In this paper, we propose a framework of robust and realtime lane marking detection and tracking for the autonomous driving of intelligent vehicle under urban road environments. Our framework use hyperbola model as th...
详细信息
In this paper, we propose a framework of robust and realtime lane marking detection and tracking for the autonomous driving of intelligent vehicle under urban road environments. Our framework use hyperbola model as the lane marking model and several adaptive techniques to robustly extract lane marking pairs for the current lane. The framework provides a complete solution from environment perception of intelligent vehicle to vehicle control. The experimental results achieved on urban road scenarios show that our system performs well under various situation.
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste...
详细信息
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggested to overcome the so-call "small simple size" ***, the researchers suggest bidirectional PCA(BDPCA)method, which may be more real-time and effective than PCA,and proposed BDPCA plus LDA(BDPCA+LDA). In the same way, we suggest bidirectional D-LDA(BDDLDA) should be faster than D-LDA, and proposed BDPCA plus BDDLDA(BDPCA+BDDLDA). In this paper, we present a real-time face recognition system for operating system authentication based on BDPCA+BDDLDA. A face database, which was collected with a CCD camera on the laptop, is used to evaluate this system. Experimental results show that this practical system is real-time and effective.
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggeste...
详细信息
Holistic-based methods, especially principal component analysis(PCA) and linear discriminant analysis(LDA), are very popularly used in face recognition. In last several years, the direct LDA(D-LDA) method was suggested to overcome the so-call "small simple size" problem. Besides, the researchers suggest bidirectional PCA(BDPCA) method, which may be more real-time and effective than PCA, and proposed BDPCA plus LDA(BDPCA+LDA). In the same way, we suggest bidirectional D-LDA(BDDLDA) should be faster than D-LDA, and proposed BDPCA plus BDDLDA(BDPCA+BDDLDA). In this paper, we present a real-time face recognition system for operating system authentication based on BDPCA+BDDLDA. A face database, which was collected with a CCD camera on the laptop, is used to evaluate this system. Experimental results show that this practical system is real-time and effective.
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the keytechnology of cloud computing, and it provides the technical support f...
详细信息
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, inf...
详细信息
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, information collection and root-cause deduction, while in most cases information collection process is independent with root-cause deduction. This results in either redundant information which might pose high communication burden on WSNs, or incomplete information for root-cause inference that leads false judgments. To address the issue, we propose DID, a directional diagnosis approach, in which the diagnosis information acquirement is guided by the fault inference process. Through several rounds of incremental information probing and fault reasoning, root causes of the network abnormalities with high credibility are deduced. We employ a node tracing scheme to reconstruct the topical topology of faulty regions and build the inference model accordingly. We implement the DID approach in our forest monitoring sensor network system, GreenOrbs. Experimental results validate the scalability and effectiveness of this design.
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a...
详细信息
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few P2P protocol provides complete anonymity as well as traceability. In this paper, we propose a security mechanism to ensure anonymity for honest peers and traceability for misbehaving peers in P2P systems. We utilize superposition watermarking based anonymity trace scheme to resolve the conflicts between traceability and anonymity. This scheme uses information processing technology similar to CDMA to superpose path information. security analysis and simulation result show that the superposition watermarking based P2P anonymity trace scheme (SWP2P) can attain tradeoff between anonymity and traceability perfectly.
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture to ensure anonymity and certification for Internet of Things. We use pseudonym and threshold secret sharing approach to resolve conflict between anonymity and certification. Moreover, the implementation of Bloom filter offers security authentication for remote command. security analysis shows that the proposed mechanism can perfectly achieve tradeoff between anonymity, certification, and also resist impersonation, tamper as well as compromise attacks.
作者:
Nengkun YuRunyao DuanMingsheng Ying[]State Key Laboratory of Intelligent Technology and Systems
Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China and Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia
A subspace of a multipartite Hilbert space is said to be locally indistinguishable if any orthonormal basis of this subspace cannot be perfectly distinguished by local operations and classical communication. Previousl...
详细信息
A subspace of a multipartite Hilbert space is said to be locally indistinguishable if any orthonormal basis of this subspace cannot be perfectly distinguished by local operations and classical communication. Previously it was shown that any m⊗n bipartite system with m>2 and n>2 has a locally indistinguishable subspace. However, it has been an open problem since 2005 whether there is a locally indistinguishable bipartite subspace with a qubit subsystem. We settle this problem in negative by showing that any 2⊗n bipartite subspace contains a basis that is locally distinguishable. As an interesting application, we show that any quantum channel with two Kraus operators has optimal environment-assisted classical capacity.
This paper presents a new algorithm for torus/torus intersection. The pre-image of the intersection in the parametric space of one torus is represented by an implicit equation. The pre-image is divided into one-valued...
详细信息
This paper seeks to model the Integrated Modular Avionics (IMA) using Architectural Analysis and Design Language (AADL). In particular, the mechanism to describe the dynamic reconfiguration of multimodal system is pre...
详细信息
This paper seeks to model the Integrated Modular Avionics (IMA) using Architectural Analysis and Design Language (AADL). In particular, the mechanism to describe the dynamic reconfiguration of multimodal system is presented. By translating the AADL model into Time Petri Net (TPN), some real-time and logical properties (deadlock, reach ability, missed deadline) of reconfiguration could be checked. The analysis results could then be used to adjust the design of software at the early stage of system development and ensure that the reconfiguration of IMA meets the real-time constraints.
暂无评论