共查询到20条相似文献,搜索用时 15 毫秒
1.
Information visualization (InfoVis), the study of transforming data, information, and knowledge into interactive visual representations, is very important to users because it provides mental models of information. The boom in big data analytics has triggered broad use of InfoVis in a variety of domains, ranging from finance to sports to politics. In this paper, we present a comprehensive survey and key insights into this fast-rising area. The research on InfoVis is organized into a taxonomy that contains four main categories, namely empirical methodologies, user interactions, visualization frameworks, and applications, which are each described in terms of their major goals, fundamental principles, recent trends, and state-of-the-art approaches. At the conclusion of this survey, we identify existing technical challenges and propose directions for future research. 相似文献
2.
近年来,起源于计算神经科学的脉冲神经网络因其具有丰富的时空动力学特征、多样的编码机制、契合硬件的事件驱动特性等优势,在神经形态工程和类脑计算领域已得到广泛的关注.脉冲神经网络与当前计算机科学导向的以深度卷积网络为代表的人工神经网络的交叉融合被认为是发展人工通用智能的有力途径.对此,回顾了脉冲神经网络的发展历程,将其划分为神经元模型、训练算法、编程框架、数据集以及硬件芯片等5个重点方向,全方位介绍脉冲神经网络的最新进展和内涵,讨论并分析了脉冲神经网络领域各个重点方向的发展机遇和挑战.希望本综述能够吸引不同学科的研究者,通过跨学科的思想交流与合作研究,推动脉冲神经网络领域的发展. 相似文献
3.
Abraham Kandel 《Information Sciences》2007,177(2):329-331
4.
Jun He Robert A. Norwood Maïté Brandt-Pearce Ivan B. Djordjevic Milorad Cvijetic Suresh Subramaniam Roland Himmelhuber Carolyn Reynolds Pierre Blanche Brittany Lynn Nasser Peyghambarian 《Computers & Electrical Engineering》2014
Recent advances in optical communications not only increase the capacities of communication system but also improve the system dynamicity and survivability. Various new technologies are invented to increase the bandwidth of individual wavelength channels and the number of wavelengths transmitted per fiber. Multiple access technologies have also been developed to support various emerging applications, including real-time, on-demand and high data-rate applications, in a flexible, cost effective and energy efficient manner. 相似文献
5.
A survey of recent advances in SAT-based formal verification 总被引:2,自引:0,他引:2
Mukul R. Prasad Armin Biere Aarti Gupta 《International Journal on Software Tools for Technology Transfer (STTT)》2005,7(2):156-173
Dramatic improvements in SAT solver technology over the last decade and the growing need for more efficient and scalable verification solutions have fueled research in verification methods based on SAT solvers. This paper presents a survey of the latest developments in SAT-based formal verification, including incomplete methods such as bounded model checking and complete methods for model checking. We focus on how the surveyed techniques formulate the verification problem as a SAT problem and how they exploit crucial aspects of a SAT solver, such as application-specific heuristics and conflict-driven learning. Finally, we summarize the noteworthy achievements in this area so far and note the major challenges in making this technology more pervasive in industrial design verification flows. 相似文献
6.
7.
8.
A. V. Vasilakos 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2003,7(4):263-277
ATM networking technology was conceived 20 years ago, and installations will reach their peak the next 10 years. Active networks
will be the technology which will follow the ATM. In this article, we address the most important issues regarding recent advances
and future perspectives in ATM, including IP/ATM integration, Active Networks, MobileActive Networks and the impact of fuzzy
technology in solving the important problems of the above future networking technologies. In the new century it is imperative
that we shift from a technology to an application (needs of consumers) focus, where ubiquitous and invisible (context-aware)
computing will be a reality. 相似文献
9.
The evolution of social network and multimedia technologies encourage more and more people to generate and upload visual information, which leads to the generation of large-scale video data. Therefore, preeminent compression technologies are highly desired to facilitate the storage and transmission of these tremendous video data for a wide variety of applications. In this paper, a systematic review of the recent advances for large-scale video compression (LSVC) is presented. Specifically, fast video coding algorithms and effective models to improve video compression efficiency are introduced in detail, since coding complexity and compression efficiency are two important factors to evaluate video coding approaches. Finally, the challenges and future research trends for LSVC are discussed. 相似文献
10.
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve Cryptography (ECC). EC is often used to improve the security of open communication networks and to let specific persons with confirmed identities into the Modern Digital Era (MDE). Users of MDE make use of many technologies, such as social media, the cloud, and the IoT industry, among others. No matter what tool the users are using, the whole environment has to be able to keep their security and privacy preserved.The study of cryptography is required because unsecure networks make data transmission and the transfer of information susceptible to data theft and attack via an open channel. This makes it necessary to learn cryptography. The art of encrypting documents and communications using keys in such a way that only the individuals who are intended to receive them are able to decode and process them is referred to as cryptography. A digital signature, cryptographic data integrity, and authentication method all rely on the address of the receiver and the sender in addition to mathematical operations to find the signature. During the process of signature and verification, the solution that was presented is compared with the technique that is currently being used by ECDSA in order to illustrate the differences that exist between the two processes.This comprehensive survey of EC seeks to thoroughly investigate many scientific concepts, state-of-the-art, and innovative methodologies and implementations. This work will be useful for academics, who are interested in further analysis. Use and development of EC based schemes for cloud computing, e-health, and e-voting, is more secure as compared to RSA, and Diffie–Hellman schemes. In this comprehensive study, we claim that the adoption of EC methods in distributed computing and asynchronous networking provides significant benefits in distributed computing and interdependent networking. 相似文献
11.
A new fuzzy logic filter for image enhancement 总被引:4,自引:0,他引:4
Farbiz F. Menhaj M.B. Motamedi S.A. Hagan M.T. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2000,30(1):110-119
This paper presents a new fuzzy-logic-control based filter with the ability to remove impulsive noise and smooth Gaussian noise, while, simultaneously, preserving edges and image details efficiently. To achieve these three image enhancement goals, we first develop filters that have excellent edge-preserving capability but do not perform well in smoothing Gaussian noise. Next, we modify the filters so that they perform all three image enhancement tasks. These filters are based on the idea that individual pixels should not be uniformly fired by each of the fuzzy rules. To demonstrate the capability of our filtering approach, it was tested on several different image enhancement problems. These experimental results demonstrate the speed, filtering quality, and image sharpening ability of the new filter. 相似文献
12.
13.
Both neural networks and fuzzy logic systems exhibit human-like mental processing. The similarities and dissimilarities of these two technologies, such as multi-layer operations of neural networks and max-min operation in fuzzy logic systems, make apparent that there are advantages to combining them. However, this was not done until the late 1980's. Surveying the literature revealed eight different approaches to combining the merits of fuzzy logic systems and neural networks. 相似文献
14.
Alexandre Petrenko Adenilso Simao José Carlos Maldonado 《International Journal on Software Tools for Technology Transfer (STTT)》2012,14(4):383-386
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS). 相似文献
15.
With the rapid increase in social websites that has dramatically increased the volume of social media, which includes the use of images and videos, visual understanding has attracted great interest in several areas such as multimedia, computer vision, and pattern recognition. Valuable auxiliary resources available on social websites, such as user-provided tags, aid in the tasks of visual understanding. Therefore, several methods have been proposed for exploring the auxiliary resources for tag refinement, image retrieval, and media summarization. This work conducts a comprehensive survey of recent advances in visual understanding by mining social media in order to discuss their merits and limitations. We then analyze the difficulties and challenges of visual understanding followed by several possible future research directions. 相似文献
16.
The numerous works on media retargeting call for a thorough and comprehensive survey for reviewing and categorizing existing works and providing insights that can help future design of retargeting approaches and its applications. First, we present the basic problem of media retargeting and detail state-of-the-art retargeting methods devised to solve it. Second, we review recent works on objective quality assessment of media retargeting, where we find that although these works are designed to make the objective assessment result in accordance with the subjective evaluation, they are only suitable for certain situations. Considering the subjective nature of aesthetics, designing objective assessment metric for media retargeting could be a promising area for investigation. Third, we elaborate on other applications extended from retargeting techniques. We show how to apply the retargeting techniques in other fields to solve their challenging problems, and reveal that retargeting technique is not just a simple scaling algorithm, but a thought or concept, which has great flexibility and is quite useful.We believe this review can help researchers and practitioners to solve the existing problems of media retargeting and bring new ideas in their works. 相似文献
17.
18.
Enrique Alba Gabriel Luque Sergio Nesmachnow 《International Transactions in Operational Research》2013,20(1):1-48
The field of parallel metaheuristics is continuously evolving as a result of new technologies and needs that researchers have been encountering. In the last decade, new models of algorithms, new hardware for parallel execution/communication, and new challenges in solving complex problems have been making advances in a fast manner. We aim to discuss here on the state of the art, in a summarized manner, to provide a solution to deal with some of the growing topics. These topics include the utilization of classic parallel models in recent platforms (such as grid/cloud architectures and GPU/APU). However, porting existing algorithms to new hardware is not enough as a scientific goal, therefore researchers are looking for new parallel optimization and learning models that are targeted to these new architectures. Also, parallel metaheuristics, such as dynamic optimization and multiobjective problem resolution, have been applied to solve new problem domains in past years. In this article, we review these recent research areas in connection to parallel metaheuristics, as well as we identify future trends and possible open research lines for groups and PhD students. 相似文献
19.
《Expert systems with applications》2014,41(14):6459-6466
Metaheuristic optimization algorithms have become a popular choice for solving complex problems which are otherwise difficult to solve by traditional methods. However, these methods have the problem of the parameter adaptation and many researchers have proposed modifications using fuzzy logic to solve this problem and obtain better results than the original methods. In this study a comprehensive review is made of the optimization techniques in which fuzzy logic is used to dynamically adapt some important parameters in these methods. In this paper, the survey mainly covers the optimization methods of Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Ant Colony Optimization (ACO), which in the last years have been used with fuzzy logic to improve the performance of the optimization methods. 相似文献
20.
Suzuki H. 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》1997,27(2):293-295
This article discusses complementary (C) fuzzy logic system that is one of continuous multiary logic systems that satisfies a complementary law differently from usual fuzzy logic systems. This article includes formulation of the C fuzzy logic system, derivation of tautologies, and mentions an example that typically shows a difference in inference computation between the C fuzzy logic system and a usual fuzzy logic system. 相似文献