This paper presents a framework that explicitly detects events in broadcasting baseball videos and facilitates the development of various extended *** phases are included:reliable shot classification,explicit event de...
详细信息
This paper presents a framework that explicitly detects events in broadcasting baseball videos and facilitates the development of various extended *** phases are included:reliable shot classification,explicit event detection,and elaborate *** the shot classification stage,color and geometric information are utilized to classify shots into several canonical *** explicitly detect semantic events,rule-based decision and model-based decision methods are *** emphasize that this system efficiently and exactly identifies what happened in baseball games rather than roughly finding some interesting *** on explicit event detection,many accurate and practical applications such as box score generation and game summarization can be *** evaluation results show the effectiveness of the proposed methods and demonstrate some insights about bridging semantic gaps for sports videos.
This paper studies the estimation of a highdimensional vector signal where the observation is a known "sparse" linear transformation of the signal corrupted by additive Gaussian noise. A paradigm of such a l...
详细信息
This paper studies the estimation of a highdimensional vector signal where the observation is a known "sparse" linear transformation of the signal corrupted by additive Gaussian noise. A paradigm of such a linear system is codedivision multiple access (CDMA) channel with sparse spreading matrix. Assuming a "semi-regular" ensemble of sparse matrix linear transformations, where the bi-partite graph describing the system is asymptotically cycle-free, it is shown that belief propagation (BP) achieves the minimum mean-square error (MMSE) in estimating the transformation of the input vector in the large-system limit. The result holds regardless of the the distribution and power of the input symbols. Furthermore,the mean squared error of estimating each symbol of the input vector using BP is proved to be equal to the MMSE of estimating the same symbol through a scalar Gaussian channel with some degradation in the signal-to-noise ratio (SNR). The degradation,called the efficiency, is determined from a fixed-point equation formula to arbitrary prior distributions.
Recently, a new type of mechanism called compliant mechanism has been developed and applied mainly in the field of micro-mechanics. A compliant mechanism has flexible parts to stabilize the structure, which is contrar...
详细信息
Recently, a new type of mechanism called compliant mechanism has been developed and applied mainly in the field of micro-mechanics. A compliant mechanism has flexible parts to stabilize the structure, which is contrary to the conventional unstable mechanism. Although a compliant mechanism is usually modeled as a continuum with elastic joints, it is possible to generate the similar mechanism by a bar-joint system. Ohsaki and Nishiwaki (Struct. Multidisc. Optim., Vol. 30, pp. 327-334, 2005) presented a method for generating flexible multistable bar-joint mechanisms using nonlinear programming approach. However, due to high nonlinearity of the problem, the nonlinear programming problem should be solved many times starting from different initial solutions to obtain several types of mechanisms. Since the compliant bar-joint mechanism is usually statically determinate, the optimization problem can be solved easily if the design space is limited to statically determinate structures. In this paper, we present an algorithm for enumerating without repetitions all the non-crossing generically minimally rigid bar-joint frameworks, which are regarded as statically determinate trusses in structural engineering. Bistable mechanisms utilizing snapthrough behavior are generated from the statically determinate trusses. In the numerical examples, many bistable compliant mechanisms are generated to show the effectiveness of the proposed method.
This paper presents a beat gesture recognition method to synchronize the tempo of a robot playing a piano with the desired tempo of the *** deal with detection of unstructured beat gesture expressed by any part of bod...
详细信息
This paper presents a beat gesture recognition method to synchronize the tempo of a robot playing a piano with the desired tempo of the *** deal with detection of unstructured beat gesture expressed by any part of body, we apply an optical flow method,and obtain the trajectories of the COG and normalized central moments of moving objects in *** dominant period of beat gesture is estimated from the results of FFT. In addition,we also study a motion control method by which robotic fingers are trained to follow a set of *** the ability to track the trajectories influences the sound a piano generates,we adopt an iterative learning control method to reduce the tracking error.
Recursive algorithm (RA) need a great number of storage space for continue operations (such as push) on stack, which easily causes stack overflow. In the paper, we present a novel recursive algorithm to solve this int...
详细信息
Recursive algorithm (RA) need a great number of storage space for continue operations (such as push) on stack, which easily causes stack overflow. In the paper, we present a novel recursive algorithm to solve this intractability throw constructing recursive tree, which only restoring valuable data for decreasing the spatial complexity, and then traversing recursive tree. In this way, the problem of spatial complexity of recursive algorithm could be solved effectively, making recursive algorithm more practical in application.
This paper describes the development of a Multi-Electrode Array(MEA)with Guided Network for Cell-to-Cell Communication Transduction using a standard integrated circuit(IC) fabrication *** conventional electronic syste...
详细信息
ISBN:
(纸本)1424401607
This paper describes the development of a Multi-Electrode Array(MEA)with Guided Network for Cell-to-Cell Communication Transduction using a standard integrated circuit(IC) fabrication *** conventional electronic system,bio-system requires a special handling environment that is uncommon in conventional IC *** work presented here demonstrated the interaction between electrically active cells such as neuron and cardiac cells and an IC based *** a carefully designed array,and ionic action of a cell, extracellular signals can be captured and imaged.
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is vulnerable to many attacks, since routers rely on hearsay information from neighbors. Secure BGP (S-BGP) uses DSA to provide rout...
详细信息
ISBN:
(纸本)1595932267
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is vulnerable to many attacks, since routers rely on hearsay information from neighbors. Secure BGP (S-BGP) uses DSA to provide route authentication and mitigate many of these risks. However, many performance and deployment issues prevent S-BGP's real-world deployment. Previous work has explored improving S-BGP processing latencies, but space problems, such as increased message size and memory cost, remain the major obstacles. In this paper, we design aggregated path authentication schemes by combining two efficient cryptographic techniques - signature amortization and aggregate signatures. We propose six constructions for aggregated path authentication that substantially improve efficiency of S-BGP's path authentication on both speed and space criteria. Our performance evaluation shows that the new schemes achieve such an efficiency that they may overcome the space obstacles and provide a real-world practical solution for BGP security. Copyright 2005 ACM.
In single trial source separation problem of VEP signals, the selection of legitimate Principal Components (PCs) is an important phenomenon. The Spectral Power Ratio (SPR) method developed by us earlier for PCA has pr...
详细信息
The performance of router is the key factor to decide the property of *** we can upgrade the software of open router automatically,it is very convenient to load some hew services in *** research conclusionin network s...
详细信息
The performance of router is the key factor to decide the property of *** we can upgrade the software of open router automatically,it is very convenient to load some hew services in *** research conclusionin network security and active network enable the software of the router upgrade ***'s first time to propose the security architecture to upgrade the software of open router automatically in *** on the security architecture,the method to dispose network and load some new services is proposed in this paper.
This paper proposes the method to implement resources reservation by using multi-path routing in active ***'s the first time to study the realizing method of resources reservation by using multi-path routing in ac...
详细信息
This paper proposes the method to implement resources reservation by using multi-path routing in active ***'s the first time to study the realizing method of resources reservation by using multi-path routing in active *** the method can avoid emerging fragments of network *** the network can achieve a high reception rate of call,and a high utilization ratio of network *** algorithm of resources reservation is delivered.
暂无评论