To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan charac...To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan character sample image the first level approximation component of the Haar wavelet transform is calculated.Secondly the approximation component is partitioned into several equal-sized zones. Finally the gradient direction histograms of each zone are calculated and the local direction histograms of the approximation component are considered as the features of the character sample image.The proposed method is tested on the recently developed off-line Tibetan handwritten character sample database.The experimental results demonstrate the effectiveness and efficiency of the proposed feature extraction method.Furthermore compared with the detail components the approximation component contributes more to the recognition accuracy.展开更多
When modeling wave propagation in infinite space, it is necessary to have stable absorbing boundaries to effectively eliminate spurious reflections from the truncation boundaries. The SH wave equations for Perfectly M...When modeling wave propagation in infinite space, it is necessary to have stable absorbing boundaries to effectively eliminate spurious reflections from the truncation boundaries. The SH wave equations for Perfectly Matched Layers (PML) are deduced and their Crank-Nicolson scheme are presented in this paper. We use the second-, sixth-, and tenth-order finite difference and pseudo-spectral algorithms to compute the spatial derivatives. Two numerical models, a homogeneous isotropic medium and a multi-layer model with a cave, are designed to investigate how the absorbing boundary width and the algorithms determine PML effects. Numerical results show that, for PML, the low-order finite difference algorithms have fairly good absorbing effects when the absorbing boundary is thin, whereas, high-order algorithms always have good absorption when the boundary is thick. Finally, we discuss the reflection coefficient and point out its shortcomings, which is why we use the SNR to quantitatively scale the PML effects,展开更多
To reduce the cost, size and complexity, a consumer digital camera usually uses a single sensor overlaid with a color filter array(CFA) to sample one of the red-green-blue primary color values, and uses demosaicking a...To reduce the cost, size and complexity, a consumer digital camera usually uses a single sensor overlaid with a color filter array(CFA) to sample one of the red-green-blue primary color values, and uses demosaicking algorithm to estimate the missing color values at each pixel. A novel image correlation and support vector machine(SVM) based edge-adaptive algorithm was proposed, which can reduce edge artifacts and false color artifacts, effectively. Firstly, image pixels were separated into edge region and smooth region with an edge detection algorithm. Then, a hybrid approach switching between a simple demosaicking algorithm on the smooth region and SVM based demosaicking algorithm on the edge region was performed. Image spatial and spectral correlations were employed to create middle planes for the interpolation. Experimental result shows that the proposed approach produced visually pleasing full-color result images and obtained higher CPSNR and smaller S-CIELAB*ab?E than other conventional demosaicking algorithms.展开更多
This paper introduces an image processing technique into seismic data processing as a noise attenuation technology. The image separation of the seismic profile is obtained by using grating operators based on different...This paper introduces an image processing technique into seismic data processing as a noise attenuation technology. The image separation of the seismic profile is obtained by using grating operators based on different time dips and a set of relative single dip profiles is obtained. A high signal to noise ratio profile can be obtained during reconstruction by statistical weighting. With further processing analysis and geological study, a high signal to noise profile that can meet geological requirements can be produced. The real data examples show that the signal to noise ratio of the profile is greatly improved, the resolution of the profile is maintained, and the fault terminations are much clearer after using the image processing method.展开更多
This paper discusses a neglected theme in Wittgenstein's writings on meaning and psychology from the early 1930s until 1949. Throughout this period Wittgenstein deals with aspects of meaning of words and pictures tha...This paper discusses a neglected theme in Wittgenstein's writings on meaning and psychology from the early 1930s until 1949. Throughout this period Wittgenstein deals with aspects of meaning of words and pictures that cannot be accounted for in dispositional terms but have to be related to experience and perception. Wittgenstein's reading of William James, I argue, has sharpened his eye for the many pitfalls in coming to terms with this experiential notion of meaning. James's treatment of experiences of meaning succumbs to the temptation to postulate ~~meaning-bodies," bearers of meaning apart from the way and context in which we use the particular words. I argue that the conflation of what Wittgenstein calls the transitive and intransitive use of words is at the root of postulating meaning-bodies. I also argue that contemporary treatments of experiences of meaning are similarly vulnerable to James's confusion.展开更多
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t...In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing.展开更多
A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inhe...A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.展开更多
This paper starts with a description of the present status of the Digital Library of India Initiative. As part of this initiative large corpus of scanned text is available in many Indian languages and has stimulated a...This paper starts with a description of the present status of the Digital Library of India Initiative. As part of this initiative large corpus of scanned text is available in many Indian languages and has stimulated a vast amount of research in Indian language technology briefly described in this paper. Other than the Digital Library of India Initiative which is part of the Million Books to the Web Project initiated by Prof Raj Reddy of Carnegie Mellon University, there are a few more initiatives in India towards taking the heritage of the country to the Web. This paper presents the future directions for the Digital Library of India Initiative both in terms of growing collection and the technical challenges in managing such large collection poses.展开更多
A new set of steps for dividing process, the Reversed Dividing Process, is introduced, in which the position based number representation digits for the value of l/X are reversely output one by one compared with digit ...A new set of steps for dividing process, the Reversed Dividing Process, is introduced, in which the position based number representation digits for the value of l/X are reversely output one by one compared with digit output order of the normal dividing process.展开更多
In this paper we mainly discuss the nonconforming fimte element method for second order elliptic boundary value problems on anisotropic meshes. By changing thediscretization form(i.e., by use of numerical quadrature ...In this paper we mainly discuss the nonconforming fimte element method for second order elliptic boundary value problems on anisotropic meshes. By changing thediscretization form(i.e., by use of numerical quadrature in the procedure of computing the left load), we obtain the optimal estimate O(h), which is as same as in the traditionalfinite element analysis when the load f ∈ H1 (Ω)η Co(Ω) which is weaker than the previousstudies. The results obtained in this paper are also valid to the conforming triangular elementand nonconforming Carey's element.展开更多
To increase accuracy of navigation parameters,a perspective measuring complex with intellectual components is developed.Conception of synthesis optimal structure of the measuring complex is realized basing on a select...To increase accuracy of navigation parameters,a perspective measuring complex with intellectual components is developed.Conception of synthesis optimal structure of the measuring complex is realized basing on a selective method using principles of the functional systems.Selection of measured information is finished by original numeric criterion of observation level of state vector components.Prediction is realized by algorithm of self-organization that makes synthesis of the optimal complication.Therefore mechanism of self-regulation is realized and accuracy of the selective navigation complex is increased.展开更多
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du...Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.展开更多
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u...With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.展开更多
Since webpage classification is different from traditional text classification with its irregular words and phrases,massive and unlabeled features,which makes it harder for us to obtain effective feature.To cope with ...Since webpage classification is different from traditional text classification with its irregular words and phrases,massive and unlabeled features,which makes it harder for us to obtain effective feature.To cope with this problem,we propose two scenarios to extract meaningful strings based on document clustering and term clustering with multi-strategies to optimize a Vector Space Model(VSM) in order to improve webpage classification.The results show that document clustering work better than term clustering in coping with document content.However,a better overall performance is obtained by spectral clustering with document clustering.Moreover,owing to image existing in a same webpage with document content,the proposed method is also applied to extract image meaningful terms,and experiment results also show its effectiveness in improving webpage classification.展开更多
With SAM shear-wave splitting analysis,shear-wave splitting parameters at two stations of the digital seismic network in the northeast of Hainan are obtained based on the data from the Hainan Digital Seismic Network f...With SAM shear-wave splitting analysis,shear-wave splitting parameters at two stations of the digital seismic network in the northeast of Hainan are obtained based on the data from the Hainan Digital Seismic Network from 2000 to 2013. The results show that the predominant polarization direction of fast share-wave represents the direction of in-situ maximum principal compressive stress. The predominant polarizations of Qixingling( QXL) seismic station are in the NEE direction,which is different from the direction of principal compressive stress of the Hainan area,but same as the strikes of faults in the NE direction,which means that the local tectonics and stress fields are complicated. The predominant polarization of Qingshanling( QSL) seismic station is in the NNE-NS direction,which indicates the tectonic significance of the strikes of NNE-trending faults.At the same time,the study confirms that the predominant polarizations of the stations located on active faults or at the junctions of several active faults are parallel to the strikes of faults which control the earthquakes used in this analysis, and the predominant polarizations are scattered,which indicates the complicated background of fault structures and stress distribution.展开更多
Effects of transverse loads on longitudinal stress strain behaviors and longitudinal constant tensile loads on transverse stress strain behaviors of single ply of nylon cord rubber composite are studied respectively u...Effects of transverse loads on longitudinal stress strain behaviors and longitudinal constant tensile loads on transverse stress strain behaviors of single ply of nylon cord rubber composite are studied respectively under biaxial tensile condition with cruciform specimen. Effects of transverse constant tensile load on longitudinal tensile mechanical properties are indistinctive compared with corresponding uniaxial longitudinal tensile mechanical properties. It can be relative to larger difference between longitudinal and transverse mechanical properties. Its dominating failure mode is typical fiber dominated mode; However, Experiment results indicate that transverse mechanical properties of nylon cord rubber composite with longitudinal constant tensile loads are distinct from its uniaxial transverse tensile mechanical properties. It can be attribute to action of longitudinal tension that makes material rigidify in the direction perpendicular to fiber, Mode of failure is representative of matrix dominated failure. For the measurement of large deformation up to 50 percent, a special CCD imaging method is employed in the experimental investigation that makes measurement of large deformations more precise.展开更多
This paper mainly revolves the time-frequency image of low probability of intercept(LPI) radar signals and carries out research work on image features selection and extraction and recognition. Since Choi-Williams dist...This paper mainly revolves the time-frequency image of low probability of intercept(LPI) radar signals and carries out research work on image features selection and extraction and recognition. Since Choi-Williams distribution(CWD) uses the exponential kernel of bilinear generalized class of time-frequency distribution, it has an excellent time-frequency aggregation. And it is suitable for detecting LPI radar signals in a low signal-to-noise ratio(SNR) condition. A radial integration method based on the integral rotating factor is proposed to detect LPI radar signals when the signals' time-frequency image is obtained. First, the digital image processing method is used to preprocess the LPI radar signals' time-frequency images after CWD transformation; then, the radial integration method based on the integral rotating factor is used to detect LPI radar signals in the binary images. The analytic results of real data show that the method has a good performance on detecting LPI radar signals in a low SNR condition. Additionally,the method is simple and takes less logic resources and has the potential of real-time detection of LPI radar signals.展开更多
基金The National Natural Science Foundation of China(No.60963016)the National Social Science Foundation of China(No.17BXW037)
文摘To improve the recognition accuracy of off-line handwritten Tibetan characters the local gradient direction histograms based on the wavelet transform are proposed as the recognition features.First for a Tibetan character sample image the first level approximation component of the Haar wavelet transform is calculated.Secondly the approximation component is partitioned into several equal-sized zones. Finally the gradient direction histograms of each zone are calculated and the local direction histograms of the approximation component are considered as the features of the character sample image.The proposed method is tested on the recently developed off-line Tibetan handwritten character sample database.The experimental results demonstrate the effectiveness and efficiency of the proposed feature extraction method.Furthermore compared with the detail components the approximation component contributes more to the recognition accuracy.
基金supported jointly by the 973 Program (Grant No.2007CB209505)the National Natural Science Fund (Grant No.40704019,40674061)+1 种基金the School Basic Research Fund of Tsinghua University (JC2007030)PetroChina Innovation Fund (Grant No.060511-1-1)
文摘When modeling wave propagation in infinite space, it is necessary to have stable absorbing boundaries to effectively eliminate spurious reflections from the truncation boundaries. The SH wave equations for Perfectly Matched Layers (PML) are deduced and their Crank-Nicolson scheme are presented in this paper. We use the second-, sixth-, and tenth-order finite difference and pseudo-spectral algorithms to compute the spatial derivatives. Two numerical models, a homogeneous isotropic medium and a multi-layer model with a cave, are designed to investigate how the absorbing boundary width and the algorithms determine PML effects. Numerical results show that, for PML, the low-order finite difference algorithms have fairly good absorbing effects when the absorbing boundary is thin, whereas, high-order algorithms always have good absorption when the boundary is thick. Finally, we discuss the reflection coefficient and point out its shortcomings, which is why we use the SNR to quantitatively scale the PML effects,
基金Projects(51174258,11105002)supported by the National Natural Science Foundation of ChinaProject(KJ2013B087)supported by Anhui Provincial Natural Science Research Projects in Central Universities,China+1 种基金Projects(2011B31,2013A4017)support by the Guidance Science and Technology Plan Projects of Huainan,ChinaProject(2012QNZ06)supported by the Youth Foundation of Anhui University of Science&technology of China
文摘To reduce the cost, size and complexity, a consumer digital camera usually uses a single sensor overlaid with a color filter array(CFA) to sample one of the red-green-blue primary color values, and uses demosaicking algorithm to estimate the missing color values at each pixel. A novel image correlation and support vector machine(SVM) based edge-adaptive algorithm was proposed, which can reduce edge artifacts and false color artifacts, effectively. Firstly, image pixels were separated into edge region and smooth region with an edge detection algorithm. Then, a hybrid approach switching between a simple demosaicking algorithm on the smooth region and SVM based demosaicking algorithm on the edge region was performed. Image spatial and spectral correlations were employed to create middle planes for the interpolation. Experimental result shows that the proposed approach produced visually pleasing full-color result images and obtained higher CPSNR and smaller S-CIELAB*ab?E than other conventional demosaicking algorithms.
基金This research is sponsored by China National Natural Science Foundation (No. 40574050, No. 40521002) and CNPC Innovation Fund (04E702).
文摘This paper introduces an image processing technique into seismic data processing as a noise attenuation technology. The image separation of the seismic profile is obtained by using grating operators based on different time dips and a set of relative single dip profiles is obtained. A high signal to noise ratio profile can be obtained during reconstruction by statistical weighting. With further processing analysis and geological study, a high signal to noise profile that can meet geological requirements can be produced. The real data examples show that the signal to noise ratio of the profile is greatly improved, the resolution of the profile is maintained, and the fault terminations are much clearer after using the image processing method.
文摘This paper discusses a neglected theme in Wittgenstein's writings on meaning and psychology from the early 1930s until 1949. Throughout this period Wittgenstein deals with aspects of meaning of words and pictures that cannot be accounted for in dispositional terms but have to be related to experience and perception. Wittgenstein's reading of William James, I argue, has sharpened his eye for the many pitfalls in coming to terms with this experiential notion of meaning. James's treatment of experiences of meaning succumbs to the temptation to postulate ~~meaning-bodies," bearers of meaning apart from the way and context in which we use the particular words. I argue that the conflation of what Wittgenstein calls the transitive and intransitive use of words is at the root of postulating meaning-bodies. I also argue that contemporary treatments of experiences of meaning are similarly vulnerable to James's confusion.
基金supported by National Natural Science Foundation of China (NSFC grant number:61202110,61401180 and 61502205)the Postdoctoral Science Foundation of China (Grant number:2015M571687 and 2015M581739)the Graduate Research Innovation Project of Jiangsu Province(KYLX15_1079 and KYLX16_0900)
文摘In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing.
基金Project supported by the National Natural Science Foundation of China (No. 40271056) Hubei Provin- cial Natural Science Foundation of China (No. 99J123).
文摘A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.
文摘This paper starts with a description of the present status of the Digital Library of India Initiative. As part of this initiative large corpus of scanned text is available in many Indian languages and has stimulated a vast amount of research in Indian language technology briefly described in this paper. Other than the Digital Library of India Initiative which is part of the Million Books to the Web Project initiated by Prof Raj Reddy of Carnegie Mellon University, there are a few more initiatives in India towards taking the heritage of the country to the Web. This paper presents the future directions for the Digital Library of India Initiative both in terms of growing collection and the technical challenges in managing such large collection poses.
文摘A new set of steps for dividing process, the Reversed Dividing Process, is introduced, in which the position based number representation digits for the value of l/X are reversely output one by one compared with digit output order of the normal dividing process.
基金Supported by NNSF of China(10371113)Supported by Foundation of Overseas Scholar of Chin&((2001)119)Supported by the project of Creative Engineering of Henan Province of China
文摘In this paper we mainly discuss the nonconforming fimte element method for second order elliptic boundary value problems on anisotropic meshes. By changing thediscretization form(i.e., by use of numerical quadrature in the procedure of computing the left load), we obtain the optimal estimate O(h), which is as same as in the traditionalfinite element analysis when the load f ∈ H1 (Ω)η Co(Ω) which is weaker than the previousstudies. The results obtained in this paper are also valid to the conforming triangular elementand nonconforming Carey's element.
文摘To increase accuracy of navigation parameters,a perspective measuring complex with intellectual components is developed.Conception of synthesis optimal structure of the measuring complex is realized basing on a selective method using principles of the functional systems.Selection of measured information is finished by original numeric criterion of observation level of state vector components.Prediction is realized by algorithm of self-organization that makes synthesis of the optimal complication.Therefore mechanism of self-regulation is realized and accuracy of the selective navigation complex is increased.
基金This work was supported by China Nature Science Fund .Serial No.60073059and60273078
文摘Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.
文摘With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.
基金supported by the National Natural Science Foundation of China under Grants No.61100205,No.60873001the HiTech Research and Development Program of China under Grant No.2011AA010705the Fundamental Research Funds for the Central Universities under Grant No.2009RC0212
文摘Since webpage classification is different from traditional text classification with its irregular words and phrases,massive and unlabeled features,which makes it harder for us to obtain effective feature.To cope with this problem,we propose two scenarios to extract meaningful strings based on document clustering and term clustering with multi-strategies to optimize a Vector Space Model(VSM) in order to improve webpage classification.The results show that document clustering work better than term clustering in coping with document content.However,a better overall performance is obtained by spectral clustering with document clustering.Moreover,owing to image existing in a same webpage with document content,the proposed method is also applied to extract image meaningful terms,and experiment results also show its effectiveness in improving webpage classification.
基金founded by the Scientific and Technological Program of Earthquake Administration of Hainan Province(2013)
文摘With SAM shear-wave splitting analysis,shear-wave splitting parameters at two stations of the digital seismic network in the northeast of Hainan are obtained based on the data from the Hainan Digital Seismic Network from 2000 to 2013. The results show that the predominant polarization direction of fast share-wave represents the direction of in-situ maximum principal compressive stress. The predominant polarizations of Qixingling( QXL) seismic station are in the NEE direction,which is different from the direction of principal compressive stress of the Hainan area,but same as the strikes of faults in the NE direction,which means that the local tectonics and stress fields are complicated. The predominant polarization of Qingshanling( QSL) seismic station is in the NNE-NS direction,which indicates the tectonic significance of the strikes of NNE-trending faults.At the same time,the study confirms that the predominant polarizations of the stations located on active faults or at the junctions of several active faults are parallel to the strikes of faults which control the earthquakes used in this analysis, and the predominant polarizations are scattered,which indicates the complicated background of fault structures and stress distribution.
文摘Effects of transverse loads on longitudinal stress strain behaviors and longitudinal constant tensile loads on transverse stress strain behaviors of single ply of nylon cord rubber composite are studied respectively under biaxial tensile condition with cruciform specimen. Effects of transverse constant tensile load on longitudinal tensile mechanical properties are indistinctive compared with corresponding uniaxial longitudinal tensile mechanical properties. It can be relative to larger difference between longitudinal and transverse mechanical properties. Its dominating failure mode is typical fiber dominated mode; However, Experiment results indicate that transverse mechanical properties of nylon cord rubber composite with longitudinal constant tensile loads are distinct from its uniaxial transverse tensile mechanical properties. It can be attribute to action of longitudinal tension that makes material rigidify in the direction perpendicular to fiber, Mode of failure is representative of matrix dominated failure. For the measurement of large deformation up to 50 percent, a special CCD imaging method is employed in the experimental investigation that makes measurement of large deformations more precise.
文摘This paper mainly revolves the time-frequency image of low probability of intercept(LPI) radar signals and carries out research work on image features selection and extraction and recognition. Since Choi-Williams distribution(CWD) uses the exponential kernel of bilinear generalized class of time-frequency distribution, it has an excellent time-frequency aggregation. And it is suitable for detecting LPI radar signals in a low signal-to-noise ratio(SNR) condition. A radial integration method based on the integral rotating factor is proposed to detect LPI radar signals when the signals' time-frequency image is obtained. First, the digital image processing method is used to preprocess the LPI radar signals' time-frequency images after CWD transformation; then, the radial integration method based on the integral rotating factor is used to detect LPI radar signals in the binary images. The analytic results of real data show that the method has a good performance on detecting LPI radar signals in a low SNR condition. Additionally,the method is simple and takes less logic resources and has the potential of real-time detection of LPI radar signals.