Nowadays, ever expanding camera network makes it difficult to find the suspect from lengthy video records. This paper proposes a target-driven video summarization framework which provides two-step Filtered Summarized ...
详细信息
ISBN:
(纸本)9781479923427
Nowadays, ever expanding camera network makes it difficult to find the suspect from lengthy video records. This paper proposes a target-driven video summarization framework which provides two-step Filtered Summarized Video (FSV) for tracing suspects. Before the target is identified, users can find the target efficiently using the first-step FSV of any arbitrary camera. The first-step FSV filters all the attributes of the target including the time information and the target's categories. After identifying the target, the second-step FSV with additional spatio-temporal & appearance cues are triggered in the neighbor cameras. To enhance the accuracy of the object classification for FSV, we propose a Perspective Dependent Model (PDM) which consists of many grid-based models. Finally, the experimental results show that grid-based model is more robust than general detectors and the user study demonstrates better performance for target finding and tracking in camera network for surveillance.
To accommodate a wide variety of application services, the network virtualization environment (NVE) has received much attention. In an NVE, infrastructure providers (InPs) provide service providers (SPs) with virtual ...
详细信息
To accommodate a wide variety of application services, the network virtualization environment (NVE) has received much attention. In an NVE, infrastructure providers (InPs) provide service providers (SPs) with virtual networks (VNs) using the InPs' substrate resources for the SPs' application services. Service providers have flexible requirements of topology, quality of service (QoS), and their dynamic changes on VNs. To meet all these requirements, traditional approaches based on performance guarantee relying only on InPs are inefficient and sometimes infeasible because they result in significant operational cost. We propose an architecture in which SPs can select appropriate resources from available resources and dynamically use the allocated resources depending on their application characteristics and user situations to meet their demands. In the proposed architecture, SPs can improve VN performance through resource control, and InPs are not required to have any performance guaranteed networks. Therefore, the proposed architecture can balance QoS and resource efficiency. We also present the basic design of the proposed architecture and show use cases and a prototype implementation using OpenFlow technologies.
Both the size and the resolution of images always were key topics in the graphical computing area. Especially, they become more and more relevant in the big data era. We can observe that often a huge amount of data is...
详细信息
Both the size and the resolution of images always were key topics in the graphical computing area. Especially, they become more and more relevant in the big data era. We can observe that often a huge amount of data is exchanged by medium/low bandwidth networks or yet, they need to be stored on devices with limited space of memory. In this context, the present paper shows the use of the Fractal method for image compression. It is a lossy method known by providing higher indexes of file reduction through a highly time consuming phase. In this way, we developed a model of parallel application for exploiting the power of multiprocessor architectures in order to get the Fractal method advantages in a feasible time. The evaluation was done with different-sized images as well as by using two types of machines, one with two and another with four cores. The results demonstrated that both the speedup and efficiency are highly dependent of the number of cores. They emphasized that a large number of threads does not always represent a better performance.
In this paper, we will investigate a more challenging vehicle matching problem. The problem is formulated as invariant image feature matching among opposite viewpoints of cameras, i.e. complementary object matching. F...
详细信息
ISBN:
(纸本)9781467361989
In this paper, we will investigate a more challenging vehicle matching problem. The problem is formulated as invariant image feature matching among opposite viewpoints of cameras, i.e. complementary object matching. For example, a front vehicle object may be given as a query to retrieve a rear vehicle object of the same vehicle. To solve the complementary object matching, invariant image feature is first extracted based on ASIFT (affine and scale-invariant feature transform) for each detected vehicle in a camera network. Then, the ASIFT feature is expanded via a special vehicle database. As a result, cross-camera vehicle matching with the help of complementary part can be greatly improved. Experimental results demonstrate the effectiveness of the proposed algorithm and the feasibility to video forensics applications.
In this research, a classification method for human touching behaviors to haptic therapy robot is proposed. It is difficult to apply explicit discrete representation for human touch behaviors such as "slap",...
详细信息
ISBN:
(纸本)9781479902255
In this research, a classification method for human touching behaviors to haptic therapy robot is proposed. It is difficult to apply explicit discrete representation for human touch behaviors such as "slap", "pat" due to the existence of intermediate touch behavioral patterns. Therefore a new classification approach for human touch behaviors using Self Organizing Map (SOM) is proposed, using its ability to classify the nearby data in to a group. Further in this research the axis of out put maps are defined to be meaningful by specifying the initial placement of the input data during the training process.
This paper shows the design and implementation of a Role Based Access Control (RBAC) mechanism for securing a hypervisor called BitVisor. BitVisor is a small hypervisor that provides security functions like encryption...
详细信息
ISBN:
(纸本)9781479914449
This paper shows the design and implementation of a Role Based Access Control (RBAC) mechanism for securing a hypervisor called BitVisor. BitVisor is a small hypervisor that provides security functions like encryption services for I/O devices in its hypervisor-layer. BitVisor enforces security functions without the help of guest OSs, but it only supports a static configuration file for machine set up. Consequently, we employ the RBAC system called PERMIS, a proven implementation of an RBAC policy decision engine and credential validation service, in order to provide dynamic configuration control. By using PERMIS, we can write finer grained authorization policies and can dynamically update them for the security-purpose hypervisor.
In this paper, we study the process of information diffusion in a microblog service developing Galton-Watson with Killing (GWK) model. Microblog services offer a unique approach to online information sharing allowing ...
详细信息
ISBN:
(纸本)9781467359443
In this paper, we study the process of information diffusion in a microblog service developing Galton-Watson with Killing (GWK) model. Microblog services offer a unique approach to online information sharing allowing microblog users to forward messages to others. We describe an information propagation as a discrete GWK process based on Galton-Watson model which models the evolution of family names. Our model explains the interaction between the topology of the social graph and the intrinsic interest of the message. We validate our model on dataset collected from Sina Weibo and Twitter microblog. Sina Weibo is a Chinese microblog web service which reached over 100 million users as for January 2011. Our Sina Weibo dataset contains over 261 thousand tweets which have retweets and 2 million retweets from 500 thousand users. Twitter dataset contains over 1.1 million tweets which have retweets and 3.3 million retweets from 4.3 million users. The results of the validation show that our proposed GWK model fits the information diffusion of microblog service very well in terms of the number of message receivers. We show that our model can be used in generating tweets load and also analyze the relationships between parameters of our model and popularity of the diffused information. To the best of our knowledge, this paper is the first to give a systemic and comprehensive analysis for the information diffusion on microblog services, to be used in tweets-like load generators while still guaranteeing popularity distribution characteristics.
S1 Health literacy and health education in adolescence Catarina Cardoso Tomás S2 The effect of a walking program on the quality of life and well-being of people with schizophrenia Emanuel Oliveira, D. Sousa, M. U...
S1 Health literacy and health education in adolescence Catarina Cardoso Tomás S2 The effect of a walking program on the quality of life and well-being of people with schizophrenia Emanuel Oliveira, D. Sousa, M. Uba-Chupel, G. Furtado, C. Rocha, A. Teixeira, P. Ferreira S3 Diagnosis and innovative treatments - the way to a better medical practice Celeste Alves S4 Simulation-based learning and how it is a high contribution Stefan Gisin S5 Formative research about acceptability, utilization and promotion of a home fortification programme with micronutrient powders (MNP) in the Autonomous Region of Príncipe, São Tomé and Príncipe Elisabete Catarino, Nelma Carvalho, Tiago Coucelo, Luís Bonfim, Carina Silva S6 Safety culture of the patient: a reflexion about the therapeutic approach on the patient with vocal pathology Débora Franco S7 About wine, fortune cookies and patient experience Jesús Alcoba González O1 The psychological impact on the emergency crews after the disaster event on February 20, 2010 Helena G. Jardim, Rita Silva O2 Musculoskeletal disorders in midwives Cristina L. Baixinho, Mª Helena Presado, Mª Fátima Marques, Mário E. Cardoso O3 Negative childhood experiences and fears of compassion: Implications for psychological difficulties in adolescence Marina Cunha, Joana Mendes, Ana Xavier, Ana Galhardo, Margarida Couto O4 Optimal age to give the first dose of measles vaccine in Portugal João G. Frade, Carla Nunes, João R. Mesquita, Maria S. Nascimento, Guilherme Gonçalves O5 Functional assessment of elderly in primary care Conceição Castro, Alice Mártires, Mª João Monteiro, Conceição Rainho O6 Smoking and coronary events in a population of Spanish health-care centre: An observational study Francisco P. Caballero, Fatima M. Monago, Jose T. Guerrero, Rocio M. Monago, Africa P. Trigo, Milagros L. Gutierrez, Gemma M. Milanés, Mercedes G. Reina, Ana G. Villanueva, Ana S. Piñero, Isabel R. Aliseda, Francisco B. Ramirez O7 Prevalence of musculoskeletal injuries in Por
It was found that the non-perturbative corrections calculated using Pythia with the Perugia 2011 tune did not include the effect of the underlying event. The affected correction factors were recomputed using the Pythi...
It was found that the non-perturbative corrections calculated using Pythia with the Perugia 2011 tune did not include the effect of the underlying event. The affected correction factors were recomputed using the Pythia 6.427 generator. These corrections are applied as baseline to the NLO pQCD calculations and thus the central values of the theoretical predictions have changed by a few percent with the new corrections. This has a minor impact on the agreement between the data and the theoretical predictions. Figures 2 and 6 to 13, and all the tables have been updated with the new values. A few sentences in the discussion in sections 5.2 and 9 were altered or removed.
Maximum heart rate (MHR) is commonly used to estimate exercise intensity with the Karvonen formula, and there are several methods of calculating it. In this study, we used pedaling experiments on a cycle ergometer to ...
详细信息
ISBN:
(纸本)9789898565716
Maximum heart rate (MHR) is commonly used to estimate exercise intensity with the Karvonen formula, and there are several methods of calculating it. In this study, we used pedaling experiments on a cycle ergometer to evaluate methods of determining MHR in order to select the ones most suitable for the Karvonen formula. In the experiments, 43 subjects rode an aerobike. The results show that, for people in their 20s, two methods are suitable for estimating exercise intensity with the Karvonen formula. The main physical parameters affecting exercise intensity were also extracted, based on the experimental results.
暂无评论