A novel active appearance model (AAM) search algorithm based on partial least squares (PLS) regression is proposed. PLS models the relationship between independent (texture residuals) and dependent (error in the model...
详细信息
A novel active appearance model (AAM) search algorithm based on partial least squares (PLS) regression is proposed. PLS models the relationship between independent (texture residuals) and dependent (error in the model parameters) variables in the training phase by extracting from independent and dependent variables a set of orthogonal factors called latent variables respectively which have the maximum covariance. During search, the parameter updates with the best predictive power are extracted from the texture residuals. On the other hand, PLS is well suited for the low observation-to-variable ratio context, where the sample covariance matrix is likely to be singular, which is very common in AAM. Experiments show that the proposed method has better performance than the original AAM and comparable performance to AAM search based on Canonical correlation analysis (CCA-AAM) in terms of convergence speed, whilst affording superior computational efficiency.
Historical click-through data is very effective to improve performance of search engine. In this paper, labeling algorithm (LA) using fingerprint similarity and query distance based on click-through data is proposed. ...
详细信息
Historical click-through data is very effective to improve performance of search engine. In this paper, labeling algorithm (LA) using fingerprint similarity and query distance based on click-through data is proposed. This strategy obtains relevant pages of query by two ways. One uses labels between query and page produced in bipartite graph. Another one treats relevant pages of similar queries as its own. Finally we calculate relevancy between queries and pages using fingerprint similarity and query distance. Based on AOL query logs, we conduct experiments on LA. Results show LA can greatly improve search with low computational complexity. Compared with other query log mining algorithms, LA achieves higher precision and lower hit location.
DoS (Denial of service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle. As a result, the cloud node response is slow as usual and resource on cloud network be...
详细信息
DoS (Denial of service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle. As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. The most vulnerable incident happen when the adversary is committed DDoS (Distributed Denial of service) attack with comprised cloud network. In this paper, the prevention techniques for DDoS (Distributed Denial of service) attack in cloud nodes were discussed, a dynamic window scheme in cloud nodes to determine a message verification to resolve unnecessary packet processing was proposed.
Increasingly, many data sources appear as online databases, which are hidden behind query forms, forming the Deep Web. Automatic Deep Web data extraction is a key step of Deep Web query result processing. Extracting t...
详细信息
Wireless capsule endoscopy(WCE) has been gradually applied in hospitals due to its great advantage. This paper addresses the problem of automatic detection of tumor for WCE images. Firstly, the Level Set Method is uti...
详细信息
Wireless capsule endoscopy(WCE) has been gradually applied in hospitals due to its great advantage. This paper addresses the problem of automatic detection of tumor for WCE images. Firstly, the Level Set Method is utilized to searching suspected tumors in WCE images. Fractional Fourier Transform(FRFT) is applied on the region of the suspected tumors. Then suspected tumor textures of frequency domain are analyzed with the Normalized Gray Level Co-occurrence Matrix(NGLCM) model. After the texture character is abstracted, we use it to determine whether a tumor appears in the image or not. The proposed method does not rely on any learning-based classifier, and it can save plenty of time in train samples. Extensive experiments validate that the proposed method achieves coverage of 95.6% and accuracy of 85.0% and is a promising tumor detection.
This paper investigated two novel robust adaptive NN-based backstepping algorithms for the tracking problem of robotic rigid-link manipulators with uncertain kinematics,dynamics and actuator *** controllers are both d...
详细信息
This paper investigated two novel robust adaptive NN-based backstepping algorithms for the tracking problem of robotic rigid-link manipulators with uncertain kinematics,dynamics and actuator *** controllers are both designed based on the backstepping *** and external disturbances in the manipulator dynamics are compensated by radial basis function in every step of *** first control algorithm could guarantee the tracking error converges to a small neighborhood of zero;the second improved control algorithm demanding link accelerations information could make sure the tracking error goes to zero quickly and *** feasibility and effectiveness of the proposed methods are verified by simulation studies.
Social networks are widely used by all kinds of people to express their opinions. Predicting election outcomes is now becoming a compelling research issue. People express themselves spontaneously with respect to the s...
详细信息
Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scan-based DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the c...
详细信息
Scan-based design for test (DFT) is a powerful and the most popular testing technique. However, while scan-based DFT improves test efficiency, it also leaves a side channel to the privacy information stored in the chip. This paper investigates the side channel and proposes a simple but powerful scan-based attack that can reveal the key and/or state stored in the chips that implement the state-of-the-art stream ciphers with less than 85 scan-out vectors.
We present a novel manifold-based approach for cross-speed gait recognition. In our approach, the walking action is considered as residing on a manifold, in the feature space, that is homomorphic to a unit circle. We ...
详细信息
We browse through hundreds of Deep web pages everyday to find information of interest. We feel happy when Deep web browsing operations provide us with necessary information;otherwise, we feel bitter. Now, the measurem...
详细信息
暂无评论