In order to solve the problem of insufficient accuracy of the existing person re-identification *** propose a neural network model for identifying pedestrian properties and pedestrian Id. Compared with the existing me...
详细信息
In order to solve the problem of insufficient accuracy of the existing person re-identification *** propose a neural network model for identifying pedestrian properties and pedestrian Id. Compared with the existing methods, the model mainly has the following three advantages. First, our network adds extra full connection layer, ensure model migration ability. Second,based on the number of samples in each attribute, the loss function of each attribute has been normalized, avoid number unbalanced among the attributes to effect the identification accuracy. Third, we use the distribution of the attribute data in the prior knowledge, through the number to adjust the weight of each attribute in the loss layer, avoid the number of data sets for each attribute of positive and negative samples uneven impact on recognition. Experimental results show that the algorithm proposed in this paper has high recognition rate, and the rank-1 accuracy rate on dukeMTMC dataset is 72.83%,especially on Market1501 dataset. The rank-1 accuracy rate is up to 86.90%.
In order to solve the problem of sparse training samples in logo recognition task,a multi-type context-based logo data synthesis algorithm is *** algorithm comprehensively utilizes the local and full context of the lo...
详细信息
In order to solve the problem of sparse training samples in logo recognition task,a multi-type context-based logo data synthesis algorithm is *** algorithm comprehensively utilizes the local and full context of the logo object and the scene image to guide the synthesis of the logo *** experimental results on the FlickrLogos-32 show that the proposed algorithm can greatly improve the performance of the logo recognition algorithm without relying on additional manual annotation,verify the validity of the synthesis algorithm,and further prove that multi-type context can improve the performance of the object recognition algorithm.
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt...
详细信息
ISBN:
(纸本)9781538683408
due to the high homogeneity of current routing infrastructure, the resilience of the network is facing a serious threat when a defective software upgrade or a denial-of-service attack occurs. Many existing works adopt heterogeneity philosophy to improve the resilience of the network. For example, diverse variants are placed to nodes in the network. However, the existing works assume that diverse variants do not have common vulnerabilities, which is an invalid assumption in some real networks. Therefore, the existing diverse variant placement algorithms could not achieve optimal performance. In this paper, we consider the situation that some variants have common vulnerabilities. We model the correlation-aware diverse variant placement problem as an integer-programming optimization problem. Since the problem is NP-hard, we design a Simulated Annealing-based algorithm to efficiently solve the problem. The simulation results show that compared with baseline algorithms, the proposed algorithms can effectively improve network resilience about 15%.
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain r...
详细信息
ISBN:
(纸本)9781538683408
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain routing system, and find that it is constructed by two stages as key nodes/links failure andrelated nodes/links cascading failure. The first stage is shorter as the onset time is seconds' level, while the second stage is longer as the onset time is at least one hour. Then a two-phase detection method Fd-SP mechanism is put forward, the first stage of which adopts real-time detection methods to identify the initial failure nodes and links and the second stage uses dF 2 -CFM model to predict the damage range of cascade failure before true propagation. To validate Fd-SP, it is applied to security events containing cascading failures and the results of Fd-SP are compared with the datasets collected from rIPE during security events. Using the number of Update messages received by nodes as the metric, the maximum relative error is 1.69 and the average one is 0.92. As our prediction is a little large than reality, the false negative rate of Fd-SP is low.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by reducing the noise in Feature Maps (FMs). Our approach is divided into three steps. Firstly, we separate all the FMs into n blocks equally. Then, the weighted summation of FMs at the same position in all blocks constitutes a new block of FMs. Finally, we replicate this new block into n copies and concatenate them as the input to the FC layer. This sharing of FMs couldreduce the noise in them apparently and avert the impact by a particular FM on the specific part weight of hidden layers, hence preventing the network from overfitting to some extent. Using the Fermat Lemma, we prove that this method could make the global minima value range of the loss function wider, by which makes it easier for neural networks to converge and accelerates the convergence process. This methoddoes not significantly increase the amounts of network parameters (only a few more coefficients added), and the experiments demonstrate that this method could increase the convergence speed and improve the classification performance of neural networks.
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest ...
详细信息
ISBN:
(纸本)9781538695722;9781538695715
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest analysis methods based on the eye movement do not determine whether the area contains targets or not, in this paper a method was presented to predict the targets in the regions of interest using cognitive activities from eye movement. The methodrealized the detection and location of targets in remote-sensing images through the combination of fixation location and cognitive activity in eye movements. Experiments showed that the cognitive activities related to fixations make significant contribution to target prediction in the remote sensing image with complex backgrounds.
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern cl...
详细信息
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern classification; closed loop systems; anddigital simulation.
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform ...
详细信息
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform deployment and allocation of the acceleration resources is an urgent problem to be solved. Thus in this paper, a unifieddeployment architecture of acceleration resource for VNF is proposed firstly. On the basis of architecture, the problem of acceleration resource allocation is modeled. By analyzing the influence of acceleration resource for VNF on deployment of service chains, we propose the evaluation index of acceleration resource allocation algorithm for VNF. Finally, we design a two-stage acceleration resource allocation algorithm to solve the problem. The experimental results show that the proposed algorithm can rationally allocate acceleration resources to nodes in the entire network and improve the efficiency of acceleration resource utilization.
The proposal of the multi-controller has improved the scalability andreliability of software-defined networking (SdN), and the entire network is divided into several subdomains with the self-governed controller. due ...
详细信息
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more an...
详细信息
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more and more prominent. Mimic defense is based on the system architecture of dynamic heterogeneous redundancy. data is sent to multiple heterogeneous functional equivalents through the input agents, and then the response of heterogeneous functional equivalents is judged according to a certain arbitration policy by the output agent. The abnormal output of a functional equivalent can be effectively eliminated, enabling the system to achieve intrusion prevention against unknown system vulnerabilities or backdoors. This paper analyzes the effect of the isomorphism of functional equivalents on system security, and proposes a mimic method based on the equivalence of mimicry maximization. Experiments have shown that the effectiveness of security defense can be significantly improved.
暂无评论