The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visual context is fundamental to understand human actions in videos. However, to efficiently employ temporal context information presents an enormous challenge to this area. Two main problems are long-standing: (1) video frames are redundant while discriminative information is sparse; (2) large amount of interference information is mixed in frame sequences. These factors results in redundant computation...
In the modern social, with the enhancement of informatization degree of every industry, a great deal of complicated data were produced and accumulated. These big data will highlight the important value with the function of data mining technique. The paper discourses the five aspects in which data mining of big data serviced finance industry. This also directs the work direction in future.
OLAP query is an efficient way to gain quick insight into big data. Spark is a fast and general engine for big data processing, which supports interactive OLAP queries. Nevertheless, as a general engine, there are many parameters that affect the performance of the Spark, and thus it is necessary to study the appropriate setting in order to gain better performance on a specific scenario. In this paper,...
We propose a novel method on stereo matching based on the Global Edge Constraint (GEC) and Graph Cuts. Firstly, the GEC composed of particular image edges is employed to generate the initial disparity maps. And then the reliable disparity maps consistent with the observed data are extracted to construct the data term of the energy function. Finally, we incorporate the GEC as a soft constraint into...
The impact of navigation satellite ephemeris error on satellite common-view time transfer was analyzed. The impact varies depending on the angle in view of a satellite relative to a user (elevation) and the baseline distance between 2 users. Some extents of the impact were figured out for several elevations and different baseline. As an example, results from several common-view time transfer links...
A browser behavior monitoring method on the client/server structure was proposed. The method can be used to monitor and manage the behavior of the users on the Internet. A Web browser component of Internet Explorer was embedded with automatic object linking and embedding technology. Through the interface of the Web browser component, Web data records are accessed and written into files using the format...
This paper investigates the traffic flow time series observed on the Beijing second ring road over a period of about 27 days, from 0:00 a.m. on 12/6/2006 to 16:00 p.m. on 1/1/2007. With the aid of the multifractal detrended fluctuation analysis (MF-DFA) method, the multifractality of the traffic flow series is shown in this paper. Furthermore, the multifractal spectrum is employed in studying the...
Feature select ion is an important problem in the fields of machine learning and pat tern recognition. Data stream data classification with high dimensional and sparse, and the dimension of the need for compression, feature selection methods suitable for data stream classification study of very value of this area is currently a lack of in-depth study. This paper summarizes the current data flow classification...
In this paper, we present a method for digital image stabilization based on Fourier-Mellin transform and phase correlation. We acquire the rotating angle and scaling factor firstly by phase correlation between Fourier-Mellin transform images of the reference and observed images. After rotating and scaling the observed image, implement the phase correlation again to compute the spacial translation...
This paper presents a novel approach of using stereovision or pseudo-stereovision to generate touch screen experience. A pair of digital cameras or a set of a digital camera and a mirror is mounted at the corners of a computer display. Algorithms are presented to generate the positions of the pointers when they are close to the screen. The paper also proposes to use positions, velocities and accelerations...
Visual simultaneous localization and mapping (SLAM) implementations must use feature extraction to reduce the dimensionality of image input, yet no comparison of feature extractors exists in the context of visual SLAM. This paper presents both a method for comparison of visual SLAM performance using several different feature extractors and the first experimental study using this method. Possible evaluation...
There are lots of negative sentences in both Japanese and Chinese, which are varing from meanings and phrasings. Especially the negative sentences always express complex relationships in Chinese language. So it is easy to make ambiguity when translating Japanese into Chinese. At present, it's very common that the translation softwares sold on the market make errors due to wrong translation of the...
Maximum entropy thresholding method is a common image segmentation technology, several optimization algorithms are proposed based on maximum entropy objective function, these algorithms use subtraction instead of logarithm and multiplication and which are used in image segmentation. But for sparse histogram images, the segmentation based on the existing optimize methods is ineffective. In this paper,...
In this paper, we present a new automatic video object segmentation algorithm. The process of the algorithm can be divided into three parts: motion detection, spatial segmentation and object tracking, which integrates the spatial and temporal information of the video. The algorithm can extract the object of the video automatically. It is also applicable to videos with faster moving object and complex...
Motif pairs can provide insight on how protein-protein interactions are encoded. Their discovery requires laborious and expensive biological experiments. Recently, Tan et al. proposed a computational approach to find motif pairs in the sequences of interacting proteins. However, their approach suffers from two drawbacks. The heuristic used in their approach is not accurate and may lead to a result...
As a complex engineering problem, the hybrid layout design with behavioural constraints is difficult to resolve by using conventional approaches. The challenges stem from three aspects: computational complexity, engineering complexity, and engineering practicability. This paper addresses the major issue in establishing three-dimensional layout models to support optimization calculation and constructing...
In this paper, a global algorithm based on graph cuts theory is proposed to solve the sparse stereo matching problem. The sparse feature points are extracted by the Harris corner detector. The matching problem is transformed into a labeling problem in the sparse graph which can be solved by energy minimization. In this algorithm, the graph is constructed by sparse feature points instead of pixels,...
While reputation systems have already been applied into the field of anti-spam, they still have some shortcomings,in terms of reputation database scale and vulnerable to be evaded by the adverse users. To solve these problems,we present a novel reputation system named IPGroupRep.The performance of this system is evaluated on some real world dataset, and compared to the existing reputation systems...
Semiconductor manufacturing is an industry with high cost. Improvement of production efficiency is always an important goal for manufacturers. Run-to-run control has been widely used in batch manufacturing processes to reduce variations. Threaded EWMA run-to-run control is an important stable control scheme. In this paper mixed products are manufactured in cycles. However, the process outputs will...
A classification method of software failure modes based on software IPO process is presented. And then two database called general failure modes database (GFMD) and special failure modes database (SFMD) are proposed based on this classification method. Furthermore, a new approach of software FMEA which is based on GFMD and SFMD is presented. This approach which makes the analysis process of FMEA more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.