The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-phase is one of the characteristics of the batch process. In this paper, Density Peaks Clustering (DPC) algorithm is applied to identify the different sub-phases and transition phase of batch processes. First, the three-dimensional training data is unfolded into K time-slice two-dimensional matrices. Then, the DPC algorithm is used to find out the cluster centers and divide the process into...
A hybrid clustering approach is proposed for processing image-like data such as plots in flow cytometry. Clustering or partitioning data into relatively homogeneous and coherent subpopulations can be an effective pre-processing method to achieve data analysis tasks such as pattern recognition and classification. Our method uses a graph to model the initial manual partition of the dataset. Based on...
Cloud computing is a scale-based platform, provides several kinds flexible resources such as storage, databases and computing power, requires more virtual machines(VMs) and consumes lots of electricity resource, which is suitable to execute workflow applications. However, with the increasing scale of data centers, the energy consumption problem has become one of the major concerns in clouds. To address...
Autonomous climbing is an essential function for a climbing robot to be applied in practical high-rise work. And for autonomous climbing, perception of climbing environment and planning of climbing path are two basic issues. Truss-style environment modeling and global path planning are still open for a biped climbing robot. In this paper, RGBD-SLAM is used to model truss-style climbing environment,...
In this paper the Supervised Locally Linear Embedding (SLLE) algorithm is introduced into polarimetric SAR (PolSAR) feature dimensionality reduction (DR) and land cover classification. SLLE technique, as a supervised nonlinear manifold learning method, can obtain a low-dimensional embedding space which preserves both the local geometric property of high-dimensional data and discriminative information...
We extend in this paper the limitation arrangement principle (LAP) algorithm, which was previously proposed and analyzed for addressing information consistency of the whole network under OSPF protocol. The LAP algorithm is inspired by the permutation and combination problem, and it has been proved to be able to apply to computer network. We design the LAP routing algorithm in complex networks based...
The cuckoo search (CS) algorithm, which is a new meta-heuristic optimization algorithm, is an efficient approach to solve continuous function optimization problems. Normally, the parameters of the CS are fixed constants. This may result in affecting the algorithm efficiency. To cope with this issue, we properly tune the parameters of the CS and propose an adaptive cuckoo search (ACS) algorithm to...
Recent research has demonstrated that social media could provide valuable spatio-temporal data about users activities. However, information extraction and computation from big amount of data pose various challenges. To effectively process massive datasets, several platforms have been developed. Our previous study [20] explored Hadoop-based cloud computing for processing big amount of social media...
Model-free online object tracking is an important research topic of a wide range of applications in computer vision. A main challenge for object tracking is the model drift problem. In this paper, we proposed a multi-expert selection tracking algorithm that can not only prevent adding bad examples to object model but also can correct the effect of bad updates even if the bad examples are involved...
Although Ilizarov technique and external fixators have been popular applied in bone fractures and orthopaedic surgery currently, there are few literatures about laws of bone-remodelling after osteotomy when applied external fixation system based on Wolff's law. However, Wolff's law is one of the most basic theories in bone biomechanics and fracture healing Therefore, exploring the healing mechanism...
Betweenness centrality is a metric to measure the relative importance of vertices within a graph. The computation of betweenness centrality is based on shortest paths which requires O(n+m) space and O(mn) and O(nm+n2 log n) time on unweighted and weighted graphs, respectively. It is time-consuming to deal with large-scale graphs, which motivates us resort to distributed computing and parallel algorithms...
Clustering is a hotspot issues in the field of data mining. There is abundant digital image information in the image acquisition equipment, the image database or the Internet. Facing the large scale image information with rich semantics, it is difficult to obtain accurate information as soon as possible. Therefore, it is essential for us to study efficient image clustering algorithms, in which how...
We propose a cross-trees structure to perform the non-local cost aggregation for dense stereo matching. The cross-trees structure consists of a horizontal-tree and a vertical-tree. Compared to other spanning trees, the significant superiority of the cross-trees is that the trees' constructions are efficient and independent on any local or global property. Moreover, the trees are exactly unique. By...
The valuation of game situation was experimentally studied according to the characteristics of Einstein würfelt nicht!(EWN), and a reasonable evaluation method is obtained in this paper. In addition, this paper presents an optimized Monte Carlo algorithm based on the valuation of game. Finally, the optimized Monte Carlo algorithm played chess respectively with the Mini-Max algorithm and Monte Carlo...
Due to potential heterogeneity in criticality of sensing data, machine-to-machine (M2M) networks are required to provide multi-level connectivity to the sink for device nodes. In this paper, topology control is discussed for M2M networks consisting of two different types of device nodes, called supernodes and ordinary nodes. Supernodes are required to have k node-disjoint paths to the sink while ordinary...
In this paper, we propose a BSP-Based Support Vector Regression Machine Parallel Framework which can implement the most of distributed Support Vector Regression Machine algorithms. The major difference in these algorithms is the network topology among distributed nodes. Therefore, we adopt the Bulk Synchronous Parallel model to solve the strongly connected graph problem in exchanging support vectors...
In this paper, an effective constraint is proposed to leverage the stereo matching in early vision literature. Firstly, some particular edges are extracted to compose the new smooth constraint by categorizing the color edges into different groups. Then the optimal support windows can be established based on the proposed constraint. Finally, the disparity map would be estimated by using match propagation...
We present a novel method on dense stereo matching; both high accuracy results and a handling of occlusions can be achieved with the edge constraint we prove in this paper. Though a lot of efforts had been made to solve the problems such as occlusions and disparity discontinuities, dense stereo matching is still very challenging in the field of stereo vision. Variable window methods seem to be a good...
Chaos-based encryption appeared recently in the early 1990s as an original application of nonlinear dynamics in the chaotic regime. In this paper, an implementation of digital image encryption scheme based on the extended chaotic reported. The chaotic cryptography technique used in this paper is a key cryptography. In this algorithm, the extended chaotic sequences were generated using-rank rational...
Today, In this paper, we describe a new increment maintenance algorithm, which is “increment maintenance algorithm based on multiple delta files”. It makes the smallest result sets of data warehouse loading and maintenance as real. In addition, it adopts multiple tiers infrastructure; by using data warehouse base, it links operation model OLTP environment and DDS/OLAP environment together. In both...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.