A daytime and nighttime color image fusion method based on IHS transform and Multi-Wavelet transform is presented. The method can automatically merge images of a scene captured under different illumination and can be ...
详细信息
This paper presents an entity answer extraction method based on list web table. Firstly, extract table from page using the features of web page table and label, segment the table that includes the potential entity ans...
详细信息
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC) [1]. The first self-adaptation method is inspire...
详细信息
Services discovery based on syntactic matching cannot adapt to the open and dynamic environment of the web. In order to realize service selection for supporting QoS constraints, a Four-Level Matching Model for Semanti...
详细信息
Traditionally, the algorithm of ID3 takes the information gain as a standard of expanding attributes. During the process of selection of expanded attributes, attributes with more values are usually preferred to be sel...
详细信息
This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast subtrees...
详细信息
This paper presents a novel scheme for feature extraction for face recognition by fusing local and global discriminant features. The facial changes due to variations of pose, illumination, expression, etc. are often a...
详细信息
This paper presents a novel scheme for feature extraction for face recognition by fusing local and global discriminant features. The facial changes due to variations of pose, illumination, expression, etc. are often appeared only some regions of the whole face image. Therefore, global features extracted from the whole image fail to cope with these variations. To address these problems, face images are divided into a number of non-overlapping sub-images and then G-2DFLD method is applied to each of these sub-images as well as to the whole image to extract local and global discriminant features, respectively. The G-2DFLD method is found to be superior to other appearance-based methods for feature extraction. All these extracted local and global discriminant features are then fused to get a large feature vector. Its dimensionality is then reduced by the PCA technique to decrease overall complexity of the system. A multi-class SVM is used as a classifier for recognition based on these reduced features. The proposed method was evaluated on two popular face recognition databases, the AT&T (formerly ORL) and the UMIST face databases. The experimental results show that the new method outperforms the global features extracted by the PCA, 2DPCA, PCA+FLD, 2DFLD and G-2DFLD methods in terms of face recognition.
Two new and efficient algorithms for evaluating the terminal reliability of parallel computer interconnection networks have been proposed. Both the algorithms are based on multiple decomposition approach. The former i...
详细信息
This paper presents a novel Hybrid Approach to Face Recognition using Generalized Two-Dimensional Fisher's Linear Discriminant (HAFR G-2DFLD) Method. It has been seen that the facial changes due to variations of p...
详细信息
This paper presents a novel Hybrid Approach to Face Recognition using Generalized Two-Dimensional Fisher's Linear Discriminant (HAFR G-2DFLD) Method. It has been seen that the facial changes due to variations of pose, illumination, expression, etc. are appeared only some regions of the whole image. Therefore, the conventional face recognition methods, which use whole image for feature extraction and recognition, do not result much success. To cope with the above facial changes, face images are divided into a number of non-overlapping sub-images and then G-2DFLD method is applied to each of these sub-images as well as to the whole image to extract local and global discriminant features, respectively. A multi-class SVM is used as a classifier for each of the sub-images and also for the whole image for recognition based on those extracted features. Finally, a decision is made for recognition of the image by fusing the decisions of the individual SVMs. The proposed HAFR G-2DFLD method was evaluated on two popular face recognition databases, the AT&T and the UMIST face databases. The experimental results show that the new HAFR G-2DFLD method outperforms the conventional global feature extraction methods like, PCA, 2DPCA, PCA+FLD, 2DFLD and G-2DFLD methods in terms of face recognition.
Mobile Ad hoc networks are composed of self-organizing, multi-relaying nodes connected by wireless links that the virtual subnet technology provides support to reduce redundant transmission for efficient communication...
详细信息
ISBN:
(纸本)9781424455652;9781424455669
Mobile Ad hoc networks are composed of self-organizing, multi-relaying nodes connected by wireless links that the virtual subnet technology provides support to reduce redundant transmission for efficient communication is necessary. In order to satisfy security requirements, a node of virtual subnet need to identify the other member nodes, hence the certificate and authentication of virtual subnets must be established to distinguish the member nodes and the unallied nodes. In this paper, an efficient authentication protocol for virtual subnets on mobile ad hoc networks is proposed to aim for the efficiency of certificate and authentication. For the purpose, nodes of a virtual subnet have their private key respectively and they share a public key to reduce the authentication overhead and improve the efficiency. According to protocol analysis, the proposed protocol will show that it is robust with respect to certificate and authentication and very suitable for virtual subnet communication on wireless ad hoc networks.
暂无评论