Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CF...
详细信息
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CFO is an entirely deterministic algorithm.
Point cloud matching is much more difficult when an initial estimate of the relative pose is not known. In order to reduce the effect of relative pose on matching operation and improve the computing speed, this articl...
详细信息
Foreground detection methods can be applied to efficiently distinguish foreground objects including moving or static objects from back- ground which is very important in the application of video analysis, especially v...
详细信息
Foreground detection methods can be applied to efficiently distinguish foreground objects including moving or static objects from back- ground which is very important in the application of video analysis, especially video surveillance. An excellent background model can obtain a good foreground detection results. A lot of background modeling methods had been proposed, but few comprehensive evaluations of them are available. These methods suffer from various challenges such as illumination changes and dynamic background. This paper first analyzed advantages and disadvantages of various background modeling methods in video analysis applications and then compared their performance in terms of quality and the computational cost. The Change *** (CDnet2014) dataset and another video dataset with different envi- ronmental conditions (indoor, outdoor, snow) were used to test each method. The experimental results sufficiently demonstrated the strengths and drawbacks of traditional and recently proposed state-of-the-art background modeling methods. This work is helpful for both researchers and engineering practitioners. Codes of background modeling methods evaluated in this paper are available ***/***.
Radio Frequency Identification technology (RFID) is the key technology to realize the Internet of things. Currently, using RFID to locate objects indoor is a hot topic in the research on the application of RFID. In th...
详细信息
Radio Frequency Identification technology (RFID) is the key technology to realize the Internet of things. Currently, using RFID to locate objects indoor is a hot topic in the research on the application of RFID. In this paper, we propose an RFID system based on RFID technology and Wi-Fi wireless communication technology. And we design a corresponding handheld device client software to realize a visual book search and management system. This system can not only greatly improve the efficiency of book search and management but also save the manpower and material resources to a large extent, which has a practical application value.
This paper proposes an multilinear discriminant analysis network (MLDANet) for the recognition of multidimensional objects, knows as tensor objects. The MLDANet is a variation of linear discriminant analysis network (...
详细信息
ISBN:
(纸本)9781467369985
This paper proposes an multilinear discriminant analysis network (MLDANet) for the recognition of multidimensional objects, knows as tensor objects. The MLDANet is a variation of linear discriminant analysis network (LDANet) and principal component analysis network (PCANet), both of which are the recently proposed deep learning algorithms. The MLDANet consists of three parts: 1) The encoder learned by MLDA from tensor data. 2) Features maps obtained from decoder. 3) The use of binary hashing and histogram for feature pooling. A learning algorithm for MLDANet is described. Evaluations on UCF11 database indicate that the proposed MLDANet outperforms the PCANet, LDANet, MPCA+LDA, and MLDA in terms of classification for tensor objects.
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation process of the network attack and defense training platform. This paper focuses on the cloud desktop construction scheme based on B/S structure, and aims to enhance the flexibility and convenience of network attack and defense training platform.
Projection matrix plays an important role in compressive sensing (CS). Small mutual coherence between a projection matrix and a sparsijying matrix is considered to enhance reconstruction performance in CS. The equiang...
详细信息
It is significant for measuring the importance of nodes accurately to improve software stability and robustness in software network. A software execution directed network takes function as a node and relationship of f...
详细信息
This paper proposes an multilinear discriminant analysis network (MLDANet) for the recognition of multidimensional objects, knows as tensor objects. The MLDANet is a variation of linear discriminant analysis network (...
详细信息
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data tr...
详细信息
ISBN:
(纸本)9781785610899
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data transmission and packet loss rate can be decreased when the route or the transmission fails. To solve the problems, we need to study the routing path selection strategies. This paper optimizes the routing path that meets the QoS constraints under the SDN pre planning routing, and proposes a routing mechanism that can solve problems in polynomial time. Firstly, the paper combined with Clustering and Gauss algorithm to simulate the network simulation, obtain the initial experimental data. It can reflect the network status more accurately. Secondly, simplify the multi-objectives based on the AHP, It reduces the complexity of the problem and meets QoS requirements. Finally, select the disjoint communication paths and backup paths with the heuristic algorithms in order to balance the load of network and improve the transmission reliability. The selection mechanism can improve the efficiency of data transmission, and the survival of network communication.
暂无评论