The breakdown of traffic flow is directly related with the abnormal phenomena such as road traffic incidents. It results in the discontinuities of traffic and reduces the service level. The research of traffic flow br...
详细信息
ISBN:
(纸本)0780385675
The breakdown of traffic flow is directly related with the abnormal phenomena such as road traffic incidents. It results in the discontinuities of traffic and reduces the service level. The research of traffic flow breakdown is often narrowly confined to incident detection, and there are approximately 4 kinds of algorithms: pattern recognition algorithm, statistical inference algorithm, catastrophic theory and neural network algorithm. These methods have played important roles in their past applications, and each has shortcomings. This paper introduces a nonlinear and nonparametric statistical method to analyze traffic flow breakdown. Based on traffic flow theory and combined with mean-value change-point model, the hypothesis testing of the existence of change points and the local-comparison algorithm to search change-points are discussed. The method is calibrated with the data from the city of Southampton, UK. An example of the applications is also included to test the effectiveness of the method.
In this paper, we discuss multiuser detection based on wideband code division multiple access (WCDMA) protocols. Multirate transmission and spreading method of WCDMA systems introduce a problem that characteristics of...
详细信息
In this paper, we discuss multiuser detection based on wideband code division multiple access (WCDMA) protocols. Multirate transmission and spreading method of WCDMA systems introduce a problem that characteristics of multiple access interference (MAI) change periodically. General adaptive algorithms will not work in that situation. An improved adaptive minimum mean-squared error (MMSE) multiuser detection algorithm is proposed to solve the problem. During our processing procedures, output vector sequence, which is cyclostationary, of matched filter is divided into several stationary vector sequences by down sampling. Then we respectively process those sequences using a bank of adaptive transversal filters using least-mean-square (LMS) algorithm. The improved algorithm is analyzed under FDD mode of WCDMA protocols, in which S(2) short scrambling codes are applied. Simulation result shows that improved multiuser detection algorithm solves multirate problems well and effectively suppresses MAI under AWGN channels and multipath time-varying channels according to IMT-2000 Vehicular Model A. The improved adaptive MMSE algorithm has better performance than conventional detector and improved constant modulus algorithm using the same thinking.
Numerous caching algorithms have been investigated for the client-server object database management systems. The algorithms not only ensure cache consistency by preventing applications' access to stale data, but t...
详细信息
Numerous caching algorithms have been investigated for the client-server object database management systems. The algorithms not only ensure cache consistency by preventing applications' access to stale data, but they also support transactional properties. Caching algorithms have been classified in a number of ways - one classification is into avoidance and detection categories, depending on whether access to the stale data is avoided, usually by locking, or permitted and then any conflict detected at commit time. detection-based algorithms have better performance but can lead to high abort rate that is unacceptable for interactive applications. It is for this reason that avoidance-based algorithms are usually adopted in practice. This work describes a server-based interoperable transactional caching algorithm that concurrently supports the leading avoidance-based (adaptive callback locking (ACBL)) and detection-based (adaptive optimistic concurrency control (AOCC)) algorithms. At a client either the avoidance or the detection caching algorithm is used without any changes. It is the server-side caching algorithm that concurrently supports both avoidance and detection client-side caching.
We present an efficient object segmentation strategy based on edge information to assist object-based video coding, motion estimation and motion compensation for the MPEG system. Two parameters are introduced and desc...
详细信息
ISBN:
(纸本)0769521282
We present an efficient object segmentation strategy based on edge information to assist object-based video coding, motion estimation and motion compensation for the MPEG system. Two parameters are introduced and described based on edge information from the analysis of a local histogram. Using these features, a non-contrast based edge function is defined to generate an edge information map, which can be thought as a gradient image. Then, an improved marker-based region growing and merging techniques are derived to separate image regions. The proposed algorithm is tested on several standard images and demonstrates high reliability for object segmentation.
Based on the rides of segmentation results and real time requirements, the proposed method is a simple segmentation method without complicated and large amounts of computation. We obtained frame difference mask (FDM) ...
详细信息
Based on the rides of segmentation results and real time requirements, the proposed method is a simple segmentation method without complicated and large amounts of computation. We obtained frame difference mask (FDM) through the intersections of three twice-frame-difference images, then got moving object mask (MOM). Filling MOM with original values can get segmented images. From experiments, better results can be obtained with less time.
In this paper, we propose an edge detection system with cellular neural network. Applications of this method to remotely sensed images are investigated. First, it is applied the image emphasis method to extract edge i...
详细信息
ISBN:
(纸本)4907764227
In this paper, we propose an edge detection system with cellular neural network. Applications of this method to remotely sensed images are investigated. First, it is applied the image emphasis method to extract edge information. Next, it is made a binary image. Finally, it is applied the noise decrease method. The edge detection result show that this approach produces excellent results which are more realistic and noiseless compared with conventional edge detection methods.
The main contribution of this work is a new view to face-tracking namely to associate the independent detection results obtained by applying a real-time detector to each frame of a sequence. This differs fundamentally...
详细信息
The main contribution of this work is a new view to face-tracking namely to associate the independent detection results obtained by applying a real-time detector to each frame of a sequence. This differs fundamentally from traditional tracking which is mostly understood as finding the location of a target object given its previous position and a correspondence finding algorithm either with or without a prior object model. This traditional notion has two major problems namely the initialization problem and the lost-track problem. We show that the advent of new rapid detectionalgorithms may change the need for traditional tracking. Furthermore the mentioned problems have a natural solution within the presented tracking by continuous detection approach. The only assumption on the object to track is it's maximal speed in the image plane, which can be set very generously. From this assumption we derive three conditions for a valid state sequence in time. To estimate the optimal state of a tracked face from the detection results a Kalman filter is used. This leads to an instant smoothing of the face trajectory. It can be shown experimentally that smoothing the face trajectories leads to a significant reduction of false detections compared to the static detector without the presented tracking extension. We further show how to exploit the highly redundant information in a natural video sequence to speed-up the execution of the static detector by a temporal scanning procedure which we call "slicing". A demo program showing the outcomes of our work can be found in the internet under http://***/bv/biometrie/ for download.
We investigate statistical anomaly detectionalgorithms for detecting SYN flooding, which is the most common type of denial of service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm an...
详细信息
We investigate statistical anomaly detectionalgorithms for detecting SYN flooding, which is the most common type of denial of service (DoS) attack. The two algorithms considered are an adaptive threshold algorithm and a particular application of the cumulative sum (CUSUM) algorithm for change point detection. The performance is investigated in terms of the detection probability, the false alarm ratio, and the detection delay. Particular emphasis is on investigating the tradeoffs among these metrics and how they are affected by the parameters of the algorithm and the characteristics of the attacks. Such an investigation can provide guidelines to effectively tune the parameters of the detection algorithm to achieve specific performance requirements in terms of the above metrics.
暂无评论