38 research outputs found

    Investigation of the applicability of natural language processing methods to problems of searching and matching of machinery drawing images

    Get PDF
    ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½Π½Ρ‹Π΅ Π² Ρ€Π°Π±ΠΎΡ‚Π΅ исслСдования ΠΏΠΎΠΊΠ°Π·Ρ‹Π²Π°ΡŽΡ‚, Ρ‡Ρ‚ΠΎ ΠΏΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ дСскрипторов особых Ρ‚ΠΎΡ‡Π΅ΠΊ Π² чистом Π²ΠΈΠ΄Π΅ ΠΊ Π·Π°Π΄Π°Ρ‡Π΅ сравнСния ΠΈ поиска Ρ‡Π΅Ρ€Ρ‚Π΅ΠΆΠ΅ΠΉ являСтся нСэффСктивным. ВыявлСно, Ρ‡Ρ‚ΠΎ основной ΠΏΡ€ΠΈΡ‡ΠΈΠ½ΠΎΠΉ этому слуТит Π½Π°Π»ΠΈΡ‡ΠΈΠ΅ Π² Ρ‡Π΅Ρ€Ρ‚Π΅ΠΆΠ°Ρ… большого количСства ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ‡Π½Ρ‹Ρ… элСмСнтов (Ρ€Π°ΠΌΠΊΠΈ, основная надпись, выносныС Π»ΠΈΠ½ΠΈΠΈ, элСмСнты ΡˆΡ€ΠΈΡ„Ρ‚ΠΎΠ² ΠΈ Π΄Ρ€.). Для Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ Π΄Π°Π½Π½ΠΎΠΉ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹ ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎ использованиС ΠΌΠ΅Ρ‚ΠΎΠ΄Π° tf-idf (term frequency-inverse document frequency), ΡˆΠΈΡ€ΠΎΠΊΠΎ извСстного Π² Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ СстСствСнного языка. Π’ исслСдовании вмСсто Π²Π΅ΠΊΡ‚ΠΎΡ€ΠΎΠ² слов, примСняСмых Π² ΠΎΡ€ΠΈΠ³ΠΈΠ½Π°Π»ΡŒΠ½ΠΎΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ΅ tf-idf, использовались дСскрипторы особых Ρ‚ΠΎΡ‡Π΅ΠΊ ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠΉ, вычислСнных ΠΏΠΎ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ°ΠΌ ORB ΠΈ BRISK. Π’ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Π΅ исслСдования ΠΏΠΎΠ»ΡƒΡ‡Π΅Π½Ρ‹ ΡΠ»Π΅Π΄ΡƒΡŽΡ‰ΠΈΠ΅ Π²Ρ‹Π²ΠΎΠ΄Ρ‹: 1) ΠΏΠΎΠΊΠ°Π·Π°Π½Π° высокая ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄Π° для поиска ΠΊΠΎΠΏΠΈΠΈ изобраТСния-запроса Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½Ρ‹Ρ…. Π’Π°ΠΊ, для всСх ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠΉ, ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π½Ρ‹Ρ… для поиска ΠΈ ΠΈΠΌΠ΅ΡŽΡ‰ΠΈΡ… свои ΠΏΠΎΠ»Π½Ρ‹Π΅ Π°Π½Π°Π»ΠΎΠ³ΠΈ Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½Ρ‹Ρ…, Π±Ρ‹Π»ΠΎ выявлСно Π½Π°Π»ΠΈΡ‡ΠΈΠ΅ ΠΊΠΎΠΏΠΈΠΉ. 2) ΠšΠΎΠ»ΠΈΡ‡Π΅ΡΡ‚Π²ΠΎ выявлСнных ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠΉ, ΡΠ²Π»ΡΡŽΡ‰ΠΈΡ…ΡΡ модификациями изобраТСния-запроса, разнится ΠΈ зависит ΠΎΡ‚ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° нахоТдСния особых Ρ‚ΠΎΡ‡Π΅ΠΊ ΠΈ дСскрипторов. Π’Π°ΠΊ, ΠΏΡ€ΠΈ использовании ORB максимальноС количСство выявлСнных ΠΌΠΎΠ΄ΠΈΡ„ΠΈΡ†ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Ρ… Π°Π½Π°Π»ΠΎΠ³ΠΎΠ² составило 60%, ΠΏΡ€ΠΈ использовании BRISK – 80% ΠΎΡ‚ всСх Π°Π½Π°Π»ΠΎΠ³ΠΎΠ² изобраТСния, находящихся Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½Ρ‹Ρ…. 3) ΠŸΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΡ‹ΠΉ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΏΠΎΠΊΠ°Π·Ρ‹Π²Π°Π΅Ρ‚ ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½Π½ΡƒΡŽ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ для нахоТдСния ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΠΎΠΆΠ½ΠΎ отнСсти ΠΊ Ρ‚ΠΎΠΌΡƒ ΠΆΠ΅ классу, Ρ‡Ρ‚ΠΎ ΠΈ ΠΈΠ·ΠΎΠ±Ρ€Π°ΠΆΠ΅Π½ΠΈΠ΅-запрос (Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€, Ρ‡Π΅Ρ€Ρ‚Π΅ΠΆ экскаватора, Π±ΡƒΠ»ΡŒΠ΄ΠΎΠ·Π΅Ρ€Π°, Π°Π²Ρ‚ΠΎΠΌΠΎΠ±ΠΈΠ»ΡŒΠ½ΠΎΠ³ΠΎ ΠΊΡ€Π°Π½Π°). Π—Π΄Π΅ΡΡŒ максимальноС количСство Π»ΠΎΠΆΠ½Ρ‹Ρ… ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½ΠΈΠΉ достигло 60%

    Tracking the Temporal-Evolution of Supernova Bubbles in Numerical Simulations

    Get PDF
    The study of low-dimensional, noisy manifolds embedded in a higher dimensional space has been extremely useful in many applications, from the chemical analysis of multi-phase flows to simulations of galactic mergers. Building a probabilistic model of the manifolds has helped in describing their essential properties and how they vary in space. However, when the manifold is evolving through time, a joint spatio-temporal modelling is needed, in order to fully comprehend its nature. We propose a first-order Markovian process that propagates the spatial probabilistic model of a manifold at fixed time, to its adjacent temporal stages. The proposed methodology is demonstrated using a particle simulation of an interacting dwarf galaxy to describe the evolution of a cavity generated by a Supernov

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field

    Multimedia Forensics

    Get PDF
    This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field

    Shortest Route at Dynamic Location with Node Combination-Dijkstra Algorithm

    Get PDF
    Abstractβ€” Online transportation has become a basic requirement of the general public in support of all activities to go to work, school or vacation to the sights. Public transportation services compete to provide the best service so that consumers feel comfortable using the services offered, so that all activities are noticed, one of them is the search for the shortest route in picking the buyer or delivering to the destination. Node Combination method can minimize memory usage and this methode is more optimal when compared to A* and Ant Colony in the shortest route search like Dijkstra algorithm, but can’t store the history node that has been passed. Therefore, using node combination algorithm is very good in searching the shortest distance is not the shortest route. This paper is structured to modify the node combination algorithm to solve the problem of finding the shortest route at the dynamic location obtained from the transport fleet by displaying the nodes that have the shortest distance and will be implemented in the geographic information system in the form of map to facilitate the use of the system. Keywordsβ€” Shortest Path, Algorithm Dijkstra, Node Combination, Dynamic Location (key words

    A Semantic Basis for Meaning Construction in Constructivist Interactions

    Get PDF

    Distributed Anti-Plagiarism Checker for Biomedical Images Based on Sensor Noise

    No full text
    The increasing number of scientific papers reporting false or stolen data calls for the needs of new tools able to automatically detect plagiarism or unfaithful ownerships. This problem is particularly actual for the health sciences, as the number of biomedical images that are stolen or manipulated and, then, published in scientific papers is becoming higher and higher [1]. In this paper we present an automatic anti-plagiarism checker that relies on the concept of Pixel Non-Uniformity (PNU) noise. This is the characteristic noise left by source sensors of devices like digital cameras, electron microscopes or Magnetic Resonance Imaging (MRI) to define a sort of fingerprint for these devices. The intended use of our system requires two steps. In a first step and on a voluntary base, the researchers register to the system their imaging devices by providing a training set of images. These will be used to extract the device fingerprint called Reference Pattern (RP). In a second step, the system will periodically scan a set of known scientific digital libraries (most publishers offer on-line access to their papers) downloading the new papers and extracting all the images herein contained. The output produced by a specialized filter on such images will enable the system to compare the Residual Noise (RN) with all the enrolled device patterns, allowing the identification of the device that captured the image. Given the huge amount of papers and images to process, our system has been implemented as a distributed application running on top of the Spark cluster engine
    corecore