This paper proposed a tracking algorithm based on sparse coding and spectral residual saliency under the framework of particle filtering. The proposed algorithm can be divided into three parts. Firstly, spectral resid...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
This paper proposed a tracking algorithm based on sparse coding and spectral residual saliency under the framework of particle filtering. The proposed algorithm can be divided into three parts. Firstly, spectral residual is used to calculate a saliency map of the current frame and then compute the saliency score of each particle. Secondly, several particles are eliminated directly based on the differences between the saliency scores of the particles in the current frame and the target score in the prior frame. Thirdly, Sc SPM is used to compute the observation vector for the rest particles and the tracking task is finished in the framework of particle filtering. Both quantitative and qualitative experimental results demonstrate that the proposed algorithm performs favorably against the nine state-ofthe-art trackers on ten challenging test sequences.
In this paper, we propose an online visual tracking algorithm for fused sequences via deep learning and adaptive Particle filter(PF). Our algorithm pretrains a simplified Convolution Neural Network(CNN) to obtain a ge...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In this paper, we propose an online visual tracking algorithm for fused sequences via deep learning and adaptive Particle filter(PF). Our algorithm pretrains a simplified Convolution Neural Network(CNN) to obtain a generic target representation. The outputs from the hidden layers of the network help to form the tracking model for an online PF. During tracking, the moving information guides the distribution of particle samples. The tests illustrate competitive performance compared to the state of-art tracking algorithms especially when the target or camera moves quickly.
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and th...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and then we utilize flattening control flow system to decompose the source code into a multi-branch WHILE-SWITCH loop structure. Finally, we apply opaque predicates to obfuscate the flattened code for the secondary obfuscation. In this paper, opaque predicate code representation and different methods of inserting opaque predicates into program braches and sequence blocks were given. Experiments has been made to compare time-space cost of source code and obfuscated code. The results demonstrate that the proposed algorithm can improve code's anti-attack ability, increasing the difficulty of reverse engineering as well.
Cloud computing is becoming a popular solution for storing data and executing applications, where task dispatching in the scheduling policy is significant to the overall performance in the Cloud systems. To minimize t...
详细信息
ISBN:
(纸本)9781479920303
Cloud computing is becoming a popular solution for storing data and executing applications, where task dispatching in the scheduling policy is significant to the overall performance in the Cloud systems. To minimize the makespan of the application consisting of many independent tasks, a heuristic task dispatching algorithm is proposed in this paper. Therein, the task is dispatched to the virtual machine with the least relative workload. Then combined with the local schedule strategy of the virtual machine, the performance of the task dispatching algorithm is analyzed and simulated in CloudSim, which indicate that the proposed algorithm can improve the performance of the clouds.
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this resea...
详细信息
ISBN:
(纸本)9781467390880
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations. Further potential research topics are also discussed with case study and simulation.
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,th...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,the process of which is called role *** have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment(UPA) relationships are *** this paper,we define the evaluation criterion and the 8-Approx Important Role Mining Problem(δ-IRMP) which is proved to be NP-complete first,then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions ***,we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover, the capacity of the port cold storage is of great importance to the cold chain network as most of catch is handled and temporarily stored at seaports. Here, a multi-product, three-echelon and multiperiod network model is applied to a distant-water fishery cold chain design problem based on capacities. This network-design includes optimal cold storage facility locations and optimal flow amounts. And a two-stage stochastic programming method is used to handle the uncertainties.
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objecti...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objectives, and derives futures of comment distribution from three aspects, i.e., quantity, time and spa psychological rhythms and time arrangement. And the space of comment distribution is associated with regional economic levels, geographical locations and statuses. The study also finds that news with different themes or events has remarkable differences in comment distributions.
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are l...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are less than satisfactory because of many complex factors. Therefore, in order to find these factors and improve the classification accuracy, we describe the details of classification methods with logistic regression and support vector machine algorithm, then discuss the impact of different methods on classification results and the factors that affect the classification accuracy in one *** that we briefly introduce the image feature extraction which plays a necessary role of image classification.
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family ...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family of software *** this paper,we propose a framework to detect the missing common requirements in the context of software product *** framework mainly consists of two parts:a set of rules to extract the common requirements,the dependency relationships among them and a procedure for detecting the omission in an incoming set of *** experiments are conducted on a group of medical applications to validate our *** results indicate that our proposed framework is effective.
暂无评论