Visual speech-lip reading, making the computer understands what do speakers want to express through observing the lip direction of them. The most simply method of lip reading in early stage is to compare between chara...
详细信息
Visual voice lip-reading, so the computer can understand what the speakers want to express direction by looking at their lips. Lip reading is the easiest way to compare the early characters and templates from the froz...
详细信息
Visual voice lip-reading, so the computer can understand what the speakers want to express direction by looking at their lips. Lip reading is the easiest way to compare the early characters and templates from the frozen image is stored. It ignores the very nature and time changes. This method is very simple, but it's just simple elements can be classified, then it may not show significant speech recognition services. Behavior was characterized by more and more common. Because of the hidden Markov model is superior (HMM), which can be widely used in speech recognition. In recent years, is also used to lip reading identification. Classical HMM model, so that the two assumptions: hidden assumptions collected: in t+1 the state can only be in this country is not in the state before t; from the hidden visible state hypothesis: only by regulating the t hide the visible state, rather than the previous state. This hypothesis is not very useful in some applications (such as lip reading) is reasonable. Under certain conditions, in the t state not only limits the t-1, but also t-2. Therefore, this study modified the assumptions of the classical HMM to derive a new HMM model and algorithms, and applied to the lip-reading recognition is increasing discrimination.
Community structure is one of non-trivial topological properties ubiquitously demonstrated in real-world complex networks. Related theories and approaches are of fundamental importance for understanding the functions ...
详细信息
Community structure is one of non-trivial topological properties ubiquitously demonstrated in real-world complex networks. Related theories and approaches are of fundamental importance for understanding the functions of networks. Previously, we have proposed a probabilistic algorithm called the NCMA to efficiently as well as effectively mine communities from real-world networks. Here, we show that the NCMA can be readily extended and applied to address a wide range of network oriented applications beyond community detection including ranking, characterizing and searching real world networks.
Among those researches in Deep Web, compared to research of data extraction which is more mature, the research of data annotation is still at its preliminary stage. Currently, although the approach of applying ontolog...
详细信息
Most previous works on combinational equivalence checking use BDDs and other Boolean level representations to formulate and solve the problem, and therefore, not utilizing the word-level information inherently present...
详细信息
Most contemporary database systems query optimizers exploit System-R's bottom-up dynamic programming method (DP) to find the optimal query execution plan (QEP) without evaluating redundant subplans. The distinguis...
详细信息
Automatic image annotation is a promising solution to narrow the semantic gap between low-level content and high-level semantic concept, which has been an active research area in the fields of image retrieval, pattern...
详细信息
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time...
详细信息
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time complexity of this model in the phase of secrets recovery is O(k×t2), which is superior to other two improved YCH models (O(t3) (t>k) O(k3) (t≤k), O(k×(n+k)2)), and the time of secrets synthesis in the actual simulation is less than that of the other three models. Further, we compare the advantages and disadvantages of the four models on the time complexity, verifiability and open values. When n>k, the open values the new model needs are fewer than those of the other two improved YCH models. The experimental results show that the new model is better than the other three models on the time of secrets recovery.
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met...
详细信息
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering method is imperative. Feature selection is one of the most important factors, which can influence the classification accuracy rate. To improve the performance of spam prediction, this paper proposes a new fuzzy adaptive multi-population parallel genetic algorithm (FAMGA) for feature selection. To maintain the diversity of population, a few studies of multi-swarm strategy are reported, whereas the dynamic parameter setting has not been considered further. The proposed method is based on multiple subpopulations and each subpopulation runs in independent memory space. For the purpose of controlling the subpopulations adaptively, we put forward two regulation strategies, namely population adjustment and subpopulation adjustment. In subpopulation adjustment, a controller is designed to adjust the crossover rate for each subpopulation, and in population adjustment, a controller is designed to adjust the size of each subpopulation. Three publicly available benchmark corpora for spam filtering, the PU1, Ling-Spam and Spam Assassin, are used in our experiments. The results of experiments show that the proposed method improves the performance of spam filtering, and is significantly better than other feature selection methods. Thus, it is proved that the multi-population regulation strategy can find the optimal feature subset, and prevent premature convergence of the population.
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC...
详细信息
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TCM has many security features, including integrity measure, integrity report and trusted storage, which can make a vehicular electronic system achieve a trusted boot process and encrypt data and information for storage protection, thereby improving the privacy and security of vehicular platform information. Referring to the TNC(trusted network connect)architecture, we design a kind of vehicular terminal access model compatible with the TNC to authenticate and authorize the trusted vehicular platform with TCM to access Internet of vehicles. The vehicular terminal access model proposed will improve the credibility and security of the Internet of vehicles.
暂无评论