Somecolor quantization problems concerning quantization of a color image into a fewnumbers of colors are discussed. In the HSV color space that is the best visualidentity of people, H is uniform quantified, S and V is respectivelynon-uniform quantified.Aimed at the limitation of Euclidean distance failing to consider thesimilarity between colors in the process of retrieval, a color similaritymatrix is introduced. Experimental result shows this algorithm is of certainpracticability and the quantization effect is also comparatively ideal whenmaking similarity matching
Facial expression analysis is important in Human-Computer Interaction. How to improve the accuracy and objectivity of analysis should be concerned about. In this paper, a novel approach to context-aware based facial expression nets model is proposed. According to interactive environment’s characteristics and the relationship between context factors and facial expression features, CFEN model is constructed and applied to compute and analyze participant’s realistic facial expression in the context environment. It is possible to achieve facial expression’s knowledge representation and reasoning analysis. Experiment is designed and conducted to verify the theoretical model and approach proposed in this paper.
we propose an effective approach to obtain software security vulnerabilities in web with vertical search technique in this paper. We use a keyword-trainer to get domain keywords in software security domain. Then the web page filter is designed after analyzing the obtained domain keywords and the structure of the URL topology. Finally, we design a vertical search crawler based on the webpage filter to search for the information of software security vulnerabilities in Web. This approach effectively discovers and digs out the information of software security vulnerabilities presenting in Web. It helps provides the primary knowledge and information for constructing security-knowledge database and analyze the vulnerabilities of software.
It is urgent that detect the duplication in large scale text in the Web. An arithmetic based on language rhythm for text duplication detection is proposed here. Get the nature rhythm marked by punctuations in text and build the rhythm compare matrix to complete the publication detection for each paragraph. This arithmetic is different with the other one which is based on words analysis. And it has a high accuracy and a low complicacy.
In recent years, the security of software becomes one significant feature of software. This paper improves trustworthy software engineering through a knowledge based expert system. We propose the knowledge collection and organization method, and threats analyzing algorithm in detail which are the kernel of the expert system. The software threat information is divided into threat state and exploit, and stored in the knowledge database together with the state production and exploit production representing the relationships between threat state and exploit. The threat analysis calculates the threat degree quantitatively of an application based on this knowledge in a formal way and give security advice to mitigate threats. Our method can reduce the work of an experienced security expert which is time consuming and economic costly, therefore popularizes the trustworthy software engineering.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.