalities of data remains a challenge. To address this problem, we propose a joint graph regularized multi-modal...
In this paper, we present an object recognition and pose estimation framework consisting of a novel global object descriptor, so called Viewpoint oriented Color-Shape Histogram (VCSH), which combines object's color and shape information. During the phase of object modeling and feature extraction, the whole object's color point cloud model is built by registration from multi-view color point clouds...
Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently. With the goal of verifying image content authenticity, passive-blind image tampering detection is called for. More realistic open benchmark databases are also needed to assist the techniques. Recently, we collect a natural color image database...
Recognizing objectionable content draws more and more attention nowadays given the rapid proliferation of images and videos on the Internet. Although there are some investigations about violence video detection and pornographic information filtering, very few existing methods touch on the problem of violence detection in still images. However, given its potential use in violence webpage filtering,...
Framework-based1 applications are quite popularly used in current commercial applications. Framework-based applications are often controlled by XML configuration files. However, most of these frameworks are complex or not well documented, which poses a great challenge for programmers to correctly utilize them. To overcome these difficulties, we propose a new method to recommend XML configuration snippets...
In recent years, enterprises have been facing a growing number of highly customized attacks using sophisticated techniques that seek to compromise important company assets. In this paper, we propose a multi-layer deception system that provides an in depth defense against such sophisticated attacks. Specifically, based on previous knowledge and patterns of such attacks, we model the attacker as trying...
Similarity matching is one of the most important operations for data mining over time series. But previous works mainly focus on certain data. With the development of the internet of things and sensor networks, uncertain time series are emerging from various sources, which is a new challenge for data processing. In this paper, a novel similarity matching algorithm over uncertain time series is proposed...
The biggest problem in transforming C/S MMOGs (Massively Multiplayer Online Games) into web games is how to load the game resources fluently without waiting for downloading during game time. Thus we propose following methods: 1) Reduce the response time of game resource server by using a shared memory database to buffer and manage the game resources; 2) Improve game resource download speed by cutting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.