The robot soccer game is full of challenging in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In our work, we present an approach to describe the strategies of th...
详细信息
The robot soccer game is full of challenging in the field of robot and artificial intelligence. Strategy is a kernel subsystem of robot soccer game. In our work, we present an approach to describe the strategies of the game, based on which a method to improve hub strategy is proposed. The experiment that eliminates the impact of external factors at mostly shows the effectiveness of strategic description and validity of our method.
The main disadvantage of traditional global thresholding techniques is that they do not have an ability to exploit information of the characteristics of target images that they threshold. In this paper, we propose a n...
详细信息
The main disadvantage of traditional global thresholding techniques is that they do not have an ability to exploit information of the characteristics of target images that they threshold. In this paper, we propose a new approach based on combination of modified p-tile and edge detection algorithms to have more accurate object segmentation. Using our proposed method, it is shown that almost all of our experiments on MRI images resulted to better object segmentation than using traditional methods.
Phrase matching is a technique used to detect virus patterns, data leakage, SPAM, and embedded URLs in messages. Depending on the length of the phrases, the complexity of detecting them increases. Presented is an algo...
详细信息
Phrase matching is a technique used to detect virus patterns, data leakage, SPAM, and embedded URLs in messages. Depending on the length of the phrases, the complexity of detecting them increases. Presented is an algorithm that can be implemented efficiently using GPU by reducing the copy costs. The algorithm creates k-grams using collision resistant hashing techniques and matches the k-grams against k-grams of previously known patterns. The comparison is made efficient by comparing fixed sized hash of words instead of the words themselves. It scales to be used in cloud based security services where millions of phrases must be examined per second. It uses the host processor to perform sequential operations such as tokenization and CRC computation to convert words into fixed size phrase terms. Phrases comprising of one or more phrase terms are generated and tested in a massively parallel CUDA environment.
The article examines web mining application in university library search engine. It primarily researches the technology that is personal usage records track in web usage mining. It also discusses how to establish a un...
详细信息
The article examines web mining application in university library search engine. It primarily researches the technology that is personal usage records track in web usage mining. It also discusses how to establish a university library personalized search engine system. The system studies user identification, user profile, user's interest model and user interest extraction. The article explains various processing modules of university library personalized search engine system. It designs university library personalized search engine system. It finally verifies that web mining has effect on searching web page ranking in university library.
Collaborative filtering recommender systems are essentially information systems which are capable of combining the judgment of a large group of people to make personalized recommendations and thereby alleviate the so-...
详细信息
Collaborative filtering recommender systems are essentially information systems which are capable of combining the judgment of a large group of people to make personalized recommendations and thereby alleviate the so-called information overload problem. However,collaborative filtering recommender systems are generally vulnerable to shilling attacks. Attackers can inject carefully chosen profiles into recommender systems in order to bias the recommendation results to their benefits. This may lead to a significant negative impact on the robustness of the systems. The main contribution of this paper is to build a probabilistic model for attack detection in the framework of probabilistic generative model. Experimental results show that this model can effectively detect shilling attacks of typical types.
Parameters-Optimized Multi-swarms Particle Swarm Optimization (POMS-PSO) is proposed in this paper. The POMS-PSO employs three subswarms totally, the C-swarm, r-subswarm and K-subswarm. The concept of parameter-optimi...
详细信息
Parameters-Optimized Multi-swarms Particle Swarm Optimization (POMS-PSO) is proposed in this paper. The POMS-PSO employs three subswarms totally, the C-swarm, r-subswarm and K-subswarm. The concept of parameter-optimization referred is realized by C-swarm to optimize the free parameters of the r- and K-subswarms using standard PSO. The problem-oriented optimization process is performed by r- and K-subswarm who take the advantage of r-selection and K-selection respectively. We assessed the performance of the POMS-PSO on a set of benchmark functions. The experimental result shows that POMS-PSO could help to optimize the evolution parameters and could improve the convergence precision.
Depth generation is a key technology in computer vision. Known methods mainly rely on stereo matching, or measuring devices like ToF camera. The ToF camera performs well in low-textured regions and repetitive regions ...
详细信息
Depth generation is a key technology in computer vision. Known methods mainly rely on stereo matching, or measuring devices like ToF camera. The ToF camera performs well in low-textured regions and repetitive regions where stereo matching fails. In contrast, stereo matching works better than ToF camera in textured regions. Based on their complementary characteristics, we introduce a method to combine ToF depth and stereo matching. In order to integrate their respective advantages, we measure their reliabilities and construct a new cost volume. Experiment results show that our fusion algorithm improves the accuracy and robustness, the generated depth map is much better than that obtained from an individual method.
Reliable pedestrian detection is an important problem in visual surveillance. This paper presents a combined method for pedestrian detection, which significantly improves the detection accuracy without degradation of ...
详细信息
Reliable pedestrian detection is an important problem in visual surveillance. This paper presents a combined method for pedestrian detection, which significantly improves the detection accuracy without degradation of the detection speed. Firstly, we create a table to mark foreground pixels by means of background difference for eliminating background interference areas. Secondly, Weighted Linear Regression Model embedded into cascade GAB is used for training weak classifier with parts model based on head-shoulder. Finally, two classifiers based on Haar-Like features and Shapelet features respectively fuse to detect pedestrian. The experimental results show that our method can boost the detection rate and reduce the false alarm with non-degradation of detection speed. Particularly, our detection mechanism performs well in the lower resolution and relative complex background situation.
This paper proposes to perform palmprint identification with Hidden Markov Models (HMM). Palmprint identification, as an emerging biometric technology, has been extensively investigated in the last decade. Due to its ...
详细信息
This paper proposes to perform palmprint identification with Hidden Markov Models (HMM). Palmprint identification, as an emerging biometric technology, has been extensively investigated in the last decade. Due to its low-price capture device, fast implementation speed and high accuracy, palmprint identification is very competitive in biometric research area. Currently, the majority of literatures focus on palm line extraction algorithms and coding schemes, with little attention on classifier design. In this paper, Down-sliding Window (DSW) technique is employed to create a highcorrelated feature sequence while palmprint is featured by simple down-sampled images. One-to-50 experiment demonstrates that HMM with single component and six states give the best overall performance 99.80%, which indicates the feasibility of HMMs for tasks in palmprint identification.
In this paper, a new stochastic optimization algorithm is introduced to simulate the plant growing process. It employs the photosynthesis operator and phototropism operator to mimic photosynthesis and phototropism phe...
详细信息
In this paper, a new stochastic optimization algorithm is introduced to simulate the plant growing process. It employs the photosynthesis operator and phototropism operator to mimic photosynthesis and phototropism phenomenon. For the plant growing process, photosynthesis is a basic mechanism to provide the energy from sunshine, while phototropism is an important character to guide the growing direction. In our algorithm, each individual is called a branch, and the sampled points are regarded as the branch growing trajectory. Phototropism operator is designed to introduce the fitness function value, as well as phototropism operator is used to decide the growing direction. To test the performance, it is used to produce initial values for constrained optimization problems. Simulation results show this new algorithm increases the performance significantly when compared with method of randomly generating.
暂无评论