To store and retrieve large-scale video data sets effectively, the process of wipe detection is an essential step. In this paper, we propose a wipe scene-change detection algorithm based on Visual Rhythm Spectrum (VRS...
详细信息
To store and retrieve large-scale video data sets effectively, the process of wipe detection is an essential step. In this paper, we propose a wipe scene-change detection algorithm based on Visual Rhythm Spectrum (VRS). The VRS contains distinctive patterns or visual features for wipe effects. During a wipe, intensity change between incoming and the outgoing shots gives rise to abrupt intensity discontinuities on the VRS. The proposed algorithm is designed to detect such discontinuities.
The problem of defection for small object descript by image would be investigated, and the faster detection algorithm based on the genetic algorithm and partial fractal dimension would be presented in this paper. The ...
详细信息
ISBN:
(纸本)9780769535050
The problem of defection for small object descript by image would be investigated, and the faster detection algorithm based on the genetic algorithm and partial fractal dimension would be presented in this paper. The stability of the fractal dimension used in the small object defection and the real-time performance provided by multi-dot searching algorithm provided by genetic algorithm would be fully used in the given algorithm, and the corresponding efficiency and stability of threshold selection for object detection algorithm would be enhanced. On the basis of that, the simulation on the algorithm mentioned-above is carried out and the results illustrated that the algorithm is effective and valid
A new target detection architecture, designated as cognitive detector, is proposed. This method aims at solving the problems arising from simultaneous detecting and tracking targets in various non-stationary and time-...
详细信息
ISBN:
(纸本)9781424421961
A new target detection architecture, designated as cognitive detector, is proposed. This method aims at solving the problems arising from simultaneous detecting and tracking targets in various non-stationary and time-variant clutter environment. Image character of detection background and the scene analysis result, which is the information that hasn't been exploited in any existing integrated detection and tracking system, can help adjust the detection algorithm adapting for the various background and add more information about the target/clutter for data association or tracking to enhance the system's performance. Cognitive detector partitions the radar detection scene using the statistical and image character of the detection background. Then, multipolicy detection algorithm and detection oriented data association method operate based on the former output. At last, feedback structure between detection and tracking algorithm is used to optimize the detection policy. As describing the definition of cognitive detection and its operation processes, the paper focuses on the specific application of high frequency surface wave radar, for which the cognitive detector is rather well suitable.
Most of the fire detection are performed by sensor based systems which have perceived the temperature and smoke by themselves and utilized in various type of industry after combining with the fuzzy theory. Generally t...
详细信息
ISBN:
(纸本)9780769534329
Most of the fire detection are performed by sensor based systems which have perceived the temperature and smoke by themselves and utilized in various type of industry after combining with the fuzzy theory. Generally this kind of methodology is useful for many spots of fire occurrences. However, it could not satisfy the requirement Of accuracy and reliability on some environment. For example, large spaced factories, common area of electric power facility, communication facility are vulnerable to the sensing accuracy and too expensive to cover the entire place. Thus, fire might spread widely over the spots and hard to extinguish even though those sensors detect the fire. For the more it could be worse in the area that causes high temperature, humidity, dust, vibrations. In this study, we tried to improve the problems by using camera image processing instead of sensors. We designed the prototyped system and implemented it after suggesting some type of fire detection algorithm..
A Gravity-based Outliers detection Algorithm GODA is presented Considering that for a data point, both of the density around it and the distance between it and others can influence the outlier's definition, the al...
详细信息
ISBN:
(纸本)9780769532783
A Gravity-based Outliers detection Algorithm GODA is presented Considering that for a data point, both of the density around it and the distance between it and others can influence the outlier's definition, the algorithm can detect the crytic outliers in the dataset. This paper proposes the definitions and techniques firstly and then introducts the algorithm detailedly Experiments have been carried out with real data. and the results indicates that not only the new algorithm is of goog extensible ability but also it has higher efficiency of detecting outliers. It points out the outlier's outlying degree in the dataset as well.
In this paper, we present a novel scene change detection algorithm in the H.264/AVC compressed domain directly. Three major statistical features are used: (i) bit allocation for intra mode macroblocks (Bleb, (ii) bit ...
详细信息
ISBN:
(纸本)9781424442041
In this paper, we present a novel scene change detection algorithm in the H.264/AVC compressed domain directly. Three major statistical features are used: (i) bit allocation for intra mode macroblocks (Bleb, (ii) bit allocation for inter mode macroblocks (BPM), and (iii) the number of skip mode macroblocks in a frame. These features can be easily extracted from the H.264/AVC bitstreams. Besides the percent of skip macroblocks in a frame, an adaptive threshold based on the ratio of BIM to BPM is used to determine the abrupt and the gradual scene changes respectively. Experimental results indicate that the proposed algorithm achieves the good performance with a low computational complexity.
Outlier mining is to discover the objects with exceptional behavior in dataset. It is an important challenge from the knowledge discovery standpoint and attracts much attention recently. The density based outlier mini...
详细信息
ISBN:
(纸本)9780769534800
Outlier mining is to discover the objects with exceptional behavior in dataset. It is an important challenge from the knowledge discovery standpoint and attracts much attention recently. The density based outlier mining algorithm is an effective approach to detect anomalous points. However, such algorithms usually need amounts of computations. In this paper, we propose a modified density based detection algorithm which utilizes the data partitioning method. Furthermore, it presents some speedup strategies such as the introduction of module information to avoid large number of unnecessary computations while finding outliers. The algorithm is applied on both synthetic and real datasets and the experimental results show that it is efficient for outlier detection in large dataset.
Residue number system (RNS) has been recognized as a robust method to perform computations in a parallel fashion. RNS operations provide us with the capability of solving a precise or fuzzy system using a low resoluti...
详细信息
Residue number system (RNS) has been recognized as a robust method to perform computations in a parallel fashion. RNS operations provide us with the capability of solving a precise or fuzzy system using a low resolution multi-moduli system. Despite of the advantages of RNS operations in parallel addition, subtraction, and multiplication, it suffers from some drawbacks such as RNS to binary conversion, sign detection, parity detection, overflow detection, scaling and division by Burgess (1997), and Szaho and Tanaka (1967). Several techniques have been developed to alleviate these drawbacks. For instance MRC (mixed radix conversion) by Szaho and Tanaka (1967), New CRT II (Chinese residue theorem II) by Wang et al. (1998), and core function by Burgess (1997) and Gonella (1991) are some well-known techniques used for RNS to binary conversion. Our study is oriented upon core function. Core function has a non-linear characteristic that causes an ambiguity in RNS to binary conversion as well as sign detection algorithms. Our work is a discussion about the nonlinear characteristic of the core function and its effects on these algorithms. Also, we point to some solutions to alleviate or resolve any ambiguity due to this non-linearity.
In this paper we identify a potential probing technique for remotely discovering the last-matching rules of the security policy of a firewall. The last-matching rules are those rules that are located at the bottom of ...
详细信息
ISBN:
(纸本)9781424433964
In this paper we identify a potential probing technique for remotely discovering the last-matching rules of the security policy of a firewall. The last-matching rules are those rules that are located at the bottom of the ruleset of a firewall's security policy, and would require the most processing time by the firewall. If these rules are discovered, an attacker can potentially launch an effective low-rate DoS attack to trigger worst-case or near worst-case processing, and thereby overwhelming the firewall and bringing it to its knees. As a proof of concept, we developed a prototype program that implements the detection algorithm and validated its effectiveness experimentally.
暂无评论