The evolution of social network and multimedia technologies encourage more and more people to generate and upload visual information, which leads to the generation of large-scale video data. Therefore, preeminent comp...
详细信息
The evolution of social network and multimedia technologies encourage more and more people to generate and upload visual information, which leads to the generation of large-scale video data. Therefore, preeminent compression technologies are highly desired to facilitate the storage and transmission of these tremendous video data for a wide variety of applications. In this paper, a systematic review of the recent advances for large-scale video compression (LSVC) is presented. Specifically, fast video coding algorithms and effective models to improve video compression efficiency are introduced in detail, since coding complexity and compression efficiency are two important factors to evaluate video coding approaches. Finally, the challenges and fu- ture research trends for LSVC are discussed.
The task for the data mining contest organized in conjunction with the ICONIP2011 conference was to learn three predictive models (i.e. a classifier) capable of distinguishing between different classes for three separ...
详细信息
ISBN:
(纸本)9781849195386
The task for the data mining contest organized in conjunction with the ICONIP2011 conference was to learn three predictive models (i.e. a classifier) capable of distinguishing between different classes for three separate tasks. Different combinations of data preprocess, feature selection and classifier learning methods were tried to obtain the best results.
Petri Nets(PNs)are used for modeling and analyzing discreteevent systems,such as communication protocols,trafficsystems,human-computer interaction,and fault ***’state space explosion problem means that the state spac...
详细信息
Petri Nets(PNs)are used for modeling and analyzing discreteevent systems,such as communication protocols,trafficsystems,human-computer interaction,and fault ***’state space explosion problem means that the state spaceof PNs grows exponentially with PNs’*** thefundamental reachability problem is still an NP-Hard problemin *** has been proved that the equivalence problem forthe reachability sets of arbitrary PNs is undecidable except forsome subclass of PNs[1].That is,the reachability problem ofarbitrary PNs cannot be solved ***,there is noefficient and accurate algorithm to solve the problem.10172In recent years,with the emergence of big data and thedevelopment of computing hardware,a series ofbreakthroughs have been achieved in machine learning,suchas AlphaGo,AlphaFold,and ChatGPT[2−4].As a data-drivenapproach,machine learning can learn potential mappingrelationships between inputs and outputs from large-scaledata.
A primary challenge for visual-based Reinforcement Learning (RL) is to generalize effectively across unseen environments. Although previous studies have explored different auxiliary tasks to enhance generalization, fe...
In order to apply our high efficiency fibre-channel token-routing network (shortened as FC-TR network) to the field of materials simulation research, a new MPI parallel computing environment is proposed and designed, ...
详细信息
ISBN:
(纸本)9783037852736
In order to apply our high efficiency fibre-channel token-routing network (shortened as FC-TR network) to the field of materials simulation research, a new MPI parallel computing environment is proposed and designed, and independently developed a parallel programming environment FC-TR-MPI based on FC-TR network. In FC-TR-MPI, a new method was applied to point-to-point communication that the network communications between processes in the same computing node were changed into memory operations;moreover, according to the underlying software and hardware features of FC-TR network, new algorithms were proposed to optimize the communication performance of some collective communications. Experimental results show that, compared with ScaMPI parallel programming environment, FC-TR-MPI has a higher parallel efficiency and speedup.
Online payment fraud detection relies on a credible characterization of individual behaviors. Existing individual behavior profiling methods have three problems in credibility. Firstly, they solely regard users as ind...
详细信息
Traffic forecasting plays a crucial role in intelligent transportation systems and finds application in various domains. Accurate traffic forecasting remains challenging due to the time-varying correlations within the...
More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, ...
详细信息
More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, such as swimming, flying, and walking, even when isolated from the brain and sensory inputs. If we could build up any models that have similar functions as CPGs, it will be much easier to design better locomotion for robots. In this paper, a self-training environment is designed and through genetic algorithm (GA), walking trajectories for every foot of AIBO are generated at first. With this acquired walking pattern, AIBO gets its fastest locomotion speed. Then, this walking pattern is taken as a reference to build CPGs with Hopf oscillators. By changing corresponding parameters, the frequencies and the amplitudes of CPGs' outputs can be adjusted online. The limit cycle behavior of Hopf oscillators ensures the online adjustment and the walking stability against perturbation as well. This property suggests a strong adaptive capacity to real environments for robots. At last, simulations are carried on in Webots and verify the proposed method.
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. Th...
详细信息
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user's password can be changed freely using the proposed protocol.
A novel layered method was proposed to solve the problem of Web services *** this method,services composition problem was formally transformed into the optimal matching problem of every layer,then optimal matching pro...
详细信息
A novel layered method was proposed to solve the problem of Web services *** this method,services composition problem was formally transformed into the optimal matching problem of every layer,then optimal matching problem was modeled based on the hypergraph theory,and solved by computing the minimal transversals of the ***,two optimization algorithms were designed to discard some useless states at the intermediary steps of the composition *** effectiveness of the composition method was tested by a set of experiments,in addition,an example regarding the travel services composition was also *** experimental results show that this method not only can automatically generate composition tree whose leaf nodes correspond to services composition solutions,but also has better performance on execution time and solution quality by adopting two proposed optimization algorithms.
暂无评论