In this paper, we propose a visual tracking approach based on 'bag of features' (BoF) algorithm. First we use incremental PCA visual tracking (IVT) in the first few frames and collect image patches randomly sa...
详细信息
In this paper, we propose a visual tracking approach based on 'bag of features' (BoF) algorithm. First we use incremental PCA visual tracking (IVT) in the first few frames and collect image patches randomly sampled within the tracked object region in each frame for constructing the codebook;the tracked object then can be converted to a bag. Second we construct two codebooks using color (RGB) features and local binary pattern (LBP) features instead of only one codebook in traditional BoF, thereby extracting more informative details. We also devise an updating mechanism to deal with pose and appearance changes of objects. In the tracking process, a constant number of candidates are generated by sampling technique in each frame. Image patches are then randomly sampled and candidates are represented as bags by codebooks. Thus, we can compute patch similarity of a candidate with the codewords and bag similarity with trained bags. The actual object is then located by finding the maximal combined similarity of patches and bags. Experiments demonstrate that our approach is robust in handling occlusion, scaling and rotation.
We suggest a new approach to the derivation of programs from their specifications. The formal derivation and proof of programs as is practiced today is a very powerful tool for the development of high-quality software...
详细信息
We suggest a new approach to the derivation of programs from their specifications. The formal derivation and proof of programs as is practiced today is a very powerful tool for the development of high-quality software. However, its application by the software development community has been slowed by the amount of mathematical expertise needed to apply these formal methods to complex projects and by the lack of reuse within the framework of program derivation. To address these problems, we have developed an approach to formal derivation that employs the new concept of generic algorithms. A generic algorithm is one that has (1) a formal specification, (2) a proof that it satisfies this specification, and (3) generic identifiers representing types and operations. It may have embedded program specifications or pseudocode instructions describing the next steps in the stepwise refinement process. Using generic algorithms, most software developers need to know only how to pick and adapt them, rather than perform more technically challenging tasks such as finding loop invariants and deriving loop programs. The adaptation consists of replacing the generic identifiers by concrete types and operations. Since each generic algorithm can be used in the derivation of many different programs, this new methodology provides the developer with a form of reuse of program derivation techniques, correctness proofs, and formal specifications.
With the development of national information processes, specific image information from secret departments or individuals is often required to be confidentially transmitted. Numerous image encryption methods exist, es...
详细信息
With the development of national information processes, specific image information from secret departments or individuals is often required to be confidentially transmitted. Numerous image encryption methods exist, especially since the initial value sensitivity and other characteristics of chaos theory and chaos theory-based encryption have become increasingly important in recent years. At present, DNA coding constitutes a new research direction of image encryption that uses the four base pairs of DNA code and image pixel values to establish a special correspondence, in order to achieve pixel diffusion. There are eight DNA encoding rules, and current methods of selecting the DNA encoding rules are largely fixed. Thus, the security of encoded data is not high. In this paper, we use the Lorenz chaotic system, Chen's hyperchaotic system, and the DNA encoding combination and present a new image encryption algorithm that can dynamically select eight types of DNA encoding rules and eight types of DNA addition and subtraction rules, with significant improvements in security. Through simulation experiments and histograms, correlations, and NPCR analyses, we have determined that the algorithm possesses numerous desirable features, including good encryption effects and antishear and antinoise performances.
We study a maximization problem: online scheduling on m identical machines to maximize the number of early jobs. The problem is online in the sense that all jobs arrive over time. Each job's characteristics, such ...
详细信息
We study a maximization problem: online scheduling on m identical machines to maximize the number of early jobs. The problem is online in the sense that all jobs arrive over time. Each job's characteristics, such as processing time and due date, become known at its arrival time. We consider the preemption-restart model, in which preemption is allowed, while once a job is restarted, it loses all the progress that has been made on this job so far. If in some schedule a job is completed before or at its due date, then it is called early (or on time). The objective is to maximize the number of early jobs. For m identical machines, we prove an upper bound 1 - (1/2m) of competitive ratio and show that ECT (earliest completion time) algorithm is 1/2-competitive.
A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process,...
详细信息
A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times. the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions. (C) 2009 Elsevier Ltd. All rights reserved.
This paper presents a Genetic Algorithm (GA) solution to solve the Generation Scheduling (GS) problem with intelligent coding scheme. The intelligent coding scheme effectively handles minimum up/down time constraints ...
详细信息
This paper presents a Genetic Algorithm (GA) solution to solve the Generation Scheduling (GS) problem with intelligent coding scheme. The intelligent coding scheme effectively handles minimum up/down time constraints of GS problem. GA with intelligent coding is called as Intelligent Genetic Algorithm (IGA). Penalty parameter-less constraint handling technique is used for satisfying power balance constraint. Performance of the IGA is tested on a 10-unit 24-h and 26-unit 24-h unit commitment test systems. The result obtained using IGA is compared with the results reported using Lagrangian Relaxation (LR), Enhanced Lagrangian Relaxation (ELR), LRGA, GA and Evolutionary Programming methods. Simulation results show the effects of intelligent coding scheme in obtaining feasible and minimum cost solution. (C) 2012 Elsevier Ltd. All rights reserved.
This paper investigates the overadaptation problem in current adaptive sliding mode control (ASMC) for rigid spacecraft attitude maneuvers. The inertia matrix uncertainty and external disturbance are taken into accoun...
详细信息
This paper investigates the overadaptation problem in current adaptive sliding mode control (ASMC) for rigid spacecraft attitude maneuvers. The inertia matrix uncertainty and external disturbance are taken into account, and an adaptive scheme is employed for the switching gain calculation. A detailed analysis of existing ASMC design reveals the fact that the switching gain would be overestimated if the ASMC algorithm is developed in the framework of conventional sliding mode control (SMC), owing to the unrelated adaptation caused by initial tracking error. The global sliding mode concept of integral sliding mode control (ISMC) is exploited to solve such a problem. The advantages of the proposed strategy are twofold. First, a much smaller switching gain is generated as compared to conventional ASMC. Second, the resulting small switching gain would not slow down the system response. The advantages of the proposed strategy are verified by both theoretical analysis and simulation results.
In the present article, the origin-destination (O-D) trip matrix estimation is formulated as a simultaneous optimization problem and is resolved by employing three different meta-heuristic optimization algorithms. The...
详细信息
In the present article, the origin-destination (O-D) trip matrix estimation is formulated as a simultaneous optimization problem and is resolved by employing three different meta-heuristic optimization algorithms. These include a genetic algorithm (GA), a simulated annealing (SA) algorithm, and a hybrid algorithm (GASA) based on the combination of GA and SA. The computational performance of the three algorithms is evaluated and compared by implementing them on a realistic urban road network. The results of the simulation tests demonstrate that SA and GASA produce a more accurate final solution than GA, whereas GASA shows a superior convergence rate, that is, faster improvement from the initial solution, in comparison to SA and GA. In addition, GASA produces a final solution that is more robust and less dependent on the initial demand pattern, in comparison to that obtained from a greedy search algorithm.
We consider the problem of computing discrete Morse and Morse-Smale complexes on an unstructured tetrahedral mesh discretizing the domain of a 3D scalar field. We use a duality argument to define the cells of the desc...
详细信息
We consider the problem of computing discrete Morse and Morse-Smale complexes on an unstructured tetrahedral mesh discretizing the domain of a 3D scalar field. We use a duality argument to define the cells of the descending Morse complex in terms of the supplied (primal) tetrahedral mesh and those of the ascending complex in terms of its dual mesh. The Morse-Smale complex is then described combinatorially as collections of cells from the intersection of the primal and dual meshes. We introduce a simple compact encoding for discrete vector fields attached to the mesh tetrahedra that is suitable for combination with any topological data structure encoding just the vertices and tetrahedra of the mesh. We demonstrate the effectiveness and scalability of our approach over large unstructured tetrahedral meshes by developing algorithms for computing the discrete gradient field and for extracting the cells of the Morse and Morse-Smale complexes. We compare implementations of our approach on an adjacency-based topological data structure and on the PR-star octree, a compact spatio-topological data structure.
We investigated the possible frequency dependence of the moment tensor of large earthquakes by performing W phase inversions using teleseismic data and equally-spaced narrow, overlapping frequency bands. We investigat...
详细信息
We investigated the possible frequency dependence of the moment tensor of large earthquakes by performing W phase inversions using teleseismic data and equally-spaced narrow, overlapping frequency bands. We investigated frequencies from 0.6 to 3.8 mHz. Our focus was on the variation with frequency of the scalar moment, the amount of non-double-couple, and the focal mechanism. We applied this technique to 30 major events in the period 1994-2013 and used the results to detect source complexity. Based on the results, we classed them into three groups according to the variability of the source parameters with frequency: simple, complex and intermediate. Twelve of these events fell into the simple category: Bolivia-1994, Kuril-1994, Sanriku-1994, Antofagasta-1995, Andreanoff-1996, Peru-2001, Sumatra-2004, Sumatra-2005, Tonga-2006, Sumatra-2007, Japan-2011, and the recent Sea of Okhotsk-2013. Seven exhibited significant complexity: Balleny-1998, Sumatra-2000, Indian Ocean-2000, Macquarie Island-2004, Sichuan-2008, and Samoa-2009. The remaining 11 events showed a moderate degree of complexity. Here, we discuss the results of this study in light of independent observations of source complexity, made by various investigators.
暂无评论