In this paper, we present a pose based approach for locating and recognizing human actions in videos. In our method, human poses are detected and represented based on deformable part model. To our knowledge, this is t...
详细信息
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d...
详细信息
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of detecting a mobile target crossing a sensing field. Detection probability of sensor nodes has been studied in sensor networks for many purposes such as quality of service and decision making. However, the sensing capabilities of sensors are affected by environmental factors in real deployment. This paper investigates the problem of detecting probability in a log-normal shadow fading environment. It presents an analytic method to evaluate the detection probability by at least k sensors under practical considerations. Furthermore, we also shows that shadow fading makes significant influence in detection probability compared to unit disk sensing model through extensive simulation experiments.
Event anaphora resolution plays an important role in discourse analysis. In comparison with general noun phrases, pronouns carry little information of themselves, resolving the event pronouns is a more difficult task....
详细信息
Coreference resolution is an important subtask in natural language processing systems. The process of it is to find whether two expressions in natural language refer to the same entity in the world. Machine learning a...
详细信息
In reality, different persons often have the same person name. The Person Cross Document Co-reference Resolution is a task, which requires that all and only the textual mentions of an entity of type Person be individu...
详细信息
Multiple independent spanning trees have applications to fault tolerance and data broadcasting in distributed networks. There is a conjecture on independent spanning trees: any n-connected graph has n independent span...
详细信息
When environmental noise keeps to fractional lower order α-stable distribution, the convergence performance of the traditional blind equalization algorithm is unstable. To overcome the deficiency, on the basis of com...
详细信息
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes *** solve this problem,we propose a security scheme based on the identity-based thres...
详细信息
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes *** solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized *** joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial *** nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing *** results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open...
详细信息
General object recognition and image understanding is recognized as a dramatic goal for computer vision and multimedia retrieval. In spite of the great efforts devoted in the last two decades, it still remains an open problem. In this paper, we propose a selective attention-driven model for general image understanding, named GORIUM (general object recognition and image understanding model). The key idea of our model is to discover recurring visual objects by selective attention modeling and pairwise local invariant features matching on a large image set in an unsupervised manner. Towards this end, it can be formulated as a four-layer bottom-up model, i.e., salient region detection, object segmentation, automatic object discovering and visual dictionary construction. By exploiting multi-task learning methods to model visual saliency simultaneously with the bottom-up and top-down factors, the lowest layer can effectively detect salient objects in an image. The second layer exploits a simple yet effective learning approach to generate two complementary maps from several raw saliency maps, which then can be utilized to segment the salient objects precisely from a complex scene. For the third layer, we have also implemented an unsupervised approach to automatically discover general objects from large image set by pairwise matching with local invariant features. Afterwards, visual dictionary construction can be implemented by using many state-of-the-art algorithms and tools available nowadays.
The method of multi-classifier fusion was applied to essay scoring. In this paper, each essay was represented by Vector Space Model (VSM). After removing the stopwords, we extracted the features of contents and lingui...
详细信息
暂无评论