Filters








15 Hits in 9.9 sec

Construct Connotation Dictionary of Visual Symbols [chapter]

Ping Xiao, Ernesto Arroyo, Josep Blat
2009 Visual Information Communication  
This dictionary is driven by an automatic knowledge extraction method, which allows the dictionary entries to be dynamic, corresponding to specific cultures and time.  ...  There are a lot of clustering algorithms available. A proper algorithm has to be chosen based on the nature of datasets and what information to be mined out.  ...  Partitional algorithms take the whole collection of documents as one cluster at the beginning and then divide this cluster into a given number (k) of clusters directly or by a sequence of repeated bisections  ... 
doi:10.1007/978-1-4419-0312-9_7 dblp:conf/vinci/XiaoAB09 fatcat:kyyl2xlc4za5diqw2ebii26j44

Frontal Facial Pose Recognition Using a Discriminant Splitting Feature Extraction Procedure

Ioannis Marras, Nikos Nikolaidis, Ioannis Pitas
2011 Journal of Computing and Information Technology  
A novel frontal facial pose recognition technique that is based on discriminant image splitting for feature extraction is presented in this paper.  ...  Recognition of frontal poses is required as a preprocessing step to face analysis algorithms (e.g. face or facial expression recognition) that can operate only on frontal views.  ...  The method proposed in [3] uses a novel pose estimation algorithm based on mutual information to extract any required facial poses from video sequences.  ... 
doi:10.2498/cit.1002024 fatcat:5ud2qf3qxnf5baj6h44glrgw7u

PRNU-Based Content Forgery Localization Augmented With Image Segmentation

Xufeng Lin, Chang-Tsun Li
2020 IEEE Access  
credibility of digital images.  ...  Based on these criteria, we shortlist three superpixel algorithms for multi-scale segmentation: • Simple Linear Iterative Clustering (SLIC) [41] : SLIC algorithm iteratively updates superpixel centers  ... 
doi:10.1109/access.2020.3042780 fatcat:kcj7dfoq65bklfcwkxwxxli4zm

An overview on smart contracts: Challenges, advances and platforms

Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran
2019 Future generations computer systems  
Although smart contracts are promising to drive the new wave of innovation in business processes, there are a number of challenges to be tackled.This paper presents a survey on smart contracts.  ...  As a result, smart contracts can cut down administration and save services costs, improve the efficiency of business processes and reduce the risks.  ...  Each digital product is embedded with a unique digital watermark (such as buyer's digital wallet address and product ID).  ... 
doi:10.1016/j.future.2019.12.019 fatcat:usxpqm6vpzhefekeeukbwj4sku

Comparison-limited Vector Quantization [article]

Joseph Chataignon, Stefano Rini
2021 arXiv   pre-print
In this paper, we design a numerical optimization algorithm for the CLVQ problem.  ...  More precisely, we study the case in which a vector quantizer of dimension d is comprised of k comparators, each receiving a linear combination of the inputs and producing the output value one/zero if  ...  Acknowledgments: We would like to give thanks to Arnau Padrol from Sorbonne Université for his help on understanding oriented matroids.  ... 
arXiv:2105.14464v1 fatcat:jhlxwzgbfbbrfju7vtlqztacy4

2021 International Conference on Unmanned Aircraft Systems - Final program

2021 2021 International Conference on Unmanned Aircraft Systems (ICUAS)  
On behalf of the ICUAS Association Inc., and in my capacity as the President of the Association, it is a privilege, a great pleasure and an honor to welcome you to the 2021 International Conference on  ...  We are proud to greet and host this important scientific event that spans a three-day technical conference, preceded by a one-day Workshop/Tutorials program.  ...  This article proposes a novel strategy for detecting humans in harsh Sub-terranean (SubT) environments, with a thermal camera mounted on an aerial platform, based on the AlexNet Convolutional Neural Network  ... 
doi:10.1109/icuas51884.2021.9476682 fatcat:crdrcczqlbaebncnd76b47hfsu

FAPA: flooding attack protection architecture in a cloud system

Kazi Zunnurhain, Susan V. Vrbsky, Ragib Hasan
2014 International Journal of Cloud Computing  
While cloud computing can be productive and economical, it is still vulnerable to different types of external threats, one of which is a Denial of Service (DoS) attack.  ...  Rather than depending on cloud providers, we proposed a model, called FAPA (Flooding Attack Protection Architecture), to detect and filter packets when DoS attacks occur.  ...  Image-Based Virtual Machine Usually the newly created images are stored in this directory: /var/lib/libvirt/images.  ... 
doi:10.1504/ijcc.2014.066790 fatcat:fxkypiew6bbyfjrpu3bsi5ye7i

Fragments in Connection and Algorithmic Rule: Encoding the Urban Image in Motion

Christiane Wagner
2022 Zenodo  
Art, architecture, cinematography, and media as urban images in motion concerning digitalization are discussed based on the images of a result, success, conquest, and projection that search for the spectacular  ...  Therefore, media presence is discussed based on the algorithmic rule, which directs society towards a significant paradigm change concerning new spaces and times for concrete experiences.  ...  ACKNOWLEDGEMENTS ACKNOWLEDGEMENTS With kind thanks to Dr Dionisio González and Noémie Goudal for allowing copyright permission to reproduce the images within this paper.  ... 
doi:10.5281/zenodo.6503017 fatcat:iwebxttjgbcc5joe7bsmcmbcfe

Large Scale Studies of Memory, Storage, and Network Failures in a Modern Data Center [article]

Justin Meza
2019 arXiv   pre-print
single device can still have a widespread effect on a workload.  ...  We focus on three device types that form the foundation of Internet service data center infrastructure: DRAM for main memory, SSDs for persistent storage, and switches and backbone links for network connectivity  ...  On top of the physical fiber-based backbone, multiple WAN backbone networks satisfy the distinct requirements of two types of traffic labeled in Figure 2 .5: 1.  ... 
arXiv:1901.03401v1 fatcat:xizly26q6zebdovjosjpyw2o5q

A Modular and Fault-Tolerant Data Transport Framework [article]

Timm M. Steinbeck
2004 arXiv   pre-print
To cope with these data rates a large PC cluster system is being designed to scale to several 1000 nodes, connected by a fast network.  ...  For the software that will run on these nodes a flexible data transport and distribution software framework, described in this thesis, has been developed.  ...  A simple round-robin algorithm is used by the central AnnounceEvent method to select an output publisher for each event.  ... 
arXiv:cs/0404014v1 fatcat:ftxeu6xfkbew7hqtwj4i64x3au

Reflective-Physically Unclonable Function based System for Anti-Counterfeiting

Harsha Umesh Babu
2013
The concept of the reflective-PUF is presented as a product security solution. The viability of the concept, its evaluation and the requirements of such a system is explored.  ...  One can further combine watermarks for authentication purposes.  ...  This establishes the basis for using the digital printing process as a method for instantiating the r-PUF.  ... 
doi:10.5445/ir/1000038387 fatcat:iptmzxodcneodigftb754ky5x4

New Home Cemetery (41FB334): Archaeological Search Exhumation, and Reinterment of Multiple Historic Graves along FM 1464, Sugar Land, Fort Bend County, Texas

Mary Hill, Jeremy Pye
2012 Index of Texas Archaeology Open Access Grey Literature from the Lone Star State  
F2 Profile view of bisected Feature 1.  ...  Patents 2046840 and 2046837) on the same day for a screwdriver and the method for uniting a screw with a screwdriver.  ...  APPENDIX A ARTIFACT INVENTORY  ... 
doi:10.21112/ita.2012.1.1 fatcat:afc2phdup5a4lhuyfxwgiboj4y

Large Scale Studies of Memory, Storage, and Network Failures in a Modern Data Center

Justin Meza
2019
single device can still have a widespreadeffect on a workload.In this dissertation, we measure and model the device failures in a large scale Internet service company,Facebook.  ...  We focus on three device types that form the foundation of Internet service data centerinfrastructure: DRAM for main memory, SSDs for persistent storage, and switches and backbone linksfor network connectivity  ...  On top of the physical fiber-based backbone, multiple WAN backbone networks satisfy the distinct requirements of two types of traffic labeled in Figure 2 .5: 1.  ... 
doi:10.1184/r1/7571684 fatcat:x4xhbcuxkvg5niu3ghhe4vvnp4

A Modular and Fault-Tolerant Data Transport Framework

Timm Morten Steinbeck
2004
To cope with these data rates a large PC cluster system is being designed to scale to several 1000 nodes, connected by a fast network.  ...  For the software that will run on these nodes a flexible data transport and distribution software framework, described in this thesis, has been developed.  ...  A simple round-robin algorithm is used by the central AnnounceEvent method to select an output publisher for each event.  ... 
doi:10.11588/heidok.00004575 fatcat:a5cvcgskzndejfu56k66boepiy

A dynamics theory of justice : Nietzsche, Holmes, and self-organizing criticality

Murray James Braithwaite
2000
Conclusion: Holmes and Nietzsche applied a coherent theory of justice based on principles of causation and dynamics not widely accepted until the late twentieth [...]  ...  Friedrich Nietzsche is likewise presumed a critical philosopher without a coherent theory of justice. Nietzsche wrote esoterically, but there is no consensus on the content of his esoteric agenda.  ...  A parallel claim is made here. Commentators of Holmes using methods based on pre-chaos theory concepts were doomed to find him selfcontradictory.  ... 
doi:10.14288/1.0077426 fatcat:ieahuqclwja3zbsmnrf7u4gp5q