Published Papers Search
[IJACT] Ontology based Image Semantics Recognition using Description Logics
, Xu Chuanyun, Zhang Yang, Yang Dan, "Ontology based Image Semantics Recognition using Description Logics", IJACT, Vol. 3, No. 10, pp. 1 ~ 8, 2011
Aimed at the lack of methods to describe image semantics and map low level semantics to high level semantics, Hiberarchy Model of Image Semantic is designed to extract image features from inherent information and stratify image semantics according to abstract degree, and Ontology based Hiberarchy...
[IJACT] Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches
Suoju He, Yuan Gao, Jiajian Yang, Yiwen Fu, Xiao Liu, "Creating Challengeable and Satisfactory Game Opponent by the Use of CI Approaches", IJACT, Vol. 2, No. 1, pp. 41 ~ 63, 2010
The goal for video game AI (artificial intelligence) is to generate AI that is both challengeable and satisfactory. Most existing game AI is implemented by FSM (finite state machine) which has drawbacks in the three respects: requirement of designer?ôs intensive participation; no existence of meta-pr...
[JCIT] A New Method of Tank Detection for SAR Images
Huozhen Hu, Jinwen Tian, Guangming Dai, Maocai Wang, "A New Method of Tank Detection for SAR Images", JCIT, Vol. 6, No. 11, pp. 441 ~ 449, 2011
The tank is one of important military targets. Tanks detection is the study focus of the synthetic aperture radar(SAR) image processing currently. But there may be many false alarms existed in the detection result with most of the traditional tank detection methods affected by the SAR speckle. A n...
[JDCTA] Practicability of Dataspace Systems
Hamid Turab Mirza, Ling Chen, Gencai Chen , "Practicability of Dataspace Systems", JDCTA, Vol. 4, No. 3, pp. 233 ~ 243, 2010
Nowadays there is rarely a scenario where all the data can be fit nicely into one relational database management system or any other single data model. In acknowledgement of this fact a new concept of Dataspaces was introduced, according to which a dataspace system is assumed to be a hybrid of a sea...
[IJIPM] A Decentralized Attribute Management Method and its Implementation
Yoshio KAKIZAKI and Hidekazu TSUJI, "A Decentralized Attribute Management Method and its Implementation", IJIPM, Vol. 3, No. 1, pp. 61 ~ 69, 2012
Individual attributes such as name, sex, date of birth, address, job, and affiliation are private and must be secured. A centralized management system for attribute information has a critical problem in that it cannot verify, guarantee, and authorize all of the attributes. To solve these problems,...
[IJACT] Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis
Gang Lu, Kevin Lu, "Logical Trees: an Essential Method of Parsing SQL Statement with Semantic Analysis", IJACT, Vol. 5, No. 1, pp. 270 ~ 278, 2013
Comparing where sub-clauses between different SQL statements is important in analyzing SQL statements, which is usually the key for databases security. Comparing them literally is not sufficient, because there may be different character strings for the same semantic structure. A method called Log...
[JDCTA] Robust Digital Image Watermarking Based on Joint DWT-DCT
Saeed K. Amirgholipour , Ahmad R. Naghsh-Nilchi, , "Robust Digital Image Watermarking Based on Joint DWT-DCT ", JDCTA, Vol. 3, No. 2, pp. 42 ~ 54, 2009
In this paper, a new robust digital image watermarking algorithm based on Joint DWT-DCT Transformation is proposed. A binary watermarked logo is scrambled by Arnold cat map and embedded in certain coefficient sets of a 3-level DWT transformed of a host image. Then, DCT transform of each se...
[AISS] Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature
Lei Chen, Mingran Deng, "Study on Algorithm of Statistics for Bolts Information of Steel Bridge and Iron Tower Based on Assembly Feature", AISS, Vol. 3, No. 10, pp. 1 ~ 11, 2011
Main structure of a steel bridge and iron tower is mainly composed of plates and angle steels, which posses ten thousands of high strength bolts. Bolts information obtained through artificial estimation or shaft and hole assembly feature number is not accurate. Focusing on this problem, the metho...
[JDCTA] Utilizing Hybrid Method for Video Image Compression
Assist Dr. Prof. Abbas M. AL-Bakry, Assist Prof. Baheeja Kuthaier shukur, "Utilizing Hybrid Method for Video Image Compression", JDCTA, Vol. 5, No. 11, pp. 1 ~ 7, 2011
Video compression techniques play a vital role in storage & transmission through a limited bandwidth. As a resulted containing video files repeated sequence of still image, each second represented by 24 images or more which is represent the motion in video file. The repeated sequence generates a ...
[JCIT] Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm
Lee, Suk Jun, Jeong, Suk Jae, "Trading Strategies based on Pattern Recognition in Stock Futures Market using Dynamic Time Warping Algorithm", JCIT, Vol. 7, No. 10, pp. 185 ~ 196, 2012
Traditional technical analysis is forecasting the up and down trends in the stock market. However, it is difficult to apply technical analysis directly because it relies on human experience to select optimal strategies for individual stocks. Thus, a stock market trading system has been developed t...
|<< <           > >>|