Published Papers Search
[IJACT] Ontology based Image Semantics Recognition using Description Logics
, Xu Chuanyun, Zhang Yang, Yang Dan, "Ontology based Image Semantics Recognition using Description Logics", IJACT, Vol. 3, No. 10, pp. 1 ~ 8, 2011
Aimed at the lack of methods to describe image semantics and map low level semantics to high level semantics, Hiberarchy Model of Image Semantic is designed to extract image features from inherent information and stratify image semantics according to abstract degree, and Ontology based Hiberarchy...
[IJACT] Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches
Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu, "Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches", IJACT, Vol. 2, No. 1, pp. 41 ~ 63, 2010
The goal for video game AI (artificial intelligence) is to generate AI that is both challengeable and satisfactory. Most existing game AI is implemented by FSM (finite state machine) which has drawbacks in the three respects: requirement of designer?™s intensive participation; no existence of meta-pr...
[JCIT] A New Method of Tank Detection for SAR Images
Huozhen Hu, Jinwen Tian, Guangming Dai, Maocai Wang, "A New Method of Tank Detection for SAR Images", JCIT, Vol. 6, No. 11, pp. 441 ~ 449, 2011
The tank is one of important military targets. Tanks detection is the study focus of the synthetic aperture radar(SAR) image processing currently. But there may be many false alarms existed in the detection result with most of the traditional tank detection methods affected by the SAR speckle. A n...
[JDCTA] Practicability of Dataspace Systems
Hamid Turab Mirza, Ling Chen, Gencai Chen , "Practicability of Dataspace Systems", JDCTA, Vol. 4, No. 3, pp. 233 ~ 243, 2010
Nowadays there is rarely a scenario where all the data can be fit nicely into one relational database management system or any other single data model. In acknowledgement of this fact a new concept of Dataspaces was introduced, according to which a dataspace system is assumed to be a hybrid of a sea...
[IJIPM] A Decentralized Attribute Management Method and its Implementation
Yoshio KAKIZAKI and Hidekazu TSUJI, "A Decentralized Attribute Management Method and its Implementation", IJIPM, Vol. 3, No. 1, pp. 61 ~ 69, 2012
Individual attributes such as name, sex, date of birth, address, job, and affiliation are private and must be secured. A centralized management system for attribute information has a critical problem in that it cannot verify, guarantee, and authorize all of the attributes. To solve these problems,...
[AISS] Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature
Lei Chen, Mingran Deng, "Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature", AISS, Vol. 3, No. 10, pp. 1 ~ 11, 2011
Main structure of a steel bridge and iron tower is mainly composed of plates and angle steels, which posses ten thousands of high strength bolts. Bolts information obtained through artificial estimation or shaft and hole assembly feature number is not accurate. Focusing on this problem, the metho...
[JDCTA] Utilizing Hybrid Method for Video Image Compression
Assist Dr. Prof. Abbas M. AL-Bakry, Assist Prof. Baheeja Kuthaier shukur, "Utilizing Hybrid Method for Video Image Compression", JDCTA, Vol. 5, No. 11, pp. 1 ~ 7, 2011
Video compression techniques play a vital role in storage & transmission through a limited bandwidth. As a resulted containing video files repeated sequence of still image, each second represented by 24 images or more which is represent the motion in video file. The repeated sequence generates a ...
[JCIT] Overview of Virtual Reality Apply to Sports
Xiang LIU ¢Ó, Jinhai SUN, Yaping HE, Yimin LIU, Li CAO, "Overview of Virtual Reality Apply to Sports", JCIT, Vol. 6, No. 12, pp. 1 ~ ~ ~ 7, 2011
Summarized sports simulation systems based virtual reality. The function include construction of virtual training scenarios, sports data capture, physiological and psychological data acquisition, action reproduce and training effectiveness icon analysis. The key technologies include physical and ...
[JDCTA] Robust Digital Image Watermarking Based on Joint DWT-DCT
Saeed K. Amirgholipour , Ahmad R. Naghsh-Nilchi, , "Robust Digital Image Watermarking Based on Joint DWT-DCT ", JDCTA, Vol. 3, No. 2, pp. 42 ~ 54, 2009
In this paper, a new robust digital image watermarking algorithm based on Joint DWT-DCT Transformation is proposed. A binary watermarked logo is scrambled by Arnold cat map and embedded in certain coefficient sets of a 3-level DWT transformed of a host image. Then, DCT transform of each se...
[IJACT] Automatic 3D Whole Heart Registration-Based Segmentation Using Mutual Information and B-Splines
, Ken Cai, , Rong-qian Yang, Li-hua Li, Xiao-ming Wu, "Automatic 3D Whole Heart Registration-Based Segmentation Using Mutual Information and B-Splines", IJACT, Vol. 3, No. 11, pp. 1 ~ 8, 2011
Extracting the anatomical information of whole heart to computed tomography (CT) images is important in both anatomic and functional studies of human heart. The most recent advances in image segmentation adopt an interactive approach. That approach is prone inconsistency and variability, such as,...
|<< <           > >>|