This paper presents a new fast template matching method with partial skipping using sub-template. In this method, we use sub-template to search point by point in the current searched window, and compare every SAD with...
详细信息
ISBN:
(纸本)9781467301732
This paper presents a new fast template matching method with partial skipping using sub-template. In this method, we use sub-template to search point by point in the current searched window, and compare every SAD with threshold, if some SAD exceeds the threshold, set the new threshold equal to this SAD value and this point is one potential optimization location, when all points in the current window are compared, we will get a minimum value and a optimization location, then skip the other points whose SAD is not the minimum value. In other words, the searching step is that template size subtracts the sub-template size, and we set the next threshold equal to the current optimization SAD value, we update the threshold and the optimal point until the end of the searched image like this, then will find the global minimum points and its SAD value. Experimental results show that the proposed method is near one hundred times faster than the conventional template match method.
Using Particle Swarm Optimization to handle complex functions with high-dimension it has the problems of low convergence speed and sensitivity to local convergence. The convergence of particle swarm algorithm is studi...
详细信息
Using Particle Swarm Optimization to handle complex functions with high-dimension it has the problems of low convergence speed and sensitivity to local convergence. The convergence of particle swarm algorithm is studied from the dynamic system theory, and the condition for the convergence of particle swarm algorithm is given. The analysis provided qualitative guidelines for the general algorithm parameter selection. Results of numerical tests show the efficiency of the results.
A fuzzy clustering algorithm for intrusion detection based on heterogeneous attributes is proposed in this paper. Firstly, the algorithm modifies the comparability measurement for the categorical attributes according ...
详细信息
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is u...
详细信息
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is using a translation lexicon. However, a major obstacle to this approach is the lack of dictionary for training. This paper presents a method for automatically align Mongolian-Chinese parallel text on the Web via vector space model. Vector space model is an algebraic model for representing any object as vectors of identifiers, such as index terms. In the statistically based vector-space model, a sentence is conceptually represented by a vector of keywords extracted from the text. Extracted keywords are composed by content words, known as terms and the weight of a term in a sentence vector can be determined tf-idf method. CHI is used to compute the association between bilingual words. Once the term weights are determined, the similarity between sentence vectors is computed via cosine measure. The experimental results indicate that the method is accurate and efficient enough to apply without human intervention.
In order to eliminate the internal condensation of enclosed switchgear cabinet, this paper introduced a subminiature and high-performance dehumidifier based on semiconductor refrigeration technology. This equipment ut...
详细信息
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch...
详细信息
ISBN:
(纸本)9781467330930
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.
Based on certificateless key encapsulation mechanisms, a novel cross realm client-to-client authenticated key exchange protocol for clustered wireless sensor networks is proposed in this paper. A detailed security pro...
详细信息
Based on certificateless key encapsulation mechanisms, a novel cross realm client-to-client authenticated key exchange protocol for clustered wireless sensor networks is proposed in this paper. A detailed security proof of the protocol in the standard model is also included. Compared with the identity-based scheme and key encapsulation mechanisms-based scheme, our protocol reduces the communication cost. Meanwhile, the proposed protocol is semantic security, which causes more secure against many popular passive and active attacks, and with high efficiency.
Event anaphora resolution plays a critical role in discourse analysis. This paper proposes a tree kernel- based framework for event pronoun resolution. In particular, a new tree expansion scheme is introduced to autom...
详细信息
ISBN:
(纸本)9781577355120
Event anaphora resolution plays a critical role in discourse analysis. This paper proposes a tree kernel- based framework for event pronoun resolution. In particular, a new tree expansion scheme is introduced to automatically determine a proper parse tree structure for event pronoun resolution by considering various kinds of competitive information related with the anaphor and the antecedent candidate. Evaluation on the OntoNotes English corpus shows the appropriateness of the tree kernel-based framework and the effectiveness of competitive information for event pronoun resolution.
A rule-based approach for Chinese zero anaphor detection is proposed. Given a parse tree, the smallest IP sub-tree covering the current predicate is captured. Based on this IP sub-tree, some rules are proposed for det...
详细信息
In this paper, a neural network adaptive sliding mode control is proposed for the MEMS triaixal gyroscope with unknown system nonlinearities. An input-output linearization technique is incorporated into the neural ada...
详细信息
ISBN:
(纸本)9781467322591
In this paper, a neural network adaptive sliding mode control is proposed for the MEMS triaixal gyroscope with unknown system nonlinearities. An input-output linearization technique is incorporated into the neural adaptive tracking control to cancel the nonlinearities and the neural network whose parameters are updated from the Lyapunov approach is used to perform the linearization control law. Sliding mode control is utilized to compensate the neural network approximation errors. The stability of the closed-loop system can be guaranteed with the proposed adaptive neural sliding mode control. Numerical simulations are investigated to verify the effectiveness of the proposed adaptive neural sliding mode control scheme.
暂无评论