4,522 results
Search Results
52. Embedded Design of 3D Image Intelligent Display System Based on Virtual Reality Technology.
- Author
-
Li, Liang
- Subjects
THREE-dimensional imaging ,DISPLAY systems ,DIGITAL image processing ,VIRTUAL reality ,COMPUTER engineering ,COMPUTER science ,INTELLIGENT transportation systems ,HEAD-mounted displays - Abstract
The previous 3D image intelligent display system is large in size and poor in accuracy, and the display effect and synchronization cannot meet the needs of users. Aiming at this phenomenon, a 3D image embedded intelligent display system based on virtual reality technology is designed. In recent years, with the rapid development of computer technology, three-dimensional measurement technology has become increasingly mature, and three-dimensional information technology has emerged in different fields in real life. With the development of computer science and automatic control technology, more and more intelligent robots appear in production and life. As an important subsystem of intelligent robot systems, the vision system is also receiving more and more attention. The three-dimensional imaging system projects a structured grating on the surface of the target object, uses a digital sensor to collect the deformed structured light image modulated by the surface of the object, and comprehensively uses image processing technology and precision measurement technology to achieve noncontact three-dimensional measurement of the object. This method of number of three-dimensional coordinates has the advantage of not being damaged, high efficiency, high degree of automation, low cost, etc. It has very important significance and broad application prospects for improving product quality and manufacturing efficiency and reducing production costs. Through the investigation and analysis of the existing 3D image intelligent display system embedded, this paper designs and realizes the 3D image intelligent display embedded system, which includes a high-speed structured light projection module, an embedded image acquisition and processing module, and a 3D reconstruction module. Among them, the embedded 3D imaging image acquisition and processing system is an important part of the embedded 3D measurement system, which provides a certain theoretical and practical basis for future in-depth research. The experimental results in this article show that the acquisition module takes 1.934 s to obtain the folded phase of the measured object through phase demodulation and the algorithm, while the phase demodulation and unfolding takes 2.068 s. Therefore, the algorithm needs to be further optimized to speed up the image processing speed and reflect the real-time effect of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
53. Can Robots Get Some Human Rights? A Cross-Disciplinary Discussion.
- Author
-
Persaud, Priya, Varde, Aparna S., and Wang, Weitian
- Subjects
HUMAN rights ,ROBOTS ,COMPUTER science ,AUTONOMOUS robots ,HUMAN behavior ,COGNITION - Abstract
An autonomous household robot passed a self-awareness test in 2015, proving that the cognitive capabilities of robots are heading towards those of humans. While this is a milestone in AI, it raises questions about legal implications. If robots are progressively developing cognition, it is important to discuss whether they are entitled to justice pursuant to conventional notions of human rights. This paper offers a comprehensive discussion of this complex question through cross-disciplinary scholarly sources from computer science, ethics, and law. The computer science perspective dissects hardware and software of robots to unveil whether human behavior can be efficiently replicated. The ethics perspective utilizes insights from robot ethics scholars to help decide whether robots can act morally enough to be endowed with human rights. The legal perspective provides an in-depth discussion of human rights with an emphasis on eligibility. The article concludes with recommendations including open research issues. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
54. A Systematic Literature Review on Particle Swarm Optimization Techniques for Medical Diseases Detection.
- Author
-
Pervaiz, Sobia, Ul-Qayyum, Zia, Bangyal, Waqas Haider, Gao, Liang, and Ahmad, Jamil
- Subjects
- *
MATHEMATICAL optimization , *ARTIFICIAL intelligence , *COMPUTER science , *MEDICAL errors , *HUMAN-artificial intelligence interaction - Abstract
Artificial Intelligence (AI) is the domain of computer science that focuses on the development of machines that operate like humans. In the field of AI, medical disease detection is an instantly growing domain of research. In the past years, numerous endeavours have been made for the improvements of medical disease detection, because the errors and problems in medical disease detection cause serious wrong medical treatment. Meta-heuristic techniques have been frequently utilized for the detection of medical diseases and promise better accuracy of perception and prediction of diseases in the domain of biomedical. Particle Swarm Optimization (PSO) is a swarm-based intelligent stochastic search technique encouraged from the intrinsic manner of bee swarm during the searching of their food source. Consequently, for the versatility of numerical experimentation, PSO has been mostly applied to address the diverse kinds of optimization problems. However, the PSO techniques are frequently adopted for the detection of diseases but there is still a gap in the comparative survey. This paper presents an insight into the diagnosis of medical diseases in health care using various PSO approaches. This study presents to deliver a systematic literature review of current PSO approaches for knowledge discovery in the field of disease detection. The systematic analysis discloses the potential research areas of PSO strategies as well as the research gaps, although, the main goal is to provide the directions for future enhancement and development in this area. This paper gives a systematic survey of this conceptual model for the advanced research, which has been explored in the specified literature to date. This review comprehends the fundamental concepts, theoretical foundations, and conventional application fields. It is predicted that our study will be beneficial for the researchers to review the PSO algorithms in-depth for disease detection. Several challenges that can be undertaken to move the field forward are discussed according to the current state of the PSO strategies in health care. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
55. Application of Improved Boosting Algorithm for Art Image Classification.
- Author
-
Wu, Yue
- Subjects
- *
BOOSTING algorithms , *DATA mining , *IMAGE databases , *COMPUTER science , *CLASSIFICATION , *COLOR image processing - Abstract
In the field of computer science, data mining is a hot topic. It is a mathematical method for identifying patterns in enormous amounts of data. Image mining is an important data mining technique involving a variety of fields. In image mining, art image organization is an interesting research field worthy of attention. The classification of art images into several predetermined sets is referred to as art image categorization. Image preprocessing, feature extraction, object identification, object categorization, object segmentation, object classification, and a variety of other approaches are all part of it. The purpose of this paper is to suggest an improved boosting algorithm that employs a specific method of traditional and simple, yet weak classifiers to create a complex, accurate, and strong classifier image as well as a realistic image. This paper investigated the characteristics of cartoon images, realistic images, painting images, and photo images, created color variance histogram features, and used them for classification. To execute classification experiments, this paper uses an image database of 10471 images, which are randomly distributed into two portions that are used as training data and test data, respectively. The training dataset contains 6971 images, while the test dataset contains 3478 images. The investigational results show that the planned algorithm has a classification accuracy of approximately 97%. The method proposed in this paper can be used as the basis of automatic large-scale image classification and has strong practicability. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
56. Vehicular Ad Hoc Networks: Architectures, Research Issues, Methodologies, Challenges, and Trends.
- Author
-
Liang, Wenshuang, Li, Zhuorong, Zhang, Hongyang, Wang, Shenling, and Bie, Rongfang
- Subjects
VEHICULAR ad hoc networks ,COMPUTER architecture ,COMPUTER research ,TOPOLOGY ,COMPUTER science - Abstract
Vehicular ad hoc networks (VANETs) have been quite a hot research area in the last few years. Due to their unique characteristics such as high dynamic topology and predictable mobility, VANETs attract so much attention of both academia and industry. In this paper, we provide an overview of the main aspects of VANETs from a research perspective. This paper starts with the basic architecture of networks, then discusses three popular research issues and general research methods, and ends up with the analysis on challenges and future trends of VANETs. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
57. Formal Verification Method for Configuration of Integrated Modular Avionics System Using MARTE.
- Author
-
Wang, Lisong, Chen, Miaofang, and Hu, Jun
- Subjects
AVIONICS ,EMBEDDED computer systems ,XML (Extensible Markup Language) ,COMPUTER architecture ,COMPUTER science - Abstract
The configuration information of Integrated Modular Avionics (IMA) system includes almost all details of whole system architecture, which is used to configure the hardware interfaces, operating system, and interactions among applications to make an IMA system work correctly and reliably. It is very important to ensure the correctness and integrity of the configuration in the IMA system design phase. In this paper, we focus on modelling and verification of configuration information of IMA/ARINC653 system based on MARTE (Modelling and Analysis for Real-time and Embedded Systems). Firstly, we define semantic mapping from key concepts of configuration (such as modules, partitions, memory, process, and communications) to components of MARTE element and propose a method for model transformation between XML-formatted configuration information and MARTE models. Then we present a formal verification framework for ARINC653 system configuration based on theorem proof techniques, including construction of corresponding REAL theorems according to the semantics of those key components of configuration information and formal verification of theorems for the properties of IMA, such as time constraints, spatial isolation, and health monitoring. After that, a special issue of schedulability analysis of ARINC653 system is studied. We design a hierarchical scheduling strategy with consideration of characters of the ARINC653 system, and a scheduling analyzer MAST-2 is used to implement hierarchical schedule analysis. Lastly, we design a prototype tool, called Configuration Checker for ARINC653 (CC653), and two case studies show that the methods proposed in this paper are feasible and efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
58. A Kind of Stochastic Eigenvalue Complementarity Problems.
- Author
-
Wang, Ying-xiao and Du, Shou-qiang
- Subjects
COMPUTER science ,COMPUTATIONAL electromagnetics ,EIGENVALUES ,STOCHASTIC analysis ,NEWTON-Raphson method - Abstract
With the development of computer science, computational electromagnetics have also been widely used. Electromagnetic phenomena are closely related to eigenvalue problems. On the other hand, in order to solve the uncertainty of input data, the stochastic eigenvalue complementarity problem, which is a general formulation for the eigenvalue complementarity problem, has aroused interest in research. So, in this paper, we propose a new kind of stochastic eigenvalue complementarity problem. We reformulate the given stochastic eigenvalue complementarity problem as a system of nonsmooth equations with nonnegative constraints. Then, a projected smoothing Newton method is presented to solve it. The global and local convergence properties of the given method for solving the proposed stochastic eigenvalue complementarity problem are also given. Finally, the related numerical results show that the proposed method is efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
59. On Hamilton-Connectivity and Detour Index of Certain Families of Convex Polytopes.
- Author
-
Hayat, Sakander, Malik, Muhammad Yasir Hayat, Ahmad, Ali, Khan, Suliman, Yousafzai, Faisal, and Hasni, Roslan
- Subjects
HAMILTONIAN graph theory ,POLYTOPES ,NP-complete problems ,COMPUTER science ,APPLICATION software - Abstract
A convex polytope is the convex hull of a finite set of points in the Euclidean space ℝ n . By preserving the adjacency-incidence relation between vertices of a polytope, its structural graph is constructed. A graph is called Hamilton-connected if there exists at least one Hamiltonian path between any of its two vertices. The detour index is defined to be the sum of the lengths of longest distances, i.e., detours between vertices in a graph. Hamiltonian and Hamilton-connected graphs have diverse applications in computer science and electrical engineering, whereas the detour index has important applications in chemistry. Checking whether a graph is Hamilton-connected and computing the detour index of an arbitrary graph are both NP-complete problems. In this paper, we study these problems simultaneously for certain families of convex polytopes. We construct two infinite families of Hamilton-connected convex polytopes. Hamilton-connectivity is shown by constructing Hamiltonian paths between any pair of vertices. We then use the Hamilton-connectivity to compute the detour index of these families. A family of non-Hamilton-connected convex polytopes has also been constructed to show that not all convex polytope families are Hamilton-connected. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
60. Computing Bounds for Second Zagreb Coindex of Sum Graphs.
- Author
-
Javaid, Muhammad, Ibraheem, Muhammad, Ahmad, Uzma, and Zhu, Q.
- Subjects
MOLECULAR connectivity index ,CHEMICAL properties ,COMPUTER science ,SUBDIVISION surfaces (Geometry) - Abstract
Topological indices or coindices are one of the graph-theoretic tools which are widely used to study the different structural and chemical properties of the under study networks or graphs in the subject of computer science and chemistry, respectively. For these investigations, the operations of graphs always played an important role for the study of the complex networks under the various topological indices or coindices. In this paper, we determine bounds for the second Zagreb coindex of a well-known family of graphs called F -sum (S -sum, R -sum, Q -sum, and T -sum) graphs in the form of Zagreb indices and coindices of their factor graphs, where these graphs are obtained by using four subdivision-related operations and Cartesian product of graphs. At the end, we illustrate the obtained results by providing the exact and bonded values of some specific F -sum graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
61. New Post Quantum Analogues of Hermite–Hadamard Type Inequalities for Interval-Valued Convex Functions.
- Author
-
Kalsoom, Humaira, Ali, Muhammad Aamir, Idrees, Muhammad, Agarwal, Praveen, and Arif, Muhammad
- Subjects
- *
QUANTUM theory , *QUANTUM mechanics , *INTEGRAL inequalities , *COMPUTER science , *CONVEX functions - Abstract
The main objective of this paper is to introduce I p , q ϱ -derivative and I p , q ϱ -integral for interval-valued functions and discuss their key properties. Also, we prove the I p , q ϱ -Hermite–Hadamard inequalities for interval-valued functions is the development of p , q ϱ -Hermite–Hadamard inequalities by using new defined I p , q ϱ -integral. Moreover, we prove some results for midpoint- and trapezoidal-type inequalities by using the concept of Pompeiu–Hausdorff distance between the intervals. It is also shown that the results presented in this paper are extensions of some of the results already shown in earlier works. The proposed studies produce variants that would be useful for performing in-depth investigations on fractal theory, optimization, and research problems in different applied fields, such as computer science, quantum mechanics, and quantum physics. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
62. Exploring the Application of Artificial Intelligence in Sports Training: A Case Study Approach.
- Author
-
Wei, Shiqing, Huang, Puquan, Li, Rui, Liu, Zhiguo, and Zou, Yuepei
- Subjects
ARTIFICIAL intelligence ,PHYSICAL training & conditioning ,ASSISTIVE technology ,COMPUTER science ,PHYSICAL education - Abstract
With the rapid development of computer science and information technology, artificial intelligence (AI) has been developed from theory to application. As a key technology in the modern society, AI is increasingly affecting all aspects of people's daily lives, including sports training. AI can be considered as an assistive technology to provide specific support to athletes' physical education training through various means such as data analysis and simulation of training scenarios. Although research on AI is still in the preliminary stage, it is significant to explore how AI can be applied in sports training since this emerging technology could facilitate people's physical training to some extent. This paper first reviews the existing research on AI applications. Then, based on the fundamental concept and related research results of AI, this study explores three specific cases of AI application in sports training and explains the main principles. This research focuses on discussing the strong relationship between AI technology and physical education training and highlights the advantages of AI, including utilization, convenience, and innovation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
63. Hamilton Connectivity of Convex Polytopes with Applications to Their Detour Index.
- Author
-
Hayat, Sakander, Khan, Asad, Khan, Suliman, and Liu, Jia-Bao
- Subjects
HAMILTONIAN graph theory ,POLYTOPES ,NP-complete problems ,GRAPH connectivity ,COMPUTER science ,APPLICATION software ,CONVEX programming - Abstract
A connected graph is called Hamilton-connected if there exists a Hamiltonian path between any pair of its vertices. Determining whether a graph is Hamilton-connected is an NP-complete problem. Hamiltonian and Hamilton-connected graphs have diverse applications in computer science and electrical engineering. The detour index of a graph is defined to be the sum of lengths of detours between all the unordered pairs of vertices. The detour index has diverse applications in chemistry. Computing the detour index for a graph is also an NP-complete problem. In this paper, we study the Hamilton-connectivity of convex polytopes. We construct three infinite families of convex polytopes and show that they are Hamilton-connected. An infinite family of non-Hamilton-connected convex polytopes is also constructed, which, in turn, shows that not all convex polytopes are Hamilton-connected. By using Hamilton connectivity of these families of graphs, we compute exact analytical formulas of their detour index. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
64. Use of the Smart Store for Persuasive Marketing and Immersive Customer Experiences: A Case Study of Korean Apparel Enterprise.
- Author
-
Hyunwoo Hwangbo, Yang Sok Kim, and Kyung Jin Cha
- Subjects
CUSTOMER experience ,APPLICATION stores ,BUSINESS enterprises ,INDOOR positioning systems ,COMPUTER science ,INFORMATION technology ,RETAIL stores ,INTELLIGENT buildings - Abstract
Information technology's introduction of online retail has deeply influenced methods of doing business. However, offline retail has not changed as radically in comparison to online retailing. Recently, studies in computer science have suggested newtechnology that can support offline retailers, including sensors, indoor positioning, augmented reality, vision, and interactive systems. Retailers have recently shown interest in these technologies and rapidly adopted them in order to improve operational efficiency and customer experience in their retail shops. Marketing studies also address immersive marketing that employs these technologies in order to change ways of doing offline retail business. Even though there is much discussion concerning new trends, technologies, and marketing concepts, there is, as of yet, no investigation that comprehensively explains howthey can be combined together seamlessly in the real world retail environment. This paper employs the term "smart store" to indicate retail stores equipped with these new technologies and modern marketing concepts. This paper aims to summarize discussions related to smart stores and their possible applications in a real business environment. Furthermore, we present a case study of a business that applies the smart store concept to its fashion retail shops in Korea. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
65. Lightweight key management on sensitive data in the cloud.
- Author
-
Cui, Zongmin, Zhu, Hong, and Chi, Lianhua
- Subjects
PUBLIC key cryptography ,COMPUTER security ,COMPUTER access control ,DATA encryption ,COMPUTER science - Abstract
ABSTRACT As cloud servers may not be trusted, sensitive data have to be transmitted and stored in an encrypted form. Major challenges for users are from the management (storage, update, protection, backup, and recoverability) of keys that can help users to decrypt authorized data available on the servers. In this paper, we propose a versatile approach for extremely lightweight key management, which is one of the most basic security tasks in cloud systems. In the multiple data owners scenario, each user only needs to manage a single key by our approach. With the help of the single key and a set of public information stored on the server, users can decrypt all authorized data from different data owners. Specifically, our paper proposes a novel access control model, proves the correctness and security, and analyzes the complexity of the model. Experimental results show that our approach significantly outperforms the single-layer derivation encryption and double-layer derivation encryption on the lightweight performance. Copyright © 2013 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
66. Autonomic management of application workflows on hybrid computing infrastructure.
- Author
-
Brandic, Ivona, Raicu, Ioan, Kim, Hyunjoo, el-Khamra, Yaakoub, Rodero, Ivan, Jha, Shantenu, and Parashar, Manish
- Subjects
WORKFLOW ,CLOUD computing ,COMPUTER programming ,COMPUTER science ,COMPUTER systems - Abstract
In this paper, we present a programming and runtime framework that enables the autonomic management of complex application workflows on hybrid computing infrastructures. The framework is designed to address system and application heterogeneity and dynamics to ensure that application objectives and constraints are satisfied. The need for such autonomic system and application management is becoming critical as computing infrastructures become increasingly heterogeneous, integrating different classes of resources from high-end HPC systems to commodity clusters and clouds. For example, the framework presented in this paper can be used to provision the appropriate mix of resources based on application requirements and constraints. The framework also monitors the system/application state and adapts the application and/or resources to respond to changing requirements or environment. To demonstrate the operation of the framework and to evaluate its ability, we employ a workflow used to characterize an oil reservoir executing on a hybrid infrastructure composed of TeraGrid nodes and Amazon EC2 instances of various types. Specifically, we show how different applications objectives such as acceleration, conservation and resilience can be effectively achieved while satisfying deadline and budget constraints, using an appropriate mix of dynamically provisioned resources. Our evaluations also demonstrate that public clouds can be used to complement and reinforce the scheduling and usage of traditional high performance computing infrastructure. [ABSTRACT FROM AUTHOR]
- Published
- 2011
67. A Novel Cuckoo Search Optimized Deep Auto-Encoder Network-Based Fault Diagnosis Method for Rolling Bearing.
- Author
-
Tong, Jinyu, Luo, Jin, Pan, Haiyang, Zheng, Jinde, and Zhang, Qing
- Subjects
FAULT diagnosis ,DIAGNOSIS methods ,CUCKOOS ,ROLLER bearings ,SEARCH algorithms ,COMPUTER science - Abstract
To enhance the performance of deep auto-encoder (AE) under complex working conditions, a novel deep auto-encoder network method for rolling bearing fault diagnosis is proposed in this paper. First, multiscale analysis is adopted to extract the multiscale features from the raw vibration signals of rolling bearing. Second, the sparse penalty term and contractive penalty term are used simultaneously to regularize the loss function of auto-encoder to enhance the feature learning ability of networks. Finally, the cuckoo search algorithm (CS) is used to find the optimal hyperparameters automatically. The proposed method is applied to the experimental data analysis. The results indicate that the proposed method could more effectively distinguish fault categories and severities of rolling bearings under different working conditions than other methods. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
68. A simplified method for implementing run-time polymorphism in Fortran95.
- Author
-
Decyk, Viktor K. and Norton, Charles D.
- Subjects
COMPUTER software ,FORTRAN 95 ,COMPUTERS ,COMPUTER systems ,COMPUTER science - Abstract
This paper discusses a simplified technique for software emulation of inheritance and run-time polymorphism in Fortran95. This technique involves retaining the same type throughout an inheritance hierarchy, so that only functions which are modified in a derived class need to be implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
69. GANs Based Density Distribution Privacy-Preservation on Mobility Data.
- Author
-
Yin, Dan and Yang, Qing
- Subjects
GLOBAL Positioning System ,LOCATION-based services ,INFORMATION services ,DATA mining ,COMPUTER science - Abstract
With the development of mobile devices and GPS, plenty of Location-based Services (LBSs) have emerged in these years. LBSs can be applied in a variety of contexts, such as health, entertainment, and personal life. The location based data that contains significant personal information is released for analysing and mining. The privacy information of users can be attacked from the published data. In this paper, we investigate the problem of privacy-preservation of density distribution on mobility data. Different from adding noises into the original data for privacy protection, we devise the Generative Adversarial Networks (GANs) to train the generator and discriminator for generating the privacy-preserved data. We conduct extensive experiments on two real world mobile datasets. It is demonstrated that our method outperforms the differential privacy approach in both data utility and attack error. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
70. Real-Time Evaluation of the Signal Processing of sEMG Used in Limb Exoskeleton Rehabilitation System.
- Author
-
Gao, Baofeng, Wei, Chao, Ma, Hongdao, Yang, Shu, Ma, Xu, and Zhang, Songyuan
- Subjects
SIGNAL processing ,ROBOTIC exoskeletons ,MEDICAL robotics ,COMPUTER science ,HUMAN anatomy - Abstract
As an important branch of medical robotics, a rehabilitation training robot for the hemiplegic upper limbs is a research hotspot of rehabilitation training. Based on the motion relearning program, rehabilitation technology, human anatomy, mechanics, computer science, robotics, and other fields of technology are covered. Based on an sEMG real-time training system for rehabilitation, the exoskeleton robot still has some problems that need to be solved in this field. Most of the existing rehabilitation exoskeleton robotic systems are heavy, and it is difficult to ensure the accuracy and real-time performance of sEMG signals. In this paper, we design a real-time training system for the upper limb exoskeleton robot based on the EMG signal. It has four main characteristics: light weight, portability, high precision, and low delay. This work includes the structure of the rehabilitation robotic system and the method of signal processing of the sEMG. An experiment on the accuracy and time delay of the sEMG signal processing has been done. In the experimental results, the recognition accuracy of the sEMG is 94%, and the average delay time is 300 ms, which meets the accuracy and real-time requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
71. Differentially Private Recommendation System Based on Community Detection in Social Network Applications.
- Author
-
Li, Gesu, Cai, Zhipeng, Yin, Guisheng, He, Zaobo, and Siddula, Madhuri
- Subjects
SOCIAL networks ,RECOMMENDER systems ,PERSONAL information management ,ELECTRONIC commerce ,COMPUTER science - Abstract
The recommender system is mainly used in the e-commerce platform. With the development of the Internet, social networks and e-commerce networks have broken each other’s boundaries. Users also post information about their favorite movies or books on social networks. With the enhancement of people’s privacy awareness, the personal information of many users released publicly is limited. In the absence of items rating and knowing some user information, we propose a novel recommendation method. This method provides a list of recommendations for target attributes based on community detection and known user attributes and links. Considering the recommendation list and published user information that may be exploited by the attacker to infer other sensitive information of users and threaten users’ privacy, we propose the CDAI (Infer Attributes based on Community Detection) method, which finds a balance between utility and privacy and provides users with safer recommendations. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
72. Sparsity Based Locality-Sensitive Discriminative Dictionary Learning for Video Semantic Analysis.
- Author
-
Benuwa, Ben-Bright, Zhan, Yongzhao, Ghansah, Benjamin, Ansah, Ernest K., and Sarkodie, Andriana
- Subjects
SEMANTICS ,PATTERN recognition systems ,INFORMATION storage & retrieval systems ,CLASSIFICATION algorithms ,COMPUTER science - Abstract
Dictionary learning (DL) and sparse representation (SR) based classifiers have greatly impacted the classification performance and have had good recognition rate on image data. In video semantic analysis (VSA), the local structure of video data contains more vital discriminative information needed for classification. However, this has not been fully exploited by the current DL based approaches. Besides, similar coding findings are not being realized from video features with the same video category. Based on the issues stated afore, a novel learning algorithm, called sparsity based locality-sensitive discriminative dictionary learning (SLSDDL) for VSA is proposed in this paper. In the proposed algorithm, a discriminant loss function for the category based on sparse coding of the sparse coefficients is introduced into structure of locality-sensitive dictionary learning (LSDL) algorithm. Finally, the sparse coefficients for the testing video feature sample are solved by the optimized method of SLSDDL and the classification result for video semantic is obtained by minimizing the error between the original and reconstructed samples. The experiment results show that the proposed SLSDDL significantly improves the performance of video semantic detection compared with the comparative state-of-the-art approaches. Moreover, the robustness to various diverse environments in video is also demonstrated, which proves the universality of the novel approach. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
73. The Evolving Role of Information Technology in Haemovigilance Systems.
- Author
-
Ramoa, Augusto, Condeço, Jorge, Escoval, Maria Antónia, Faber, Jean-Claude, Fdez-Riverola, Florentino, and Lourenço, Anália
- Subjects
INFORMATION technology ,STRATEGIC planning ,COMMUNICATION ,COMPUTER science ,DESCRIPTIVE statistics - Abstract
This work provides an overview and appraisal of the general evolution of IS/IT in haemovigilance, from which lessons can be learned for its future strategic management. An electronic survey was conducted among the members of the International Haemovigilance Network to compile information on the mechanisms implemented to gather, process, validate, and store these data, to monitor haemovigilance activity, and to produce analytical reports. Survey responses were analysed by means of descriptive statistics, and comments/observations were considered in the final discussion. The answers received from 23 haemovigilance organizations show a direct relationship between the number of collected notifications (i.e., communication of adverse effects and events) and the technical specifications of the haemovigilance system in use. Notably, IT is used in the notification reception of 17 of these systems, out of which 8 systems are exclusively based on Web solutions. Most assessments of the evolution of IS/IT tend to focus on the scalability and flexibility of data gathering and reporting, considering the ever-changing requirements of haemovigilance. Data validation is poorly implemented, and data reporting has not reached its full potential. Web-based solutions are seen as the most intuitive and flexible for a system-user interaction. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
74. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks.
- Author
-
Ma, Zhenjie, Wang, Haoran, Shi, Ke, and Wang, Xinda
- Subjects
DELAY-tolerant networks ,MACHINE learning ,ELECTRIC network topology ,COMPUTER science ,PERFORMANCE evaluation - Abstract
Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs) that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS) in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
75. HORME: hierarchical-object-relational medical management for electronic record.
- Author
-
Yang, Chien-Chang, Wei, Kuo-Jui, Li, Bo, and Lee, Jung-San
- Subjects
MANAGEMENT of electronic health records ,INFORMATION & communication technologies ,INFORMATION storage & retrieval systems ,MEDICAL databases ,INFORMATION science ,COMPUTER science - Abstract
ABSTRACT Along with widespread information communication technology, digital management has been applied to a variety of fields. Considering the rapidly growing importance of medical treatment, for which medical record management plays a crucial role, it is time to make full use of digital techniques in the medical field. Doctors in different departments and locations can check the electronic records of patients without complex steps and can even consult together via the Internet. In this paper, we design a hierarchical-object-relational management system for electronic records (HORME). HORME can not only achieve the essentials of traditional paper-based record but can also satisfy the requirements of privacy and security according to the factorization problem, which makes it possible to protect the right of the legal doctors, patients, and hospitals. Copyright © 2013 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
76. Efficient multiple-collision trapdoor hash family.
- Author
-
Aboud, Sattar J. and Al Ajeeli, Abid T.
- Subjects
HASHING ,NATURAL numbers ,LOGARITHMS ,MATHEMATICAL functions ,COMPUTER science - Abstract
ABSTRACT In this paper, we suggest a multiple-collision trapdoor hash family under both integer factoring and discrete logarithm problems, and we present their security proofs. In multiple-collision trapdoor hash family, exposing multiple collisions of similar hash functions will not disclose the private key of trapdoor hash value. In the proposed multiple-collision trapdoor hash family, a pair of secret keys is employed for generating digital signature. Under the suggested trapdoor hash family, we present competitive online and off-line signature schemes that can considerably enhance the efficiency of online and off-line signature schemes. Moreover, in the proposed signature scheme, a trapdoor hash function can be employed for signing multiple documents. When a signer embraces this approach in the public-key digital certificate, there is no need to include an ordinary digital signature scheme to sign the hash function in the off-line part. Copyright © 2011 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
77. Experiences using hybrid MPI/OpenMP in the real world: Parallelization of a 3D CFD solver for multi-core node clusters.
- Author
-
Jost, Gabriele and Robins, Bob
- Subjects
CENTRAL processing units ,COMPUTER programming ,COMPUTER networks ,SCALABILITY ,COMPUTER storage devices ,COMPUTER science - Abstract
Today most systems in high-performance computing (HPC) feature a hierarchical hardware design: shared-memory nodes with several multi-core CPUs are connected via a network infrastructure. When parallelizing an application for these architectures it seems natural to employ a hierarchical programming model such as combining MPI and OpenMP. Nevertheless, there is the general lore that pure MPI outperforms the hybrid MPI/OpenMP approach. In this paper, we describe the hybrid MPI/OpenMP parallelization of IR3D (Incompressible Realistic 3-D) code, a full-scale real-world application, which simulates the environmental effects on the evolution of vortices trailing behind control surfaces of underwater vehicles. We discuss performance, scalability and limitations of the pure MPI version of the code on a variety of hardware platforms and show how the hybrid approach can help to overcome certain limitations. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
78. A Case Study of the Accuracy of SNMP Measurements.
- Author
-
Roughan, Matthew
- Subjects
SIMPLE Network Management Protocol (Computer network protocol) ,DATA transmission systems ,COMPUTER network protocol software ,MEASUREMENT errors ,COMPUTER algorithms ,COMPUTER programming ,COMPUTER science ,DATABASE management software ,ETHERNET - Abstract
For some time it has been known that the standard method for collecting link-traffic measurements in IP networks-the Simple Network Management Protocol or SNMP-is flawed. It has often been noted that SNMP is subject to missing data, and that its measurements contain errors. However, very little work has been aimed at assessing the magnitude of these errors. This paper develops a simple, easily applicable technique for measuring SNMP errors, and uses it in a case study to assess errors in a common SNMP collection tool. The results indicate that most link-load measurement errors are relatively small, but the distribution has a heavy-tail, and that a few measurement errors can be as large as the measurements themselves. The approach also allows us to go some way towards explaining the cause of the errors. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
79. Revisiting Sum of Residues Modular Multiplication.
- Author
-
Kong, Yinan and Phillips, Braden
- Subjects
PUBLIC key cryptography ,MODULAR design ,ALGORITHMS ,COMPUTER programming ,COMPUTER network security ,COMPUTER architecture ,COMPUTER science ,CRYPTOGRAPHY software ,DIGITAL image processing ,MULTIPLICATION - Abstract
In the 1980s,when the introduction of public key cryptography spurred interest in modularmultiplication, many implementations performed modularmultiplication using a sumof residues. As the fieldmatured, sum of residues modularmultiplication lost favor to the extent that all recent surveys have either overlooked it or incorporated it within a larger class of reduction algorithms. In this paper, we present a new taxonomy of modular multiplication algorithms. We include sum of residues as one of four classes and argue why it should be considered different to the other, now more common, algorithms.We then apply techniques developed for other algorithms to reinvigorate sum of residues modular multiplication. We compare FPGA implementations of modular multiplication up to 24 bits wide. The Sum of Residues multipliers demonstrate reduced latency at nearly 50% compared to Montgomery architectures at the cost of nearly doubled circuit area. The new multipliers are useful for systems based on the Residue Number System (RNS). [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
80. Protocols for Robotic Telescope Networks.
- Author
-
Klotz, Alain
- Subjects
ASTRONOMICAL observatories ,GRAVITATIONAL lenses ,ROBOTICS software ,COMPUTER science ,COMPUTER network protocols ,ASTRONOMICAL observations ,GAMMA ray bursts ,SUPERNOVAE ,NEAR-earth asteroids - Abstract
Autonomous robotic observatories can use modern communications to receive pertinent information from institutes that generate events to observe (e.g., supernovae, near-earth asteroids, gravitational lensings, and gamma-ray bursts). This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
81. Implementation and performance modeling of deterministic particle transport (Sweep3D) on the IBM Cell/B.E.
- Author
-
Lubeck, Olaf, Lang, Michael, Srinivasan, Ram, and Johnson, Greg
- Subjects
BROADBAND communication systems ,MULTICORE processors ,MONTE Carlo method ,METHODOLOGY ,COMPUTER science - Abstract
The IBM Cell Broadband Engine (BE) is a novel multi-core chip with the potential for the demanding floating point performance that is required for high-fidelity scientific simulations. However, data movement within the chip can be a major challenge to realizing the benefits of the peak floating point rates. In this paper, we present the results of implementing Sweep3D on the Cell/B.E. using an intra-chip message passing model that minimizes data movement. We compare the advantages/disadvantages of this programming model with a previous implementation using a master-worker threading strategy. We apply a previously validated micro-architecture performance model for the application executing on the Cell/B.E. (based on our previous work in Monte Carlo performance models), that predicts overall CPI (cycles per instruction), and gives a detailed breakdown of processor stalls. Finally, we use the micro-architecture model to assess the performance of future design parameters for the Cell/B.E. micro-architecture. The methodologies and results have broader implications that extend to multi-core architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
82. Introduction.
- Author
-
Dikaiakos, Marios D.
- Subjects
COMPUTER science ,DISTRIBUTED computing - Abstract
Introduces a series of articles on grid computing.
- Published
- 2004
- Full Text
- View/download PDF
83. Managing data persistence in network enabled servers.
- Author
-
Caron, Eddy, DelFabbro, Bruno, Desprez, Frédéric, Jeannot, Emmanuel, and Nicod, Jean-Marc
- Subjects
COMPUTER architecture ,COMMUNICATION ,COMPUTER science ,COMPUTER systems ,SYSTEMS development - Abstract
The GridRPC model [17] is an emerging standard promoted by the Global Grid Forum (GGF) that defines how to perform remote client-server computations on a distributed architecture. In this model data are sent back to the client at the end of every computation. This implies unnecessary communications when computed data are needed by an other server in further computations. Since, communication time is sometimes the dominant cost of remote computations, this cost has to be lowered. Several tools instantiate the GridRPC model such as NetSolve developed at the University of Tennessee, Knoxville, USA, and DIET developed at LIP laboratory, ENS Lyon, France. They are usually called Network Enabled Servers (NES). In this paper, we present a discussion of the data management solutions chosen for these two NES (NetSolve and DIET) as well as experimental results. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
84. A low-cost rescheduling policy for efficient mapping of workflows on grid systems.
- Author
-
Sakellariou, Rizos and Zhao, Henan
- Subjects
WORKFLOW ,DISTRIBUTED computing ,COMPUTER science ,PRODUCTION scheduling ,MANAGEMENT - Abstract
Workflow management is emerging as an important service in Grid computing. A simple model that can be used for the representation of certain workflows is a directed acyclic graph. Although many heuristics have been proposed to schedule such graphs on heterogeneous environments, most of them assume accurate prediction of computation and communication costs. This limits their direct applicability to a dynamically changing environment, such as the Grid. In this environment, an initial schedule may be built based on estimates, but run-time rescheduling may be needed to improve application performance. This paper presents a low-cost rescheduling policy, which considers rescheduling at a few, carefully selected points during the execution. This policy achieves performance results, which are comparable with those achieved by a policy that dynamically attempts to reschedule before the execution of every task. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
85. Dynamic grid scheduling with job migration and rescheduling in the GridLab resource management system.
- Author
-
Kurowski, K., Ludwiczak, B., Nabrzyski, J., Oleksiak, A., and Pukacki, J.
- Subjects
DISTRIBUTED computing ,COMPUTER science ,WORLD Wide Web ,MIDDLEWARE ,APPLICATION software - Abstract
Grid computing has become one of the most important research topics that appeared in the field of computing in the last years. Simultaneously, we have noticed the growing popularity of new Web-based technologies which allow us to create application-oriented Grid middleware services providing capabilities required for dynamic resource and job management, monitoring, security, etc. Consequently, end users are able to get easier access to geographically distributed resources. In this paper we present the results of our experiments with the Grid(Lab) Resource Management System (GRMS), which acts on behalf of end users and controls their computations efficiently using distributed heterogeneous resources. We show how resource matching techniques used within GRMS can be improved by the use of a job migration based rescheduling policy. The main aim of this policy is to shorten job pending times and reduce machine overloads. The influence of this method on application performance and resource utilization is studied in detail and compared with two other simple policies. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
86. A Multi-RNN Research Topic Prediction Model Based on Spatial Attention and Semantic Consistency-Based Scientific Influence Modeling.
- Author
-
Xu, Mingying, Du, Junping, Guan, Zeli, Xue, Zhe, Kou, Feifei, Shi, Lei, Xu, Xin, and Li, Ang
- Subjects
SEMANTICS ,SCIENTIFIC models ,PREDICTION models ,RECURRENT neural networks ,SCIENCE education ,COMPUTER science - Abstract
Computer science discipline includes many research fields, which mutually influence and promote each other's development. This poses two great challenges of predicting the research topics of each research field. One is how to model fine-grained topic representation of a research field. The other is how to model research topic of different fields and keep the semantic consistency of research topics when learning the scientific influence context from other related fields. Unfortunately, the existing research topic prediction approaches cannot handle these two challenges. To solve these problems, we employ multiple different Recurrent Neural Network chains which model research topics of different fields and propose a research topic prediction model based on spatial attention and semantic consistency-based scientific influence modeling. Spatial attention is employed in field topic representation which can selectively extract the attributes from the field topics to distinguish the importance of field topic attributes. Semantic consistency-based scientific influence modeling maps research topics of different fields to a unified semantic space to obtain the scientific influence context of other related fields. Extensive experiment results on five related research fields in the computer science (CS) discipline show that the proposed model is superior to the most advanced methods and achieves good topic prediction performance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
87. Boundedness of Convex Polytopes Networks via Local Fractional Metric Dimension.
- Author
-
Javaid, Muhammad, Zafar, Hassan, Aljaedi, Amer, and Alanazi, Abdulaziz Mohammad
- Subjects
- *
INTEGER programming , *IMAGE processing , *COMPUTER science , *POLYTOPES , *CHEMICAL properties , *NEIGHBORHOODS - Abstract
Metric dimension is one of the distance-based parameter which is frequently used to study the structural and chemical properties of the different networks in the various fields of computer science and chemistry such as image processing, pattern recognition, navigation, integer programming, optimal transportation models, and drugs discovery. In particular, it is used to find the locations of robots with respect to shortest distance among the destinations, minimum consumption of time, and lesser number of the utilized nodes and to characterize the chemical compounds having unique presentation in molecular networks. The fractional metric dimension being a latest developed weighted version of the metric dimension is used in the distance-related problems of the aforementioned fields to find their nonintegral optimal solutions. In this paper, we have formulated the local resolving neighborhoods with their cardinalities for all the edges of the convex polytopes networks to compute their local fractional metric dimensions in the form of exact values and sharp bounds. Moreover, the boundedness of all the obtained results is also proved. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
88. How good is OpenMP.
- Author
-
Ayguade, E., Chapman, B., and Mattson, Timothy G.
- Subjects
COMPUTER software ,COMPUTER science ,TIME-sharing computer systems ,COMPUTERS - Abstract
The OpenMP standard defines an Application Programming Interface (API) for shared memory computers. Since its introduction in 1997, it has grown to become one of the most commonly used API's for parallel programming. But success in the market doesn't necessarily imply successful computer science. Is OpenMP a "good" programming environment? What does it even mean to call a programming environment good? And finally, once we understand how good or bad OpenMP is; what can we do to make it even better? In this paper, we will address these questions. [ABSTRACT FROM AUTHOR]
- Published
- 2003
89. Scaling non-regular shared-memory codes by reusing custom loop schedules.
- Author
-
Ayguade, E., Chapman, B., Nikolopoulos, Dimitrios S., Artiaga, Ernest, Ayguadé, Eduard, and Labarta, Jesús
- Subjects
COMPUTER architecture ,COMPUTER engineering ,COMPUTER science - Abstract
In this paper we explore the idea of customizing and reusing loop schedules to improve the scalability of non-regular numerical codes in shared-memory architectures with non-uniform memory access latency. The main objective is to implicitly setup affinity links between threads and data, by devising loop schedules that achieve balanced work distribution within irregular data spaces and reusing them as much as possible along the execution of the program for better memory access locality. This transformation provides a great deal of flexibility in optimizing locality, without compromising the simplicity of the shared-memory programming paradigm. In particular, the programmer does not need to explicitly distribute data between processors. The paper presents practical examples from real applications and experiments showing the efficiency of the approach. [ABSTRACT FROM AUTHOR]
- Published
- 2003
90. VLAM-G: A Grid-based virtual laboratory.
- Author
-
Afsarmanesh, H., Belleman, R.G., Belloum, A.S.Z., Benabdelkader, A., van den Brand, J.F.J., Eijkel, G.B., Frenkel, A., Garita, C., Groep, D.L., Heeren, R.M.A., Hendrikse, Z.W., Hertzberger, L.O., Kaandorp, J.A., Kaletas, E.C., Korkhov, V., de Laat, C.T.A.M., Sloot, P.M.A., Vasunin, D., Visser, A., and Yakali, H.H.
- Subjects
COMPUTER systems ,COMPUTER science ,DATABASE management - Abstract
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists remote experiment control, data management facilities and access to distributed resources by providing cross-institutional integration of information and resources in a familiar environment. The main goal is to provide a unique integration of existing standards and software packages. This paper describes the design and prototype implementation of the VLAM-G platform. In this testbed we applied several recent technologies such as the Globus toolkit, enhanced federated database systems, and visualization and simulation techniques. Several domain specific case studies are described in some detail. Information management will be discussed separately in a forthcoming paper. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
91. The Development and Application of Crop Evaluation System Based on GRA.
- Author
-
Wang, Ruihong, Zhang, Liguo, Dong, Lianjie, and Lu, Xiuying
- Subjects
- *
NUMBER theory , *SYSTEMS theory , *COMPUTER science , *PROBLEM solving , *MATHEMATICAL models - Abstract
Ever since it was proposed, grey system theory has attracted the attention of scientific researchers and scholars. And it also has been widely used in many fields and solved a large number of practical problems in production, life, and scientific research. With the development and popularization of computer science and network technology, this traditional mathematical model can be applied more simply and efficiently to solve practical problems. Firstly, this paper, to implement steps of grey relational analysis, has made the exclusive analysis and has made the simple introduction to grey relational analysis characteristics. Then, based on grey relational theory and ASP.NET technology, the crop evaluation system is developed. Lastly, by using Excel and the crop evaluation system, the paper carries out a comprehensive evaluation about eight features of Fuji apple, which is from nine different producing areas, respectively. The experiment results show that the crop evaluation system is effective and could greatly improve the work efficiency of the researcher and expand the application scope. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
92. Analysis of the 3D Application Evaluation System of Landscape Based on Hybrid Cooperation of VR and AI.
- Author
-
Niu, Lina and Han, Feng
- Subjects
- *
LANDSCAPE assessment , *LANDSCAPE design , *ARTIFICIAL intelligence , *URBAN planning , *COMPUTER engineering , *COMPUTER science - Abstract
The traditional urban landscape planning and design method cannot integrate the design into the whole planning scene and cannot express the planning effect of multiple schemes and large scenes in an efficient, intuitive, and coordinated way. With the development of computer science and technology, virtual reality technology based on AI is playing an important role in many aspects of urban landscape planning and design. In this paper, on the basis of 3D visualization landscape planning and design, 3D visualization urban landscape modeling is carried out using VR combined with the constructed deep neural network (DNN) to establish a 3D database and virtual scene model of the landscape, and 3D representation of the virtual scene landscape is realized. The designed solution allows the user to grab the object and release it into the workspace. If any placement is needed, the user can pick up the layer again and move it to a new location. Finally, the simulation experiment and its result analysis were conducted to effectively analyze the site of the real model and its matching rate, to realize the integration of the 3D image, 3D stereo, and system integration technology, and to finally complete the landscape design task. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
93. Research on Monitoring Method of Remote Deformation and System Application Based on Image.
- Author
-
Zhang, Yu, Zhong, Ruofei, Li, Yongrong, and Sun, Haili
- Subjects
PIXELS ,COMPUTER engineering ,IMAGE registration ,IMAGE analysis ,COMPUTER science ,ALGORITHMS ,SYSTEM integration - Abstract
The development of information technology and computer science has put forward higher requirements on the intelligence of deformation monitoring. We study a method based on image deformation analysis, which uses Scale-Invariant Feature Transform (SIFT) to extract image feature points after preprocessing the acquired images, applies All-Pixels Matching (APM) method to the sequence images to do further high-precision matching to achieve the accuracy of subpixels, and finally solves the deformation variables according to the relationship of the real size of the reference target and its pixel. Wavelet analysis and least squares are used to improve the image quality and matching accuracy. Based on this method, we design and develop a new remotely automated deformation monitoring system. In this paper, we introduce the algorithm principle of deformation analysis, the integration of the system, and the engineering application example of the monitoring system. The monitoring accuracy of the system satisfying 0.1 mm within 10 m and 0.8 mm within 60 m is verified in the simultaneous comparison observation according to the high-precision total station, which illustrates the effectiveness of the present deformation analysis method and monitoring system and also has the characteristics of low monitoring cost and high degree of automation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
94. A Convex Combination between Two Different Search Directions of Conjugate Gradient Method and Application in Image Restoration.
- Author
-
Alhawarat, Ahmad, Salleh, Zabidin, and Masmali, Ibtisam A.
- Subjects
- *
CONJUGATE gradient methods , *IMAGE reconstruction , *CENTRAL processing units , *UNITS of time , *COMPUTER science - Abstract
The conjugate gradient is a useful tool in solving large- and small-scale unconstrained optimization problems. In addition, the conjugate gradient method can be applied in many fields, such as engineering, medical research, and computer science. In this paper, a convex combination of two different search directions is proposed. The new combination satisfies the sufficient descent condition and the convergence analysis. Moreover, a new conjugate gradient formula is proposed. The new formula satisfies the convergence properties with the descent property related to Hestenes–Stiefel conjugate gradient formula. The numerical results show that the new search direction outperforms both two search directions, making it convex between them. The numerical result includes the number of iterations, function evaluations, and central processing unit time. Finally, we present some examples about image restoration as an application of the proposed conjugate gradient method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
95. Improved Lower Bound of LFMD with Applications of Prism-Related Networks.
- Author
-
Javaid, Muhammad, Zafar, Hassan, Zhu, Q., and Alanazi, Abdulaziz Mohammed
- Subjects
- *
INTEGER programming , *COMPUTER science , *IMAGE processing , *PRISMS , *NEIGHBORHOODS - Abstract
The different distance-based parameters are used to study the problems in various fields of computer science and chemistry such as pattern recognition, image processing, integer programming, navigation, drug discovery, and formation of different chemical compounds. In particular, distance among the nodes (vertices) of the networks plays a supreme role to study structural properties of networks such as connectivity, robustness, completeness, complexity, and clustering. Metric dimension is used to find the locations of machines with respect to minimum utilization of time, lesser number of the utilized nodes as places of the objects, and shortest distance among destinations. In this paper, lower bound of local fractional metric dimension for the connected networks is improved from unity and expressed in terms of ratio obtained by the cardinalities of the under-study network and the local resolving neighbourhood with maximum order for some edges of network. In the same context, the LFMDs of prism-related networks such as circular diagonal ladder, antiprism, triangular winged prism, and sun flower networks are computed with the help of obtained criteria. At the end, the bounded- and unboundedness of the obtained results is also shown numerically. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
96. Computer, Computer Science, and Computational Thinking: Relationship between the Three Concepts.
- Author
-
Chakraborty, Pinaki
- Subjects
COMPUTER science ,SCIENTIFIC computing ,COMPUTERS ,ACADEMIC departments ,COMPUTER scientists - Abstract
Digital computers were invented in the 1940s. They are sophisticated and versatile machines whose functioning is grounded in elaborate theory. Advances in theory and the availability of computers helped computer science to develop as an academic discipline, and university departments for the same started coming up in the 1960s. Computer science covers all phenomenon related to computers and consists primarily of man-made laws governing building, programming, and using computers. Computational thinking is a way of thinking influenced by computers and computer science. There are two schools of thought on computational thinking. The first school sees computational thinking as the use of computers to explore the world, while the other sees computational thinking as the application of concepts from computer science to solve real-world problems. Scholars typically agree that computational thinking has four essential components, viz., abstraction, decomposition, algorithm design, and generalization. Computational thinking is often feted by computer scientists as a useful skill that can be used by anybody anywhere. However, it is necessary to find out ways for successfully using computational thinking in domains other than computer science before it can be declared a universal skill. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
97. Toward Psychoinformatics: Computer Science Meets Psychology.
- Author
-
Montag, Christian, Duke, Éilish, and Markowetz, Alexander
- Subjects
- *
COMPUTER science , *PSYCHOLOGY , *BIG data , *INFORMATION science , *NEUROSCIENCES - Abstract
The present paper provides insight into an emerging research discipline called Psychoinformatics. In the context of Psychoinformatics, we emphasize the cooperation between the disciplines of psychology and computer science in handling large data sets derived from heavily used devices, such as smartphones or online social network sites, in order to shed light on a large number of psychological traits, including personality and mood. New challenges await psychologists in light of the resulting “Big Data” sets, because classic psychological methods will only in part be able to analyze this data derived from ubiquitous mobile devices, as well as other everyday technologies. As a consequence, psychologists must enrich their scientific methods through the inclusion of methods from informatics. The paper provides a brief review of one area of this research field, dealing mainly with social networks and smartphones. Moreover, we highlight how data derived from Psychoinformatics can be combined in a meaningful way with data from human neuroscience. We close the paper with some observations of areas for future research and problems that require consideration within this new discipline. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
98. A New Asymptotic Notation: Weak Theta.
- Author
-
Mogoş, Andrei-Horia, Mogoş, Bianca, and Florea, Adina Magda
- Subjects
- *
THETA functions , *ALGORITHMS , *ARTIFICIAL intelligence , *COMPARATIVE studies , *COMPUTER science - Abstract
Algorithms represent one of the fundamental issues in computer science, while asymptotic notations are widely accepted as the main tool for estimating the complexity of algorithms. Over the years a certain number of asymptotic notations have been proposed. Each of these notations is based on the comparison of various complexity functions with a given complexity function. In this paper, we define a new asymptotic notation, called “Weak Theta,” that uses the comparison of various complexity functions with two given complexity functions. Weak Theta notation is especially useful in characterizing complexity functions whose behaviour is hard to be approximated using a single complexity function. In addition, in order to highlight the main particularities of Weak Theta, we propose and prove several theoretical results: properties of Weak Theta, criteria for comparing two complexity functions, and properties of a new set of complexity functions (also defined in the paper) based on Weak Theta. Furthermore, to illustrate the usefulness of our notation, we discuss an application of Weak Theta in artificial intelligence. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
99. Python for scientific computing education: Modeling of queueing systems.
- Author
-
Dolgopolovas, Vladimiras, Dagienė, Valentina, Minkevičius, Saulius, and Sakalauskas, Leonidas
- Subjects
PARALLEL programming ,COMPUTER systems ,COMPUTER science ,METHODOLOGY ,EDUCATORS ,CURRICULUM - Abstract
In this paper, we present the methodology for the introduction to scientific computing based on model-centered learning. We propose multiphase queueing systems as a basis for learning objects. We use Python and parallel programming for implementing the models and present the computer code and results of stochastic simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
100. A Survey on Distributed Filtering and Fault Detection for Sensor Networks.
- Author
-
Hongli Dong, Zidong Wang, Ding, Steven X., and Huijun Gao
- Subjects
- *
SENSOR networks , *DEBUGGING , *COMPUTER science , *ESTIMATION theory , *DATA structures , *INFORMATION storage & retrieval systems - Abstract
In recent years, theoretical and practical research on large-scale networked systems has gained an increasing attention from multiple disciplines including engineering, computer science, and mathematics. Lying in the core part of the area are the distributed estimation and fault detection problems that have recently been attracting growing research interests. In particular, an urgent need has arisen to understand the effects of distributed information structures on filtering and fault detection in sensor networks. In this paper, a bibliographical review is provided on distributed filtering and fault detection problems over sensor networks. The algorithms employed to study the distributed filtering and detection problems are categorised and then discussed. In addition, some recent advances on distributed detection problems for faulty sensors and fault events are also summarized in great detail. Finally, we conclude the paper by outlining future research challenges for distributed filtering and fault detection for sensor networks. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.