In recent years, people detection and face recognition technology developed quickly, including people detection part there is considerable room for development. People detection can be used in vehicle auxiliary system...
详细信息
ISBN:
(纸本)9781509026784
In recent years, people detection and face recognition technology developed quickly, including people detection part there is considerable room for development. People detection can be used in vehicle auxiliary systems or monitoring systems to identify people by the camera to capture the image. However, the people detection accuracy and running speed is also a very important part, so this study presents an iOS-based people detection system, the proposed system of the people detection applied to mobile devices. this study will explore the accuracy and running speed for the HOG method of OpenCV on the iOS-based system and try to improve these problems. through histogram of oriented gradient(HOG) method to turn images into grayscale, histogram equalization, dividing the computational domain and computing gradient feature vector and using the support vector machine(SVM) classifier to do classify, and then compare with INRIA database to determine whether a pedestrian and mark the location of pedestrians. Finally, the region of interest is added to reduce the amount of computation, so it can improve the performance of computing, analysis the accuracy and computational time of the experimentally result.
As economy time coming, financial leasing is playing an increasingly important role in economic development, and it is a merging industry with broad prospect. On the one hand, developing financial leasing helps to bri...
详细信息
As economy time coming, financial leasing is playing an increasingly important role in economic development, and it is a merging industry with broad prospect. On the one hand, developing financial leasing helps to bring economic leverage, and pulls investment demand, on the other hand, it is beneficial to speeding up the enterprise technology progress, and promotes industrial structure adjustment. With a low cost and a relatively short period of time, developing a financial leasing system by advanced technology, which satisfies business management needs of finance companies, has become a new topic in the financial leasing management field. Taking a financial leasing as the research object, this paper main introduces the specific application of J2 EE technology in designing a financial leasing system.
One of issue in generative approach for visual tracking is relates to computation time. It is because generative approach uses particle filter for modeling the motion and as a method to predict the state in the curren...
详细信息
ISBN:
(纸本)9781509026784
One of issue in generative approach for visual tracking is relates to computation time. It is because generative approach uses particle filter for modeling the motion and as a method to predict the state in the current frame. the system will be more accurate but slower computation if many particles are used. Recently, the combination between particle filter and sparse model is proposed to handle appearance variations and occlusion in visual tracking. Unfortunately, the issue about computation time still remains. this paper presents fast method for sparse generative approach in visual tracking. In this method, 11 minimization is used to calculate sparse coefficient vector for each candidate sample. then, the maximum weighted is selected to represent the result. Based on simulations, our proposed method demonstrate good result in area under curve parameter and achieve four times faster than other methods with only use fifty particles.
Hands can perform numbers of complex tasks such as eating, writing, typing and playing instruments, which include many activities like picking up, touching and a combination of different movements. As an important com...
详细信息
the Dripcast is a Java programming framework for small devices working with cloud services. the framework provides very simple, easy and practical mechanism to develop typical IoT (Internet of things) applications. th...
详细信息
ISBN:
(纸本)9781467388450
the Dripcast is a Java programming framework for small devices working with cloud services. the framework provides very simple, easy and practical mechanism to develop typical IoT (Internet of things) applications. the Dripcast was originally designed and proposed as a "Transparent Framework" which enables IoT applications to store or process data on cloud platforms without taking care of server-side programming nor relational database. In this paper, we propose an extension of the Dripcast so that such applications may invoke functional features on cloud platforms more flexibly. To achieve such extension, we design and implement indirect invocation of Java method on cloud platforms as well as designing global reference architecture for Java objects on a cloud service. the extensions enable IoT applications to call Java method transparently, not only for targeted object but also objects referred indirectly. As the result, the framework provides a mechanism to analyze a large set of data collected from devices, using computer resources on a cloud service.
the proceedings contain 90 papers. the topics discussed include: a new compile-time obfuscation scheme for software protection;inferring phylogenetic networks of malware families from API sequences;reviving android ma...
ISBN:
(纸本)9781509051540
the proceedings contain 90 papers. the topics discussed include: a new compile-time obfuscation scheme for software protection;inferring phylogenetic networks of malware families from API sequences;reviving android malware with DroidRide: and how not to;software system for automatic reaction to network anomalies and in real time data capturing necessary for investigation of digital forensics;a novel Botnet detection method based on preprocessing data packet by graph structure clustering;a lattice-based access control model for social networks;a novel design of pipeline MDC-FFT processor based on various memory access mechanism;a LEAP PLUS key management scheme with sliding time interval;a particle filter-based approach for effectively detecting low-rate denial of service attacks;distributed air traffic flow management at terminal control area;a method of meta-context ontology modeling and uncertainty reasoning in SWoT;a scalable object detection framework based on embedded Manycore;comparative analysis on the conjunctive and disjunctive assumptions for the belief rule base;analysis of crime rate distribution based on TPML-WMA;factors dominating individuals' retweeting decisions;classification of massive user load characteristics in distribution network;a breast cancer risk classification model based on the features selected by novel F-score index for the imbalanced multi-feature dataset;deepening prose comprehension by incremental free text conceptual graph mining and knowledge;discovering bloom taxonomic relationships between knowledge units using semantic graph triangularity mining;and multi-source and heterogeneous data integration model for big data analytics in power DCS.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
ISBN:
(纸本)9781467399340
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
ISBN:
(纸本)9781467399340
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
the proceedings contain 43 papers. the topics discussed include: the maximum flows in bipartite dynamic networks with lower bounds. the static approach;delay/disruption tolerant networks-based message forwarding algor...
ISBN:
(纸本)9781509017355
the proceedings contain 43 papers. the topics discussed include: the maximum flows in bipartite dynamic networks with lower bounds. the static approach;delay/disruption tolerant networks-based message forwarding algorithm for rural connectivity applications;obfuscation procedure, based on the insertion of a dead code into crypter;testing methods for the efficiency of modern steganography solutions for mobile platforms;proposed classification of malware, based on obfuscation;a delay-sensitive mathematical model approach and a distributed algorithm for mobile wireless sensor networks;the performance of neural network statistical evaluation;use of informal knowledge sources and net generation;and enterprise architecture framework oriented to cloud computing services.
Document is unavailable: this DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of ieee's "Publication Services and Products Board Operatio...
Document is unavailable: this DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of ieee's "Publication Services and Products Board Operations Manual," ieee has chosen to exclude this article from distribution. We regret any inconvenience.
暂无评论