14,331 research outputs found

    Client-Driven Content Extraction Associated with Table

    Get PDF
    The goal of the project is to extract content within table in document images based on learnt patterns. Real-world users i.e., clients first provide a set of key fields within the table which they think are important. These are first used to represent the graph where nodes are labelled with semantics including other features and edges are attributed with relations. Attributed relational graph (ARG) is then employed to mine similar graphs from a document image. Each mined graph will represent an item within the table, and hence a set of such graphs will compose a table. We have validated the concept by using a real-world industrial problem

    Leptonic CP phases near the μτ\mu-\tau symmetric limit

    Get PDF
    The neutrino masses and mixings indicated by current neutrino oscillation experiments suggest that the neutrino mass matrix possesses an approximate μτ\mu-\tau exchange symmetry. In this study, we explore the neutrino parameter space and show that if a small μτ\mu-\tau symmetry breaking is considered, the Majorana CPCP phases must be unequal and non-zero independently of the neutrino mass scale. Moreover, a small μτ\mu-\tau symmetry breaking favors quasi-degenerate masses. We also show that Majorana phases are strongly correlated with the Dirac CPCP violating phase. Within this framework, we obtain robust predictions for the values of the Majorana phases when the experimental indications for the Dirac CPCP phase are used.Comment: 13 pages, 3 figures. Version accepted for publication in PL

    Handwritten and Printed Text Separation in Real Document

    Get PDF
    The aim of the paper is to separate handwritten and printed text from a real document embedded with noise, graphics including annotations. Relying on run-length smoothing algorithm (RLSA), the extracted pseudo-lines and pseudo-words are used as basic blocks for classification. To handle this, a multi-class support vector machine (SVM) with Gaussian kernel performs a first labelling of each pseudo-word including the study of local neighbourhood. It then propagates the context between neighbours so that we can correct possible labelling errors. Considering running time complexity issue, we propose linear complexity methods where we use k-NN with constraint. When using a kd-tree, it is almost linearly proportional to the number of pseudo-words. The performance of our system is close to 90%, even when very small learning dataset where samples are basically composed of complex administrative documents.Comment: Machine Vision Applications (2013

    Software-Engineering Process Simulation (SEPS) model

    Get PDF
    The Software Engineering Process Simulation (SEPS) model is described which was developed at JPL. SEPS is a dynamic simulation model of the software project development process. It uses the feedback principles of system dynamics to simulate the dynamic interactions among various software life cycle development activities and management decision making processes. The model is designed to be a planning tool to examine tradeoffs of cost, schedule, and functionality, and to test the implications of different managerial policies on a project's outcome. Furthermore, SEPS will enable software managers to gain a better understanding of the dynamics of software project development and perform postmodern assessments

    Two-dimensional burst identification codes and their use in burst correction

    Get PDF
    A new class of codes, called burst identification codes, is defined and studied. These codes can be used to determine the patterns of burst errors. Two-dimensional burst correcting codes can be easily constructed from burst identification codes. The resulting class of codes is simple to implement and has lower redundancy than other comparable codes. The results are pertinent to the study of radiation effects on VLSI RAM chips, which can cause two-dimensional bursts of errors
    corecore