Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications, such as movie trailer construction, movie content filtering, and movi...
详细信息
Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications, such as movie trailer construction, movie content filtering, and movie content retrieval. In this paper, we present a novel method for this task. Our approach first extracts the reliable motion information of local invariant features through a robust keypoint tracking computation; then foreground keypoints are distinguished from background keypoints by a sophisticated voting process; further, the parameters of the camera motion model is computed based on the motion information of background keypoints, and this model is then used as a reference to compute the actual motion of foreground keypoints; finally, the corresponding feature vectors are extracted to characterizing the motions of foreground keypoints, and a support vector machine (SVM) classifier is trained based on the extracted feature vectors to discriminate fighting shots. Experimental results on representative action movies show our approach is very effective.
Contextual question answering (CQA), in which user information needs are satisfied through an interactive question answering (QA) dialog, has recently attracted more research attention. One challenge is to fuse co...
详细信息
Contextual question answering (CQA), in which user information needs are satisfied through an interactive question answering (QA) dialog, has recently attracted more research attention. One challenge is to fuse contextual information into the understanding process of relevant questions. In this paper, a discourse structure is proposed to maintain semantic information, and approaches for recognition of relevancy type and fusion of contextual information according to relevancy type are proposed. The system is evaluated on real contextual QA data. The results show that better performance is achieved than a baseline system and almost the same performance as when these contextual phenomena are resolved manually. A detailed evaluation analysis is presented.
In this work, we propose a new algorithm to solve a variant of the Vehicle Routing Problem that is the Single Vehicle Routing Problem with Deliveries and Selective Pickups (SVRPDSP). Our algorithm produces good qualit...
详细信息
In this work, we propose a new algorithm to solve a variant of the Vehicle Routing Problem that is the Single Vehicle Routing Problem with Deliveries and Selective Pickups (SVRPDSP). Our algorithm produces good quality solutions that are better than the best known solutions in the literature. In order to reduce the time spent to solve large-sized instances, we also propose here a parallel implementation of our algorithm that explores a heterogeneous environment composed of a CPU and a GPU. Therefore, our algorithm harnesses the tremendous computing power of the GPU to improve the performance of the local searches computation. We obtained average speedups from 2.73 to 16.23 times with our parallel approach.
Recently as the demand of smart devices increases, the porting of embedded operating systems such as Google Android, Microsoft Windows Mobile, and Embedded Linux, becomes more important. Consequently, the importance o...
详细信息
The research proposes monitoring network traffic to preventing malicious attacks. It uses statistical theory and fuzzy control architecture to create a single transmission behavior. It will establish a normal transmis...
详细信息
The research proposes monitoring network traffic to preventing malicious attacks. It uses statistical theory and fuzzy control architecture to create a single transmission behavior. It will establish a normal transmission behavior module in order to achieve network monitoring and an alert mechanism. The mechanism tries to improve the abnormal behavior detection rate. The study is divided into three parts. The first part uses tools to simulate detection and aggressive behavior. According to many defensive measure reports, we will build a detection mechanism. The third part uses statistical theory and fuzzy control to monitor each network flow. The mechanism will preprocess denial of service attacks for an intrusion detection system.
The techniques of linear dimensionality reduction have been attracted widely attention in the fields of computer vision and pattern recognition. In this paper, we propose a novel framework called Sparse Bilinear Prese...
详细信息
Automated agents for electricity markets, social networks, and other distributed networks must repeatedly interact with other intelligent agents, often without observing associates' actions or payoffs (i.e., minim...
详细信息
High-performance libraries, the performance-critical building blocks for high-level applications, will assume greater importance on modern processors as they become more complex and diverse. However, automatic library...
详细信息
ISS (Instruction Set Simulator) plays an important role in pre-silicon software development for ASIP. However, the speed of traditional simulation is too slow to effectively support full-scale software development. In...
详细信息
As more and more Web applications emerging on sever end today, the Web browser on client end has become a host of a variety of applications other than just rendering static Web pages. This leads to more and more perfo...
详细信息
暂无评论