38 research outputs found
Investigation of the applicability of natural language processing methods to problems of searching and matching of machinery drawing images
ΠΡΠΎΠ²Π΅Π΄Π΅Π½Π½ΡΠ΅ Π² ΡΠ°Π±ΠΎΡΠ΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΠΏΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ, ΡΡΠΎ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π΄Π΅ΡΠΊΡΠΈΠΏΡΠΎΡΠΎΠ² ΠΎΡΠΎΠ±ΡΡ
ΡΠΎΡΠ΅ΠΊ Π² ΡΠΈΡΡΠΎΠΌ Π²ΠΈΠ΄Π΅ ΠΊ Π·Π°Π΄Π°ΡΠ΅ ΡΡΠ°Π²Π½Π΅Π½ΠΈΡ ΠΈ ΠΏΠΎΠΈΡΠΊΠ° ΡΠ΅ΡΡΠ΅ΠΆΠ΅ΠΉ ΡΠ²Π»ΡΠ΅ΡΡΡ Π½Π΅ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΡΠΌ. ΠΡΡΠ²Π»Π΅Π½ΠΎ, ΡΡΠΎ ΠΎΡΠ½ΠΎΠ²Π½ΠΎΠΉ ΠΏΡΠΈΡΠΈΠ½ΠΎΠΉ ΡΡΠΎΠΌΡ ΡΠ»ΡΠΆΠΈΡ Π½Π°Π»ΠΈΡΠΈΠ΅ Π² ΡΠ΅ΡΡΠ΅ΠΆΠ°Ρ
Π±ΠΎΠ»ΡΡΠΎΠ³ΠΎ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²Π° ΠΈΠ΄Π΅Π½ΡΠΈΡΠ½ΡΡ
ΡΠ»Π΅ΠΌΠ΅Π½ΡΠΎΠ² (ΡΠ°ΠΌΠΊΠΈ, ΠΎΡΠ½ΠΎΠ²Π½Π°Ρ Π½Π°Π΄ΠΏΠΈΡΡ, Π²ΡΠ½ΠΎΡΠ½ΡΠ΅ Π»ΠΈΠ½ΠΈΠΈ, ΡΠ»Π΅ΠΌΠ΅Π½ΡΡ ΡΡΠΈΡΡΠΎΠ² ΠΈ Π΄Ρ.). ΠΠ»Ρ ΡΠ΅ΡΠ΅Π½ΠΈΡ Π΄Π°Π½Π½ΠΎΠΉ ΠΏΡΠΎΠ±Π»Π΅ΠΌΡ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΌΠ΅ΡΠΎΠ΄Π° tf-idf (term frequency-inverse document frequency), ΡΠΈΡΠΎΠΊΠΎ ΠΈΠ·Π²Π΅ΡΡΠ½ΠΎΠ³ΠΎ Π² ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΎΠ±ΡΠ°Π±ΠΎΡΠΊΠΈ Π΅ΡΡΠ΅ΡΡΠ²Π΅Π½Π½ΠΎΠ³ΠΎ ΡΠ·ΡΠΊΠ°. Π ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠΈ Π²ΠΌΠ΅ΡΡΠΎ Π²Π΅ΠΊΡΠΎΡΠΎΠ² ΡΠ»ΠΎΠ², ΠΏΡΠΈΠΌΠ΅Π½ΡΠ΅ΠΌΡΡ
Π² ΠΎΡΠΈΠ³ΠΈΠ½Π°Π»ΡΠ½ΠΎΠΉ ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊΠ΅ tf-idf, ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π»ΠΈΡΡ Π΄Π΅ΡΠΊΡΠΈΠΏΡΠΎΡΡ ΠΎΡΠΎΠ±ΡΡ
ΡΠΎΡΠ΅ΠΊ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ, Π²ΡΡΠΈΡΠ»Π΅Π½Π½ΡΡ
ΠΏΠΎ Π°Π»Π³ΠΎΡΠΈΡΠΌΠ°ΠΌ ORB ΠΈ BRISK. Π ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΠΏΠΎΠ»ΡΡΠ΅Π½Ρ ΡΠ»Π΅Π΄ΡΡΡΠΈΠ΅ Π²ΡΠ²ΠΎΠ΄Ρ: 1) ΠΏΠΎΠΊΠ°Π·Π°Π½Π° Π²ΡΡΠΎΠΊΠ°Ρ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅ΠΌΠΎΠ³ΠΎ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄Π° Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΠΊΠΎΠΏΠΈΠΈ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΡ-Π·Π°ΠΏΡΠΎΡΠ° Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½ΡΡ
. Π’Π°ΠΊ, Π΄Π»Ρ Π²ΡΠ΅Ρ
ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ, ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΡΡ
Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΠΈ ΠΈΠΌΠ΅ΡΡΠΈΡ
ΡΠ²ΠΎΠΈ ΠΏΠΎΠ»Π½ΡΠ΅ Π°Π½Π°Π»ΠΎΠ³ΠΈ Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½ΡΡ
, Π±ΡΠ»ΠΎ Π²ΡΡΠ²Π»Π΅Π½ΠΎ Π½Π°Π»ΠΈΡΠΈΠ΅ ΠΊΠΎΠΏΠΈΠΉ. 2) ΠΠΎΠ»ΠΈΡΠ΅ΡΡΠ²ΠΎ Π²ΡΡΠ²Π»Π΅Π½Π½ΡΡ
ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ, ΡΠ²Π»ΡΡΡΠΈΡ
ΡΡ ΠΌΠΎΠ΄ΠΈΡΠΈΠΊΠ°ΡΠΈΡΠΌΠΈ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΡ-Π·Π°ΠΏΡΠΎΡΠ°, ΡΠ°Π·Π½ΠΈΡΡΡ ΠΈ Π·Π°Π²ΠΈΡΠΈΡ ΠΎΡ Π°Π»Π³ΠΎΡΠΈΡΠΌΠ° Π½Π°Ρ
ΠΎΠΆΠ΄Π΅Π½ΠΈΡ ΠΎΡΠΎΠ±ΡΡ
ΡΠΎΡΠ΅ΠΊ ΠΈ Π΄Π΅ΡΠΊΡΠΈΠΏΡΠΎΡΠΎΠ². Π’Π°ΠΊ, ΠΏΡΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΈ ORB ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΠ΅ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²ΠΎ Π²ΡΡΠ²Π»Π΅Π½Π½ΡΡ
ΠΌΠΎΠ΄ΠΈΡΠΈΡΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
Π°Π½Π°Π»ΠΎΠ³ΠΎΠ² ΡΠΎΡΡΠ°Π²ΠΈΠ»ΠΎ 60%, ΠΏΡΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΈ BRISK β 80% ΠΎΡ Π²ΡΠ΅Ρ
Π°Π½Π°Π»ΠΎΠ³ΠΎΠ² ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΡ, Π½Π°Ρ
ΠΎΠ΄ΡΡΠΈΡ
ΡΡ Π² Π±Π°Π·Π΅ Π΄Π°Π½Π½ΡΡ
. 3) ΠΡΠ΅Π΄Π»Π°Π³Π°Π΅ΠΌΡΠΉ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ ΠΏΠΎΠΊΠ°Π·ΡΠ²Π°Π΅Ρ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½Π½ΡΡ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ Π΄Π»Ρ Π½Π°Ρ
ΠΎΠΆΠ΄Π΅Π½ΠΈΡ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠΉ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΌΠΎΠΆΠ½ΠΎ ΠΎΡΠ½Π΅ΡΡΠΈ ΠΊ ΡΠΎΠΌΡ ΠΆΠ΅ ΠΊΠ»Π°ΡΡΡ, ΡΡΠΎ ΠΈ ΠΈΠ·ΠΎΠ±ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅-Π·Π°ΠΏΡΠΎΡ (Π½Π°ΠΏΡΠΈΠΌΠ΅Ρ, ΡΠ΅ΡΡΠ΅ΠΆ ΡΠΊΡΠΊΠ°Π²Π°ΡΠΎΡΠ°, Π±ΡΠ»ΡΠ΄ΠΎΠ·Π΅ΡΠ°, Π°Π²ΡΠΎΠΌΠΎΠ±ΠΈΠ»ΡΠ½ΠΎΠ³ΠΎ ΠΊΡΠ°Π½Π°). ΠΠ΄Π΅ΡΡ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΠ΅ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²ΠΎ Π»ΠΎΠΆΠ½ΡΡ
ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΠΉ Π΄ΠΎΡΡΠΈΠ³Π»ΠΎ 60%
Tracking the Temporal-Evolution of Supernova Bubbles in Numerical Simulations
The study of low-dimensional, noisy manifolds embedded in a higher dimensional space has been extremely useful in many applications, from the chemical analysis of multi-phase flows to simulations of galactic mergers. Building a probabilistic model of the manifolds has helped in describing their essential properties and how they vary in space. However, when the manifold is evolving through time, a joint spatio-temporal modelling is needed, in order to fully comprehend its nature. We propose a first-order Markovian process that propagates the spatial probabilistic model of a manifold at fixed time, to its adjacent temporal stages. The proposed methodology is demonstrated using a particle simulation of an interacting dwarf galaxy to describe the evolution of a cavity generated by a Supernov
Multimedia Forensics
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Multimedia Forensics
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field
Shortest Route at Dynamic Location with Node Combination-Dijkstra Algorithm
Abstractβ Online transportation has become a basic
requirement of the general public in support of all activities to go
to work, school or vacation to the sights. Public transportation
services compete to provide the best service so that consumers
feel comfortable using the services offered, so that all activities
are noticed, one of them is the search for the shortest route in
picking the buyer or delivering to the destination. Node
Combination method can minimize memory usage and this
methode is more optimal when compared to A* and Ant Colony
in the shortest route search like Dijkstra algorithm, but canβt
store the history node that has been passed. Therefore, using
node combination algorithm is very good in searching the
shortest distance is not the shortest route. This paper is
structured to modify the node combination algorithm to solve the
problem of finding the shortest route at the dynamic location
obtained from the transport fleet by displaying the nodes that
have the shortest distance and will be implemented in the
geographic information system in the form of map to facilitate
the use of the system.
Keywordsβ Shortest Path, Algorithm Dijkstra, Node
Combination, Dynamic Location (key words
The Diffusion of a Personal Health Record for Patients with Type 2 Diabetes Mellitus in Primary Care
Distributed Anti-Plagiarism Checker for Biomedical Images Based on Sensor Noise
The increasing number of scientific papers reporting false or stolen data calls for the needs of new tools able to automatically detect plagiarism or unfaithful ownerships. This problem is particularly actual for the health sciences, as the number of biomedical images that are stolen or manipulated and, then, published in scientific papers is becoming higher and higher [1]. In this paper we present an automatic anti-plagiarism checker that relies on the concept of Pixel Non-Uniformity (PNU) noise. This is the characteristic noise left by source sensors of devices like digital cameras, electron microscopes or Magnetic Resonance Imaging (MRI) to define a sort of fingerprint for these devices. The intended use of our system requires two steps. In a first step and on a voluntary base, the researchers register to the system their imaging devices by providing a training set of images. These will be used to extract the device fingerprint called Reference Pattern (RP). In a second step, the system will periodically scan a set of known scientific digital libraries (most publishers offer on-line access to their papers) downloading the new papers and extracting all the images herein contained. The output produced by a specialized filter on such images will enable the system to compare the Residual Noise (RN) with all the enrolled device patterns, allowing the identification of the device that captured the image. Given the huge amount of papers and images to process, our system has been implemented as a distributed application running on top of the Spark cluster engine