In visual tracking, developing a robust appearance model is a challenging task due to variations of object appearances such as background clutter, illumination variation and partial occlusion. In existing tracking alg...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In visual tracking, developing a robust appearance model is a challenging task due to variations of object appearances such as background clutter, illumination variation and partial occlusion. In existing tracking algorithms, a target candidate is represented by linear combinations of target ***, the relationship between a target candidate and the corresponding target templates is nonlinear because of appearance variations. In this paper, we propose a kernelized convex hull based target representation for visual tracking. Namely, a target is represented by a nonlinear combination of target templates in a mapped higher dimensional feature space. The convex hull model can covers the target appearances that do not appear in the target templates. Experimental results demonstrate the robustness and effectiveness of the proposed tracking algorithm against several state-of-the-art tracking algorithms.
Compiling principle is an important course of computer science major,which mainly introduces general principles and basic methods of the construction of compiling programs *** to high demands of the logic analysis abi...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Compiling principle is an important course of computer science major,which mainly introduces general principles and basic methods of the construction of compiling programs *** to high demands of the logic analysis ability,the course bring abstract and unintelligible experience to many *** it is quite difficult for students to master the main points of this course within the limited class *** on the requirement above,this paper mainly proposed a method of making use of natural language processing in the research and application of compiling process,which utilizes Maximum Probability Word Segmentation algorithm during the process of lexical analysis and syntax analysis,to offer more effective interface between human and *** proposed method can provide students with intuitive and profound knowledge concept in the process of learning how to compile,makes it easier and quicker for students to understand the principle of computer compiling.
GPUs(Graphics processing units) have been increasingly adopted for large-scale graph processing by exploiting the inherent parallelism. There have been many efforts in designing specialized graph analytics and general...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
GPUs(Graphics processing units) have been increasingly adopted for large-scale graph processing by exploiting the inherent parallelism. There have been many efforts in designing specialized graph analytics and generalized frameworks. The two classes of graph processing systems share some common design choices, and often make specific trade-offs. However, there is no characterization study that provides an in-depth understanding of both approaches. In this paper, we analyze two GPU-based graph processing systems(Enterprise and Gunrock) from the perspective of breadth-first graph traversal. We conduct both high-level performance comparison and low-level characteristic evaluation such as workload balancing, synchronization, and memory subsystem. We investigate the differences based on10 real-world and synthetic graphs. Our results reveal some uncommon findings that would be beneficial to the research and development of large-scale graph processing on GPUs.
Deep learning for face identification-verification application has been proven to be fruitful. Human faces constituted the main information for human identification besides gait, body silhouette, etc. Deep learning fo...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Deep learning for face identification-verification application has been proven to be fruitful. Human faces constituted the main information for human identification besides gait, body silhouette, etc. Deep learning for forensic face identification could provide quantitative indexes for face similarity measurement between the questioned and the known human faces in cases, which had the advantage of result objectivity without expert experience influences. We studied the deep learning based face representation for forensic verification of human images. Its application strategies and technical limitations were discussed. We proposed a "winner-takeall" strategy in the case of the forensic identification of human images in videos. We expected the theories and techniques for forensic identification of human images in which both qualitative and quantitative analysis methods were included and expert judgment and automatic identification methods were coexisted.
Network-on-chip(NoC) mapping algorithms significantly affect NoC system performance in terms of communication cost and energy consumption. For a specific application represented by a task graph, this paper proposes ...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Network-on-chip(NoC) mapping algorithms significantly affect NoC system performance in terms of communication cost and energy consumption. For a specific application represented by a task graph, this paper proposes an energyaware mapping algorithm that searches for the mapping solution with best communication locality and therefore lowest energy consumption. During the search procedure, we employ a simulation-free, communication locality-based energy model to evaluate the quality of each candidate mapping. By iteratively updating the best candidate mapping using a greedy search heuristic, the search procedure converges to an mapping decision with optimal energy efficiency in the search space. Compared with the round-robin mapping strategy, the proposed method is capable of exploring energy-efficient mapping decision for various applications as well as network sizes.
Hashing learning has attracted increasing attention these years with the rapid increase of data. Some highdimensional data have caused the ’dimension disaster’ which make traditional methods ineffective. In this pap...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Hashing learning has attracted increasing attention these years with the rapid increase of data. Some highdimensional data have caused the ’dimension disaster’ which make traditional methods ineffective. In this paper, we propose a method to find the nearest neighbor quickly from the highdimensional data, named pseudo-inverse locality preserving iterative hashing(PLIH).We use pseudo-inverse to replace the inverse matrix in order to solve the problem of matrix *** construct adjacency graphs and minimize the distance of the neighbors in the subspace to make the projected matrix maintain the neighborhood relations of high dimension, which solves the problem that the locality sensitive hashing cannot preserve the high-dimensional neighborhood relations effectively. Because different bit with different weight has more discriminating power than the same weight, Loss of the projection matrix in the quantization process is minimized by weighted iterative quantization. Experiments on public datasets Cnn096daltech and Gist12 daltech demonstrated that accuracy and recall of the PLIPH are both better than the traditional hashing algorithms.
Up to now, the relation classification systems focus on using various features generated by parsing modules. However, feature extraction is a time consuming work. Selecting wrong features also lead to classification e...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Up to now, the relation classification systems focus on using various features generated by parsing modules. However, feature extraction is a time consuming work. Selecting wrong features also lead to classification errors. In this paper, we study the Convolutional Neural Network method for entity relation classification. It uses the embedding vector and the original position information relative to entities of words instead of the features extracted by traditional methods. The N-gram features are extracted by filters in the convolutional layer and the whole sentence features are extracted by the pooling layer. Then the softmax classifier in the fully connected layer is applied for relation classification. Experimental results show that the method of random initialization of the position vector is unreasonable, and the method using the vector and the original position information of words performs better. In addition, filters with multiple window sizes can capture the sentence features and the original location information can replace the complex window sizes.
In this paper, we propose a video enhancement method using temporal-spatial total variation Retinex and luminance adaption. To utilize the temporal information between video frames, we construct a illumination data fi...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In this paper, we propose a video enhancement method using temporal-spatial total variation Retinex and luminance adaption. To utilize the temporal information between video frames, we construct a illumination data fidelity term and propose an temporal-spatial total variation model for Retinex. In order to further enhance the contrast of video frames, we use the adaptive Gamma correction with weighting distribution as a post processing step. Thus, the proposed method is able to enhance ation. Experimental results demonstrate the efficiency of the proposed method.
Many QoS-aware service selection approaches assume that the QoS attributes are crisp values and the actual user requirements are not taken into consideration, when the service-oriented applications are constructed. As...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Many QoS-aware service selection approaches assume that the QoS attributes are crisp values and the actual user requirements are not taken into consideration, when the service-oriented applications are constructed. As a result, users searching result may not be correct and good, because there are uncertainties in the data and the optimal solutions but not satisfying some requirements may not be acceptable to some users. In this paper, we propose to use Fuzzy Set Theory(FST) and fuzzy genetic algorithm(FGA) for QoS-based service selection. FST is applied to specify the triangular fuzzy-valued description of the QoS properties. A FGA is proposed to solve the QoS-aware service composition problem, which considers the actual QoS requirements from users in the selection *** comparisons with two algorithms on different scales of composite service indicate that FGA is highly competitive regards to searching capability.
With the growing trends of cloud computing, the security issues in this area are growing at the same speed as its development. Some malicious intruders and other malware activities tend to find the inner vulnerabiliti...
详细信息
ISBN:
(纸本)9781467390880
With the growing trends of cloud computing, the security issues in this area are growing at the same speed as its development. Some malicious intruders and other malware activities tend to find the inner vulnerabilities and spare no effort to control the administration or conduct the pure break-down service with curiosity or on purpose. Traditional defense systems such as firewall, intrusion detection and malware code system are still utilized in nowadays network scenes, but they may not support enough in cloud computing environment with old-fashioned architectures. Here we focus on intrusion detection system (IDS) to defend against intruders and other attacks. In this paper, we proposed a collaborative intrusion detection service and our goal is to make use of the state-of-the-art computing framework in cloud environment and to provide a rounded IDS service for both cloud providers and cloud tenants, while the collaborative architecture will help to respond to the attacks promptly. We set up our system prototype and discuss the empirical results on the preference. The experimental results demonstrate that our system does enhance the security when some network-based attacks happen and ensure that both cloud service providers and tenants are protected with satisfaction.
暂无评论