首页 > 最新文献

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)最新文献

英文 中文
An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion 一种基于误差扩散的数字半调边缘增强技术
J. Feng, I. Lin, Y. Chu
Halftone image is a binary image that preserves the visual quality from the original continuous-tone image, and is used everywhere for printing and output documents. In this paper, a modified error-diffusion halftoning scheme is proposed that the error is diffused dynamically according to the magnitude of gradient and the proposed impact functions. From this adjustment, the proposed scheme can enhance the edges and preserve the smooth regions. The experiments demonstrate the performance of the proposed scheme with different settings of the impact functions. Also from the testing procedures, the settings of the impact function can automatic obtained from the distribution of gradient.
半色调图像是一种二值图像,它保留了原始连续色调图像的视觉质量,在打印和输出文档中无处不在。本文提出了一种改进的误差扩散半调方案,该方案根据梯度的大小和所提出的影响函数动态扩散误差。通过这种调整,该方案可以增强边缘并保留平滑区域。实验验证了该方法在不同冲击函数设置下的性能。同样从测试程序中,可以自动得到冲击函数的分布梯度。
{"title":"An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion","authors":"J. Feng, I. Lin, Y. Chu","doi":"10.1109/IIH-MSP.2007.77","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.77","url":null,"abstract":"Halftone image is a binary image that preserves the visual quality from the original continuous-tone image, and is used everywhere for printing and output documents. In this paper, a modified error-diffusion halftoning scheme is proposed that the error is diffused dynamically according to the magnitude of gradient and the proposed impact functions. From this adjustment, the proposed scheme can enhance the edges and preserve the smooth regions. The experiments demonstrate the performance of the proposed scheme with different settings of the impact functions. Also from the testing procedures, the settings of the impact function can automatic obtained from the distribution of gradient.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mining Generalized Association Rules for Service Recommendations for Digital Home Applications 数字家庭应用服务推荐的广义关联规则挖掘
Sue-Chen Hsueh, Ming-Yen Lin, Kun-Lin Lu
Association rules can be used for service recommendations for digital home applications. Negative associations, which mean the missing of item-sets may imply the appearance of certain item-sets, highlight the implications of the missing item-sets. Many studies have shown that negative associations are as important as the traditional positive ones in practice. The recommendation can be more personalized with the addition of more generalized association rules comprising both positive and negative association rules. In this paper, an algorithm based on the FP-growth framework is proposed to mine the generalized rules. In contrast to previous discovery of negative association rules using the apriori-like approaches, the proposed algorithm efficiently mines the rules and outperforms the apriori-based approach. The algorithm also scales up linearly with the increase of the database size.
关联规则可用于数字家庭应用程序的服务推荐。负关联,这意味着缺失的项目集可能意味着某些项目集的出现,突出了缺失的项目集的含义。许多研究表明,在实践中,消极联系与传统的积极联系同样重要。通过添加包含正面和负面关联规则的更广义的关联规则,建议可以更加个性化。本文提出了一种基于fp增长框架的广义规则挖掘算法。与以往使用类似先验的方法发现负关联规则相比,该算法有效地挖掘规则并优于基于先验的方法。该算法还随数据库大小的增加而线性扩展。
{"title":"Mining Generalized Association Rules for Service Recommendations for Digital Home Applications","authors":"Sue-Chen Hsueh, Ming-Yen Lin, Kun-Lin Lu","doi":"10.1109/IIH-MSP.2007.222","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.222","url":null,"abstract":"Association rules can be used for service recommendations for digital home applications. Negative associations, which mean the missing of item-sets may imply the appearance of certain item-sets, highlight the implications of the missing item-sets. Many studies have shown that negative associations are as important as the traditional positive ones in practice. The recommendation can be more personalized with the addition of more generalized association rules comprising both positive and negative association rules. In this paper, an algorithm based on the FP-growth framework is proposed to mine the generalized rules. In contrast to previous discovery of negative association rules using the apriori-like approaches, the proposed algorithm efficiently mines the rules and outperforms the apriori-based approach. The algorithm also scales up linearly with the increase of the database size.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building Corner Feature Extraction Based on Fusion Technique with Airborne LiDAR Data and Aerial Imagery 基于机载激光雷达数据与航空影像融合技术的建筑物角点特征提取
Liang-Hwei Lee, S. Shyue, Ming Huang
Generally, automatic building corner or linear feature extraction from urban area aerial imagery is based on traditional computer vision corner or edge detection techniques. However, challenges and difficulties remained due to the complex characteristic of objects in urban images. Visually, the linear features in airborne LiDAR are much more distinct than those in aerial imagery, however, common criticisms arising from the low horizontal accuracy of LiDAR data. To overcome these difficulties, this study proposes a building corner extraction algorithm based on information fusion technology by integrating aerial imagery and airborne LiDAR data. According to experiment results, the proposed method can obtain the distinct building corners not only with the characteristics of uniform spatial distributed pattern based on Voronoi graph theory, but also with the shape, length, and height constrained conditions derived from LiDAR linear features. The proposed algorithm resolves the heterogeneous remote sensing data registration difficulties between LiDAR data and raw aerial imagery.
城市航拍图像中建筑物角点或线性特征的自动提取通常是基于传统的计算机视觉角点或边缘检测技术。然而,由于城市图像中物体的复杂性,挑战和困难仍然存在。从视觉上看,机载激光雷达的线性特征比航空图像中的线性特征明显得多,然而,常见的批评来自激光雷达数据的低水平精度。为了克服这些困难,本研究提出了一种基于信息融合技术的建筑角提取算法,该算法将航空影像与机载激光雷达数据相结合。实验结果表明,该方法既可以利用基于Voronoi图理论的均匀空间分布模式特征,又可以利用LiDAR线性特征导出的形状、长度和高度约束条件获得不同的建筑角点。该算法解决了激光雷达数据与原始航空影像之间的异构遥感数据配准难题。
{"title":"Building Corner Feature Extraction Based on Fusion Technique with Airborne LiDAR Data and Aerial Imagery","authors":"Liang-Hwei Lee, S. Shyue, Ming Huang","doi":"10.1109/IIH-MSP.2007.358","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.358","url":null,"abstract":"Generally, automatic building corner or linear feature extraction from urban area aerial imagery is based on traditional computer vision corner or edge detection techniques. However, challenges and difficulties remained due to the complex characteristic of objects in urban images. Visually, the linear features in airborne LiDAR are much more distinct than those in aerial imagery, however, common criticisms arising from the low horizontal accuracy of LiDAR data. To overcome these difficulties, this study proposes a building corner extraction algorithm based on information fusion technology by integrating aerial imagery and airborne LiDAR data. According to experiment results, the proposed method can obtain the distinct building corners not only with the characteristics of uniform spatial distributed pattern based on Voronoi graph theory, but also with the shape, length, and height constrained conditions derived from LiDAR linear features. The proposed algorithm resolves the heterogeneous remote sensing data registration difficulties between LiDAR data and raw aerial imagery.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133519585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MRI Brain Phase Image Unwrapping Process by Wavelet Zero-Padding Technique 基于小波零填充技术的MRI脑相图像解包裹处理
Puu-An Juang, Ming-Ni Wu
We present a preliminary design and experimental results of a phase discontinuity relaxation method for MRI (magnetic resonance imaging) phase images. Our method utilizes a wavelet transform algorithm with zero-padding technique. The method is capable of solving the ambiguity problem in MRI phase image by removing the discontinuous borders. The key idea of the wavelet transform algorithm is to process the given MRI phase data by operating frequency domain relaxation in coarse grids and then transferring the intermediate result into finer grids. In this paper we investigate the possibility of employing this approach for phase image based-MRI application. We also evaluate and compare these processed images with the original ones. The application of the proposed method for removing discontinuous border is demonstrated by examples.
我们提出了一种用于MRI(磁共振成像)相位图像的相位不连续松弛方法的初步设计和实验结果。我们的方法利用小波变换算法与零填充技术。该方法通过去除不连续边界,解决了MRI相位图像的模糊问题。小波变换算法的核心思想是对给定的MRI相位数据在粗网格中进行频域松弛处理,然后将中间结果转化为细网格。在本文中,我们研究了将这种方法应用于基于相位图像的mri应用的可能性。我们还对处理后的图像与原始图像进行了评价和比较。通过实例说明了该方法在去除不连续边界中的应用。
{"title":"MRI Brain Phase Image Unwrapping Process by Wavelet Zero-Padding Technique","authors":"Puu-An Juang, Ming-Ni Wu","doi":"10.1109/IIH-MSP.2007.224","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.224","url":null,"abstract":"We present a preliminary design and experimental results of a phase discontinuity relaxation method for MRI (magnetic resonance imaging) phase images. Our method utilizes a wavelet transform algorithm with zero-padding technique. The method is capable of solving the ambiguity problem in MRI phase image by removing the discontinuous borders. The key idea of the wavelet transform algorithm is to process the given MRI phase data by operating frequency domain relaxation in coarse grids and then transferring the intermediate result into finer grids. In this paper we investigate the possibility of employing this approach for phase image based-MRI application. We also evaluate and compare these processed images with the original ones. The application of the proposed method for removing discontinuous border is demonstrated by examples.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"78 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of K-means Clustering Method Based on Parallel Genetic Algorithm 基于并行遗传算法的k均值聚类方法研究
WenHua Dai, Cuizhen Jiao, Tingting He
As K-means clustering algorithm is sensitive to the choice of the initial cluster centers and it's difficult to determine the cluster number, we proposed a K-means clustering method based on parallel genetic algorithm. In the method, we adopted a new strategy of variable-length chromosome encoding and randomly chose initial clustering centers to form chromosomes among samples. Combining the efficiency of K-means algorithm with the global optimization ability of parallel genetic algorithm, the local optimal solution was avoided and the optimum number and optimum result of cluster were obtained by means of heredity, mutation in the community, and parallel evolution, intermarriage among communities. Experiments indicated that this algorithm was efficient and accurate.
针对K-means聚类算法对初始聚类中心的选择敏感、聚类个数难以确定的问题,提出了一种基于并行遗传算法的K-means聚类方法。该方法采用了一种新的变长染色体编码策略,在样本间随机选择初始聚类中心形成染色体。将K-means算法的效率与并行遗传算法的全局寻优能力相结合,通过群体内遗传、突变、并行进化、群体间通婚等方法,避免了局部最优解,获得了最优簇数和最优结果。实验表明,该算法具有较高的效率和准确性。
{"title":"Research of K-means Clustering Method Based on Parallel Genetic Algorithm","authors":"WenHua Dai, Cuizhen Jiao, Tingting He","doi":"10.1109/IIH-MSP.2007.259","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.259","url":null,"abstract":"As K-means clustering algorithm is sensitive to the choice of the initial cluster centers and it's difficult to determine the cluster number, we proposed a K-means clustering method based on parallel genetic algorithm. In the method, we adopted a new strategy of variable-length chromosome encoding and randomly chose initial clustering centers to form chromosomes among samples. Combining the efficiency of K-means algorithm with the global optimization ability of parallel genetic algorithm, the local optimal solution was avoided and the optimum number and optimum result of cluster were obtained by means of heredity, mutation in the community, and parallel evolution, intermarriage among communities. Experiments indicated that this algorithm was efficient and accurate.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"118 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction 利用改进的修改方向,实现一种高嵌入容量的隐写方法
Chin-Feng Lee, Yi-Ren Wang, Chinchen Chang
We propose an effective data hiding method based on the EMD embedding scheme proposed by Zhang et al. in order to enhance the embedding capacity. The main idea of our proposed scheme is to convert secret binary messages into a sequence of digits in an 8-ary notational system. Each secret digit is embedded into two cover pixels by modifying the least significant bits (LSBs). As the experimental results show, the embedding bit-rate of our scheme is 1.5 times better than the EMD embedding scheme. In a word, we propose a high-quality and high-capacity data hiding method that can ensure the stego-image quality and security.
我们在Zhang等人提出的EMD嵌入方案的基础上提出了一种有效的数据隐藏方法,以提高嵌入容量。我们提出的方案的主要思想是将秘密二进制消息转换为8位制符号系统中的数字序列。通过修改最低有效位(lsb),将每个秘密数字嵌入到两个覆盖像素中。实验结果表明,该方案的嵌入比特率是EMD嵌入方案的1.5倍。总之,我们提出了一种保证隐写图像质量和安全性的高质量、高容量的数据隐藏方法。
{"title":"A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction","authors":"Chin-Feng Lee, Yi-Ren Wang, Chinchen Chang","doi":"10.1109/IIH-MSP.2007.62","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.62","url":null,"abstract":"We propose an effective data hiding method based on the EMD embedding scheme proposed by Zhang et al. in order to enhance the embedding capacity. The main idea of our proposed scheme is to convert secret binary messages into a sequence of digits in an 8-ary notational system. Each secret digit is embedded into two cover pixels by modifying the least significant bits (LSBs). As the experimental results show, the embedding bit-rate of our scheme is 1.5 times better than the EMD embedding scheme. In a word, we propose a high-quality and high-capacity data hiding method that can ensure the stego-image quality and security.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133832440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions 恶意交易检测中交易轮廓图的自动生成方法
Jinfu Chen, Yansheng Lu, Xiaodong Xie
The malicious transactions intrusion is the dominant cause that demolishes database system. DBMS is a key part in the security of database system. Enhancing the ability of detecting malicious transactions is very important in DBMS. Based on a detecting approach of malicious transactions in DBMS, an auto-generating approach of legal transactions Profile and generating algorithm are proposed in this paper. Experiment proved that the approach had good performance and accuracy. Intuitionistic Transactions profile was generated. The improved detecting approach of malicious transactions was more automatic and effective, and it had better detection ability.
恶意事务入侵是破坏数据库系统的主要原因。数据库管理系统是数据库系统安全的关键部分。增强对恶意事务的检测能力在数据库管理系统中是非常重要的。在数据库管理系统中恶意事务检测方法的基础上,提出了一种自动生成合法事务概要文件的方法和生成算法。实验证明,该方法具有良好的性能和精度。生成了直觉事务配置文件。改进后的恶意交易检测方法更加自动化和有效,具有更好的检测能力。
{"title":"An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions","authors":"Jinfu Chen, Yansheng Lu, Xiaodong Xie","doi":"10.1109/IIH-MSP.2007.76","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.76","url":null,"abstract":"The malicious transactions intrusion is the dominant cause that demolishes database system. DBMS is a key part in the security of database system. Enhancing the ability of detecting malicious transactions is very important in DBMS. Based on a detecting approach of malicious transactions in DBMS, an auto-generating approach of legal transactions Profile and generating algorithm are proposed in this paper. Experiment proved that the approach had good performance and accuracy. Intuitionistic Transactions profile was generated. The improved detecting approach of malicious transactions was more automatic and effective, and it had better detection ability.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115070971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sending Mobile Software Activation Code by SMS Using Steganography 使用隐写技术发送手机软件激活码
M. Shirali-Shahreza, M. Shirali-Shahreza
Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with the code which is generated based on the user's mobile phone IMEI code. If the codes are the same, the software is activated. Therefore the security of transferring the activation code is increased and if the SMS message is stolen, nobody can inform the activation code. This project is implemented in J2ME (Java 2 Micro Edition) language and tested on a Nokia N71 mobile phone.
随着手机行业的发展,现在我们能够为手机提供大量的软件。大多数这些软件应该购买,以便我们可以使用它们。其中一些软件是共享软件,在购买它们之后,你必须根据你的手机IMEI代码插入制造公司给出的激活码,以激活软件。介绍了一种通过短信发送手机软件激活码的新方法。该方法通过隐写法将激活码隐藏在短信图片消息中发送给用户。软件从图片中提取激活码,并与基于用户手机IMEI码生成的激活码进行比对。如果代码相同,则表示软件激活。因此,增加了传输激活码的安全性,如果短信被盗,没有人可以通知激活码。本项目采用J2ME (Java 2 Micro Edition)语言实现,并在诺基亚N71手机上进行了测试。
{"title":"Sending Mobile Software Activation Code by SMS Using Steganography","authors":"M. Shirali-Shahreza, M. Shirali-Shahreza","doi":"10.1109/IIH-MSP.2007.279","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.279","url":null,"abstract":"Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert an activation code given by the manufacturing company based on your mobile IMEI code in order to activate the software. In this paper a new method is introduced for sending the mobile software activation code by SMS (Short Message Service). In this method the activation code is hidden in an SMS picture message by steganography method and sent to the user. The software extracting the activation code from the picture and compare it with the code which is generated based on the user's mobile phone IMEI code. If the codes are the same, the software is activated. Therefore the security of transferring the activation code is increased and if the SMS message is stolen, nobody can inform the activation code. This project is implemented in J2ME (Java 2 Micro Edition) language and tested on a Nokia N71 mobile phone.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Animation Generation and Retargeting Based on Physics Characteristics 基于物理特性的动画生成和重定位
Y. Tsai, Hung-Kuo Chu, K. Cheng, Tong-Yee Lee, Chen-Lan Yen
Motion retargeting can be achieved by direct shape deformation transfer but may be visually unrealistic and physically incorrect. The purpose of this study is to include the consideration of physical properties for more realistic target motion synthesis. After partitioning source and target objects into segments, each segment mass and center of mass (COM) position/velocity are estimated. The target animation is generated by minimizing the difference in total linear momentum between source and target. Weighting functions for addressing the importance of segment motion and constraints on unrealistic segment length/velocity are also included. The results show that target movement amplitude and velocity are generally smaller than those of the source animation and with less seemly unrealistic motion. Thus, plausible animation can be generated by the retargeting procedures proposed in this study. The same methods may be applied to a variety of different target models for realistic motion synthesis.
运动重定向可以通过直接的形状变形转移来实现,但可能在视觉上不现实,在物理上不正确。本研究的目的是为了更真实的目标运动合成考虑物理特性。将源、目标物体分割成段后,估计每段质量和质心位置/速度。目标动画是通过最小化源和目标之间的总线性动量差来生成的。还包括处理分段运动重要性的加权函数和对不切实际的分段长度/速度的约束。结果表明,目标的运动幅度和速度一般小于源动画的运动幅度和速度,运动不真实的情况较少。因此,本研究提出的重定向程序可以生成可信的动画。同样的方法可以应用于各种不同的目标模型,以实现逼真的运动合成。
{"title":"Animation Generation and Retargeting Based on Physics Characteristics","authors":"Y. Tsai, Hung-Kuo Chu, K. Cheng, Tong-Yee Lee, Chen-Lan Yen","doi":"10.1109/IIH-MSP.2007.336","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.336","url":null,"abstract":"Motion retargeting can be achieved by direct shape deformation transfer but may be visually unrealistic and physically incorrect. The purpose of this study is to include the consideration of physical properties for more realistic target motion synthesis. After partitioning source and target objects into segments, each segment mass and center of mass (COM) position/velocity are estimated. The target animation is generated by minimizing the difference in total linear momentum between source and target. Weighting functions for addressing the importance of segment motion and constraints on unrealistic segment length/velocity are also included. The results show that target movement amplitude and velocity are generally smaller than those of the source animation and with less seemly unrealistic motion. Thus, plausible animation can be generated by the retargeting procedures proposed in this study. The same methods may be applied to a variety of different target models for realistic motion synthesis.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-agent System for the Flexible Resource Constrained Project Scheduling 柔性资源约束下项目调度的多智能体系统
Jingjing Liu, Bing Wu
The resource constrained project scheduling problem (RCPSP) is extended to flexible resource constrained project scheduling problem (FRCPSP) in this paper. Resources are assumed to have certain capabilities demanded by project activities, but not necessarily all of them. Resource capability matrix (RCM) is proposed to represent flexible resources. A multi-agent system composed of resource agent, activity agent, and service agent is put forward as an information infrastructure to support flexible resource constrained project management in a highly distributed environment. The definitions of component agents and the strategies of flexible resource allocation are discussed.
本文将资源约束项目调度问题推广为柔性资源约束项目调度问题(FRCPSP)。资源被假定具有项目活动所需的某些能力,但不一定是全部。提出了资源能力矩阵(RCM)来表示柔性资源。提出了一种由资源代理、活动代理和服务代理组成的多agent系统,作为支持高度分布式环境下灵活的资源约束项目管理的信息基础设施。讨论了构件代理的定义和柔性资源分配策略。
{"title":"A Multi-agent System for the Flexible Resource Constrained Project Scheduling","authors":"Jingjing Liu, Bing Wu","doi":"10.1109/IIH-MSP.2007.33","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2007.33","url":null,"abstract":"The resource constrained project scheduling problem (RCPSP) is extended to flexible resource constrained project scheduling problem (FRCPSP) in this paper. Resources are assumed to have certain capabilities demanded by project activities, but not necessarily all of them. Resource capability matrix (RCM) is proposed to represent flexible resources. A multi-agent system composed of resource agent, activity agent, and service agent is put forward as an information infrastructure to support flexible resource constrained project management in a highly distributed environment. The definitions of component agents and the strategies of flexible resource allocation are discussed.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1