With the proliferation of multimedia capable devices, media services have to deal with heterogeneous environments where very different types of terminals wish to receive content anywhere and anytime. This situation mo...
详细信息
Omnidirectional vehicles acting in human environment need to express their actions, because it is difficult for human to predict actions of the vehicles due to the loss of changes in posture. Omni-Winker is proposed a...
详细信息
Omnidirectional vehicles acting in human environment need to express their actions, because it is difficult for human to predict actions of the vehicles due to the loss of changes in posture. Omni-Winker is proposed as an indicator for omnidirectional vehicles, where the Omni-Winker expresses locomotive behavior such as the direction and speed of the vehicle to all human around the vehicles. Two type of Omni-Winker are developed and evaluated in Human-Robot Interaction situations. The proposed Omni-Winker leads to interactive collision avoidance, where the winker encourages human-driven collision avoidance in addition to existing intelligent sensing technology.
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio...
详细信息
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relationships with other attacks, etc. Then, on the basis of the attack model and the FSM description method, we present a security testing approach for WSN protocols, in order to evaluate the security of the tested protocols. Finally, we take the TinyPK protocol and Sybil attack for example to implement our design, and the Protocol Security Testing Report shows as expected that the TinyPK cannot resist the Sybil attack. Thus, the security testing approach proposed is feasible.
According to the application research in the inf.rmation system and the rules of construction on domain ontology, this paper proposed the conception of adding the financial domain ontology to the existing public senti...
详细信息
Extended use of MPLS technology in transport networks which improves routing performance introduced some more sophisticated requirements like Advanced Network Management, Quality of Service (QoS) and Resource Optimiza...
详细信息
The order in which requirements are implemented in a system affects the value delivered to the final users in the successive releases of the system. Requirements prioritization aims at ranking the requirements so as t...
详细信息
In this paper, we propose a new object detection method that does not need a learning mechanism. Given a hand-drawn model as a query, we can detect and locate objects that are similar to the query model in cluttered i...
详细信息
Fires or toxic gas leakages may have grave consequences like significant pecuniary loss or even lead to human victims. In this paper we present an autonomous wireless sensor system for early fire and gas leak detectio...
详细信息
Many biologically motivated problems are expressed as dynamic programming recurrences and are difficult to parallelize due to the intrinsic data dependencies in their algorithms. Therefore their solutions have been sp...
详细信息
In this paper, we propose a data-driven foreground object detection technique which can detect foreground objects from a moving camera. We propose to build a data-driven consensus foreground object template (CFOT) and...
详细信息
ISBN:
(纸本)9781424475421
In this paper, we propose a data-driven foreground object detection technique which can detect foreground objects from a moving camera. We propose to build a data-driven consensus foreground object template (CFOT) and then detect the foreground object region in each frame. The proposed foreground object detection technique is equipped with the following functions: (1) the ability to detect the foreground object captured by a fast moving camera ; (2) the ability to detect a low contrast (spatially/temporally) foreground object; and (3) the ability to detect a foreground object from a dynamic background. There are three contributions of our method: (1) a newly proposed data-driven foreground region decision process for generating the CFOT has been shown robust and efficient; (2) a foreground object probability is proposed for properly dealing with the imperfect initial foreground region estimations; and (3) a CFOT is generated for precise foreground object detection.
暂无评论