Multi-target tracking algorithm often fail when targets are covered, or move fast, and it cannot be recovered from the failure. To solve this problem, firstly we use multiple information which integrate the target mot...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Multi-target tracking algorithm often fail when targets are covered, or move fast, and it cannot be recovered from the failure. To solve this problem, firstly we use multiple information which integrate the target motion information and shape information. Based on the Fisher Criteria, we make the distance between same targets as close as possible which the distance between different targets far away. Secondly, the single target tracker based on strong discriminative ability and the Kalman predictor can track accurately when the target is covered or moves fast. The experimental results show that our multi-target tracking algorithm can track target in occlusion or in fast moving accurately in real time.
Many attempts on improving entity grid model have been made and boost the research on text ***,only a few of them applied it to noisy data domain and students' ***,we proposed a novel discourse coherence model,whi...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Many attempts on improving entity grid model have been made and boost the research on text ***,only a few of them applied it to noisy data domain and students' ***,we proposed a novel discourse coherence model,which is based on entity grid model,to evaluate coherence on Chinese students' *** allusion to the feature of Chinese students' essay,frequently using lexical repetition and coreference methods in coherence essay,we designed a coreference module,instead of clustering algorithm or knowledge base search methods,to integrate with the enhanced coherence *** addition,we fully merged coreference feature into similarity assessment of adjacent sentences,and the semantic *** show that our model outperforms entity-based model and LSA methods and has an ideal effect on students' essay automatic assessment.
How to define and relax the tensor rank is a challenging and meaningful topic. The CP-rank, n-rank, and tensor multirank are three of the most popular *** them n-rank and tensor multirank are widely studied in the low...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
How to define and relax the tensor rank is a challenging and meaningful topic. The CP-rank, n-rank, and tensor multirank are three of the most popular *** them n-rank and tensor multirank are widely studied in the low-rank tensor completion problem, and their relaxations are sum of nuclear norm(SNN) and tensor nuclear norm(TNN),respectively. Both the two kinds of nuclear norm treat the singular values equally, while the different singular values for the practical images represent different physical meanings and should be treated differently. In this paper, we propose a tensor log Det function as the relaxation for tensor multirank rather than TNN. To demonstrate the effectiveness of the proposed function, we introduce the function into the low-rank tensor completion problem and develop an alternating direction method of multipliers(ADMM)-based method. Extensive experiments have shown that the proposed method outperforms the SNN and TNN based methods.
In this paper, a blind image deconvolution method which is derived from Bayesian probabilistic framework is proposed. A robust prior named Gaussian Scale Mixture Fields of Experts(GSM FoE) and a prior that is constr...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In this paper, a blind image deconvolution method which is derived from Bayesian probabilistic framework is proposed. A robust prior named Gaussian Scale Mixture Fields of Experts(GSM FoE) and a prior that is constructed with the l-norm( p≈1.5) are adopted to regularize the latent image and the point spread function(PSF) respectively. We use a two phase optimization approach to solve the resulted maximum a-posteriori(MAP) estimation problem, and a simple gradient selecting method is incorporated into the alternating minimization to improve the accuracy of the estimated PSF. Experiments on both synthetic and real world blurred images show that our method can achieve results with high quality.
We formulate the deconvolution problem by combining the negative logarithmic Poisson likelihood with the total variation(TV) regularization, and present a fast algorithm which is based on the method of Lagrange multip...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
We formulate the deconvolution problem by combining the negative logarithmic Poisson likelihood with the total variation(TV) regularization, and present a fast algorithm which is based on the method of Lagrange multiplier to solve it. In the proposed algorithm, the original problem is converted into two sub-problems. One is a simple convex optimization problem which has a closed-form solution. While the other is a conventional deconvolution problem based on the Gaussian noise model, which can be solved efficiently with the variable splitting and penalty technology. The minimizer is reached by alternately solving the two problems for only a few iterations. Experimental results show that the algorithm runs very fast and can achieve restored image of high accuracy.
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this resea...
详细信息
ISBN:
(纸本)9781467390880
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations. Further potential research topics are also discussed with case study and simulation.
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,th...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,the process of which is called role *** have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment(UPA) relationships are *** this paper,we define the evaluation criterion and the 8-Approx Important Role Mining Problem(δ-IRMP) which is proved to be NP-complete first,then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions ***,we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family ...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family of software *** this paper,we propose a framework to detect the missing common requirements in the context of software product *** framework mainly consists of two parts:a set of rules to extract the common requirements,the dependency relationships among them and a procedure for detecting the omission in an incoming set of *** experiments are conducted on a group of medical applications to validate our *** results indicate that our proposed framework is effective.
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover, the capacity of the port cold storage is of great importance to the cold chain network as most of catch is handled and temporarily stored at seaports. Here, a multi-product, three-echelon and multiperiod network model is applied to a distant-water fishery cold chain design problem based on capacities. This network-design includes optimal cold storage facility locations and optimal flow amounts. And a two-stage stochastic programming method is used to handle the uncertainties.
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objecti...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objectives, and derives futures of comment distribution from three aspects, i.e., quantity, time and spa psychological rhythms and time arrangement. And the space of comment distribution is associated with regional economic levels, geographical locations and statuses. The study also finds that news with different themes or events has remarkable differences in comment distributions.
暂无评论