Intelligent Science and Intelligent Data Engineering: Third Sino-foreign-interchange Workshop, IScIDE 2012, Nanjing, China, October 15-17, 2012, Revised Selected Papers
... LSD algorithm can gives accurate results and requires no parameter tuning. The key steps of the LSD are illustrated in Fig. 2. The candidate lane markings extraction using LSD algorithm in ROI Fd are described as follow. Let S define a ...
Intelligence Science and Big Data Engineering. Image and Video Data Engineering: 5th International Conference, IScIDE 2015, Suzhou, China, June 14-16, 2015, Revised Selected Papers, Part I
... d3js.org/ VAST Challenge (2014). http://www.vacommunity.org/VAST+Challenge+2014 Non-negative Locality-Constrained Linear Coding for Image Classification GuoJun Liu(B), Yang Interactive Visual Analysis for Comprehensive Dataset 461.
Specifying Big Data Benchmarks: First Workshop, WBDB 2012, San Jose, CA, USA, May 8-9, 2012 and Second Workshop, WBDB 2012, Pune, India, December 17-18, 2012, Revised Selected Papers
... memory as we need. The RAM model is too simple, which covers up many real situations, such as division two numbers takes more time than adding two numbers in most cases, memory access times differ greatly depending on whether data sit ...
Intelligence Science and Big Data Engineering: 4th International Conference, IScIDE 2013, Beijing, China, July 31 -- August 2, 2013, Revised Selected Papers
... qoqa) q = q + q = q., 2(q, q, - qoq.) (2) 2(qiq's t q942) 2(q, q, – a q) q = q = q. Ha, So the relationship between attitude angle and quaternion can be expressed as follow: 6 = arcsin(2(qiq – qoq2)) 2(q243 + 4041) –++) qo = q = q2 + q2 ...
Intelligent Computer Mathematics: 11th International Conference, AISC 2012, 19th Symposium, Calculemus 2012, 5th International Workshop, DML 2012, 11th International Conference, MKM 2012, Systems and Projects, Held as Part of CICM 2012, Bremen, Germany, July 8-13, 2012, Proceedings
... uwo.ca Abstract. While writer-independent handwriting recognition systems are now achieving good recognition rates ... canvas is similar to traditional pen-on-paper input. It does not require learning any typesetting languages and can ...
Web-Age Information Management: WAIM 2012 International Workshops: GDMM 2012, IWSN 2012, MDSP 2012, USDM 2012, and XMLDM 2012, Harbin, China, August 18-20, 2012. Proceedings
... iSCSI Protocol for NAS Storage Solution in Wireless Environment* Shaikh ... works better than NAS for most * The research is supported by Basic Research ... iSCSI Protocol for NAS Storage Solution in Wireless Environment Introduction.
Usability- and Accessibility-Focused Requirements Engineering: First International Workshop, UsARE 2012, Held in Conjunction with ICSE 2012, Zurich, Switzerland, June 4, 2012 and Second International Workshop, UsARE 2014, Held in Conjunction with RE 2014, Karlskrona, Sweden, August 25, 2014, Revised Selected Papers
... CEPS, University of Central Lancashire, Preston PR1 2HE, UK {yfxu,jcread}@uclan.ac.uk Abstract. This chapter is bridging the gap of Human Computer Interaction (HCI) and Requirement Engineering (RE) where the intended users or ...
Machine Learning in Medical Imaging: Third International Workshop, MLMI 2012, Held in Conjunction with MICCAI 2012, Nice, France, October 1, 2012, Revised Selected Papers
... KTiATi Ww (i,i)− ∑ i,j ATi Kj KTiATi Ww (i,j) =ATKD wKTA − ATKWw KTA (10) =ATKLwKTA given Eq. (3). Here, A = [A1 ... template using HAMMER [11]. Fig. 2 illustrates some results from the fuzzy block matching method used to select the ...
Software Engineering and Knowledge Engineering: Theory and Practice: Selected papers from 2012 International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2012)
... routing standard, for example, in the shortest path routings, the closer ... design of routing protocols, the different powers result in different ... optimal path. However, the communication and interference radius will increase with the ...
Terror in Minnie Vautrin's Nanjing: Diaries and Correspondence, 1937-38
... Dr. Wu's request, I tried to work out a plan of dividing Ginling according to majors and the location of the students and faculty. Wang Ming-djen2 has made a careful study of the location of the student body and with that data in hand ...
Recent Advances in Data Science: Third International Conference on Data Science, Medicine, and Bioinformatics, IDMB 2019, Nanning, China, June 22–24, 2019, Revised Selected Papers
... options such as type, expiration, moneyness, and exchanges,etc. Three option datasets acquired by usingOptionGleaninclude options in 2015, 2017 and 2018. We name corresponding datasets as option data 2015, 2017 and 2018, which contain ...
Intelligence Science and Big Data Engineering: 7th International Conference, IScIDE 2017, Dalian, China, September 22-23, 2017, Proceedings
... IPL at CLEF 2016 medical task. In: CLEF (Working Notes) (2016) 8. Chang, C., Lin, C.: LIBSVM: a library for support ... Video Retrieval, pp. 401–408 (2007). ACM 27. Sikora, T.: The MPEG-7 visual standard for content description-an overview.
Chinese Lexical Semantics: 22nd Workshop, CLSW 2021, Nanjing, China, May 15–16, 2021, Revised Selected Papers, Part I
... X] [ling + X] [ruan + X] has a strong productivity in 1 + 2AN mode, [luo + X] [wei + X] also has a certain degree of productivity in 1 + 1AN mode. In the combination of adjectives and nouns in modern Chinese, words with the same number ...
Chinese Lexical Semantics: 22nd Workshop, CLSW 2021, Nanjing, China, May 15–16, 2021, Revised Selected Papers, Part II
... shifted backward nor removed. The sentence can neither be mentioned as ... Order. As pointed out above, most of “a 1 ” and “a 2 ” in structure A are in ... adjectives in structure A are in the same semantic category and are relatively high ...
Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers
... grid-based clustering techniques lack of the capability of dealing with data of high dimensionality, we propose an intersecting grid partition method and a density estimation method. The partition method can greatly reduce the number of ...
Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I
... backtrack to the gallery component. Alternatively, the user selects the website to publish the selected image (i.e. ... Android components and RESTful cloud services. Our prototype runtime platform consists of a workflow engine for Android ...
Scrutiny of arms export controls (2012): UK strategic export controls annual report 2010, quarterly reports for July to December 2010 and January to September 2011, the Government's review of arms exports to the Middle East and North Africa, and wider arms control issues, first joint report of session 2012-13, second report from the Business, Innovation and Skills Committee of session 2012-13; fourth report from the Defence Committee of session 2012-13; first report from the Foreign Affairs Committee of session 2012-13; second report from the International Development Committee of session 2012-13, Vol. 1: Report, together with formal minutes
UK strategic export controls annual report 2010, quarterly reports for July ... under each licence . The Business Minister , Mark Prisk , replied on 27 ... armour , military helmets 1,884 302 HC Deb , 27 March 2012 , Col 1136W Application ...
Cognitive Agents for Virtual Environments: First International Workshop, CAVE 2012, Held at AAMAS 2012, Valencia, Spain, June 4, 2012, Revised Selected Papers
... code, which is arguably required for larger behavior modifications as argued ... NeverWinter Nights game allowing non-programmers to create new game modules ... code that control the agent briefly, so-called behavior primitives (see Fig ...
Computational Forensics: 5th International Workshop, IWCF 2012, Tsukuba, Japan, November 11, 2012 and 6th International Workshop, IWCF 2014, Stockholm, Sweden, August 24, 2014, Revised Selected Papers
... L.J.Spreeuwers,R.N.J.Veldhuis}@ewi.utwente.nl 2 Biometric Recognition Group ... mugshots or good quality image(s) taken from the suspect. In this work we ... mug shots while probe set consist of low quality CCTV camera images. Face images ...
Chinese Lexical Semantics: 13th Workshop, CLSW 2012, Wuhan, China, July 6-8, 2012, Revised Selected Papers
... Tongyici Cilin[7] to find out all words having the similar meaning with the sample word, and apply a word semantic similarity algorithm [8] designed for the Tongyici Cilin. We collect the words or phrases which semantic similarity with ...
Intelligent Data analysis and its Applications, Volume II: Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China
... study adopts the single-chip system Arduino develop board [5]. The develop board has ... Module XBee is designed by Digi International Company for network standard ... meters, respectively, due to the low energy consumption. 2.4 Cloud End ...
Adaptive Multimedia Retrieval: Semantics, Context, and Adaptation: 10th International Workshop, AMR 2012, Copenhagen, Denmark, October 24-25, 2012, Revised Selected Papers
... Picasa, Flickr and Panoramio using both keywords and GPS based search. We use 107 Italian monument locations, from the least known to the grand public to the most famous ones, and a data set of over 25.000 images retrieved from Picasa, ...
Computer and Computing Technologies in Agriculture VI: 6th IFIP WG 5.14 International Conference, CCTA 2012, Zhangjiajie, China, October 19-21, 2012, Revised Selected Papers, Part I
... macro-state represents the growth unit. Blade element, the meristematic unit of plant, is represented by sub-state. Since the growth unit is composed of blade elements, macro-state is constituted by sub-states, moreover, the blade ...
Data Science and Analytics: 4th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2017, Gurgaon, India, October 13-14, 2017, Revised Selected Papers