Learn More
Based on intravascular ultrasound (IVUS) video images, a novel motion estimation method combining the genetic algorithm-based optical flow method and a step-by-step and sum strategy has been developed to estimate the displacement and strain distributions on the scan cross sections of the arteries. And then, real elasticity distributions were reconstructed(More)
In this paper, design and implementation of an interactive open architecture computer vision software package called Ch OpenCV is presented. Benefiting from both Ch and OpenCV, Ch OpenCV has many salient features. It is interactive, capable of interface with binary static or dynamical C/Cþþ libraries, integrated with advanced numerical features and(More)
In this paper, we study the problem of summarizing email conversations. We first build a sentence quotation graph that captures the conversation structure among emails. We adopt three cohesion measures: clue words, semantic similarity and cosine similarity as the weight of the edges. Second, we use two graph-based summarization approaches, Generalized(More)
Introduction • How best to convey large answer sets for queries? – Simple enumeration: accurate but not necessarily most useful – Summaries: not (necessarily) 100% accurate but can be more intuitive • Why is this problem interesting? – OLAP queries over multi-dimensional data typically produce data intensive answers
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge that has not been studied extensively in text mining is the identification and reconstruction of hidden emails. A hidden email is an original email that has been quoted in at least(More)
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge that has not been studied extensively in text mining is the reconstruction of hidden emails. A hidden email is an original email that has been quoted in subsequent emails but is not(More)
In this thesis, we present a novel audio digital watermark method based on counter-propagation Neural Networks. After dealing with the audio by discrete wavelet transform, we select the important coefficients which are ready to be trained in the neural networks. By making use of the capabilities of memorization and fault tolerance in CPN, watermark is(More)
A multiple access protocol with busy tone (BT) for mobile ad hoc network (MANET) using directional antennas, named as BT-DMACP, is proposed with consideration of the hidden terminal problems and side lobe interference caused by directional antennas. The RTS/CTS (request-to-send/clear-to-send) handshake, directional busy tones and power control algorithm are(More)