When the high occlusion occurs in crowded scene, face detection is a better substitute for detecting pedestrian. In this paper, we present a novel crowd analysis method based on discriminative descriptor of faces and ...
详细信息
This paper will present an obstacle detection approach that relies on the three-dimensional information from stereo vision. Concerning real-time response of the system and high accuracy of the reconstructed points, in...
详细信息
Geographic routing has been introduced in mobile ad hoc networks and sensor networks. But its per-formance suffers greatly from mobility-induced location errors that can cause Lost Link (LLNK) and LOOP problems. Thu...
详细信息
Geographic routing has been introduced in mobile ad hoc networks and sensor networks. But its per-formance suffers greatly from mobility-induced location errors that can cause Lost Link (LLNK) and LOOP problems. Thus various mobility prediction algorithms have been proposed to mitigate the errors, but sometimes their prediction errors are substantial. A novel mobility prediction technique that incorpo-rates both mobile positioning information and road topology knowledge was presented. Furthermore, the performance of the scheme was evaluated via simulations, along with two other schemes, namely, Linear Velocity Prediction (LVP) and Weighted Velocity Prediction (WVP) for comparison purpose. The results of simulation under Manhattan mobility model show that the proposed scheme could track the movement of a node well and hence provide noticeable improvement over LVP and MVP.
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ...
详细信息
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to gener...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model, a novel MAD model was developed according to the hierarchical structure. The experimental results demonstrate that the proposed algorithm provides better performance, in terms of average peak signal-to-noise ratio (PSNR) and quality smoothness, than the H.264 reference model, JM14.2, under various sequences.
Representation learning on dynamic graphs has drawn much attention due to its ability to learn hidden relationships as well as capture temporal patterns in graphs. It can be applied to represent a broad spectrum of gr...
详细信息
With the explosive growth of data information, the object-oriented storage system has been widely used. This paper proposed a metadata management strategy based on Distributed File system-Ceph in terms of event classi...
详细信息
Hadoop Distributed File system (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
暂无评论