This paper will present an obstacle detection approach that relies on the three-dimensional information from stereo vision. Concerning real-time response of the system and high accuracy of the reconstructed points, in...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ...
详细信息
At present, most of the work has focused on Web services composition from the QoS side, little work being done on investigating how to implement service selection based on transactional and QoS requirements. In compli...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model, a novel MAD model was developed according to the hierarchical structure. The experimental results demonstrate that the proposed algorithm provides better performance, in terms of average peak signal-to-noise ratio (PSNR) and quality smoothness, than the H.264 reference model, JM14.2, under various sequences.
The task for the data mining contest organized in conjunction with the ICONIP2011 conference was to learn three predictive models (i.e. a classifier) capable of distinguishing between different classes for three separ...
详细信息
ISBN:
(纸本)9781849195386
The task for the data mining contest organized in conjunction with the ICONIP2011 conference was to learn three predictive models (i.e. a classifier) capable of distinguishing between different classes for three separate tasks. Different combinations of data preprocess, feature selection and classifier learning methods were tried to obtain the best results.
Representation learning on dynamic graphs has drawn much attention due to its ability to learn hidden relationships as well as capture temporal patterns in graphs. It can be applied to represent a broad spectrum of gr...
详细信息
Hadoop Distributed File System (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
With the explosive growth of data information, the object-oriented storage system has been widely used. This paper proposed a metadata management strategy based on Distributed File System-Ceph in terms of event classi...
详细信息
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constra...
详细信息
暂无评论