Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ...
详细信息
Online payment fraud detection relies on a credible characterization of individual behaviors. Existing individual behavior profiling methods have three problems in credibility. Firstly, they solely regard users as ind...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model, a novel MAD model was developed according to the hierarchical structure. The experimental results demonstrate that the proposed algorithm provides better performance, in terms of average peak signal-to-noise ratio (PSNR) and quality smoothness, than the H.264 reference model, JM14.2, under various sequences.
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign...
详细信息
Representation learning on dynamic graphs has drawn much attention due to its ability to learn hidden relationships as well as capture temporal patterns in graphs. It can be applied to represent a broad spectrum of gr...
详细信息
With the explosive growth of data information, the object-oriented storage system has been widely used. This paper proposed a metadata management strategy based on Distributed File system-Ceph in terms of event classi...
详细信息
Hadoop Distributed File system (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
User behavioral analysis is expected to act as a promising technique for identity theft detection in the Internet. The performance of this paradigm extremely depends on a good individual-level user behavioral model. S...
详细信息
A metaheuristic chain based memetic algorithm namely MCMA is proposed for the classification of metabolomics data. MCMA regards both global evolution and local search as equivalent elemental metaheuristics,and searche...
详细信息
A metaheuristic chain based memetic algorithm namely MCMA is proposed for the classification of metabolomics data. MCMA regards both global evolution and local search as equivalent elemental metaheuristics,and searches with a chain of metaheuristics performed alternatively on the target problem. A hidden Markov model based scheduling mechanism is employed in MCMA for the selection of metaheuristics. By using MCMA for optimizing the linkage weight vector, a feature weighting algorithm for metabolomics data is formed to identify relevant metabolite features and reveal their exact relationships with the given physiological states. An extreme learning machine based classifier is utilized in predicting the physiological states according to the weighted metabolite features. Experimental results on real metabolomics data of clinical liver transplantation demonstrate that the proposed feature weighting and classification method obtains better performance than the other compared algorithms.
Because of the resource constraints and high reliability requirement of embedded Distributed system (EDS), some new fault-tolerance means, which are different from the traditional hardware-redundancy ones, should be s...
详细信息
暂无评论