In this paper, we construct a kind of combiner functions with high nonlinearity and correlation-immunity. This construction is based on the relationship between properties of the combiners with 1bit memory and the cry...
详细信息
In this paper, we have proposed three methods to improve the performance of the bottleneck(BN) feature based GMM-HMM system. Firstly, we recommend a new bottleneck feature architecture, namely LBN, which places the bo...
详细信息
In this paper, we have proposed three methods to improve the performance of the bottleneck(BN) feature based GMM-HMM system. Firstly, we recommend a new bottleneck feature architecture, namely LBN, which places the bottleneck layer at the last hidden layer instead of the middle, in order to take advantage of the more discriminative and invariant higher layer features. Secondly, we employ the rectified linear units (ReLUs) based DNN as bottleneck feature extractor. Finally, we investigate the sequence discriminative training of bottleneck neural network to achieve more powerful bottleneck feature. We have evaluated our methods in 309-hour Switchboard (SWB) task. Compared with the traditional hybrid DNN-HMM system, our proposed ReLUs based LBN-GMM-HMM system can achieve about 9.7% recognition error rate reduction relatively.
Mesh editing plays an important role in the design of mesh models. The As-Rigid-As-Possible (ARAP) surface editing algorithm is likely to produce degenerated results in sharp regions. This degeneration affects the qua...
详细信息
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ...
详细信息
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
Flickr groups are self-organized user communities revolving around a common interest and of massive popularity. In recent years, the explosive growth in the number of the group makes it difficult for Flickr users to f...
详细信息
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu...
详细信息
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illumination changes and the other is processing speed. In this paper, first, histograms of oriented gradient (HOG) features are extracted to resolve the problem of illumination changes. Second, AdaBoost based algorithm is used in detection phase to increase the processing speed. Finally, RBF-SVM classifier is used for recognition. Experimental results show a high detection and recognition accuracy and the processing speed is about 10 frames per second.
This paper studies the vibration rejection problem of active suspension discrete-time systems under in-vehicle networks and designs a controller of feedforward and feedback optimal vibration rejection. Based on the gr...
详细信息
This paper studies the vibration rejection problem of active suspension discrete-time systems under in-vehicle networks and designs a controller of feedforward and feedback optimal vibration rejection. Based on the ground displacement power spectral density, an discrete-time exosystem is employed to estimate the random road disturbances. A two degree of freedom discrete-time system is introduced to describe the active suspension under in-vehicle networks. Then, the original vibration control is formulated as the optimal control for a linear discrete-time system affected by external disturbances. The feedforward and feedback optimal vibration rejection law (FFOVRL) is designed by solving the Riccate and Stein equations, in which the feedforward term incorporates the information of the random road disturbances and the feedback loop includes the status of suspension system. The feasibility and effectiveness of the proposed approaches are validated by an active suspension structure.
In this study, a systematic approach to Capturing and Analysing botnets is presented. Our framework is a scalable and robust infrastructure and consists of four modules. Honeynet-based capture system is proposed that ...
详细信息
This paper aims to explore the optimal feature selection with dimensionality reduction and jointly sparse representation scheme for classification. The proposed method is called Optimal Feature Selection Classificatio...
详细信息
This paper aims to explore the optimal feature selection with dimensionality reduction and jointly sparse representation scheme for classification. The proposed method is called Optimal Feature Selection Classification (OFSC). Our model simultaneously learns an orthogonal subspace for jointly sparse feature selection and representation via l 2,1 -norms regularization. To solve the proposed model, an alternately iterative algorithm is proposed to optimize both the jointly sparse projection matrix and representation matrix. Experimental results on three public face datasets and one action dataset validate the quick convergence of our algorithm and show that the proposed method is more competitive than the state-of-the-art methods.
In this paper, a novel and efficient steganalysis based on improved K-means clustering using One-Class Support Vector Machine (OC-SVM) was proposed to blindly determine the existence of hidden messages in an image. Th...
详细信息
ISBN:
(纸本)9783037855744
In this paper, a novel and efficient steganalysis based on improved K-means clustering using One-Class Support Vector Machine (OC-SVM) was proposed to blindly determine the existence of hidden messages in an image. The performance of sample clustering is concerned in the OC-SVM with multi-sphere. In previous work, the K-means was mainly used to create such multi-sphere by clustering. But the traditional K-means depends on initial clustering centers and ended local minimum value. So, to improve the clustering performance of K-means, the SA is employed into the scheme, which can create more reasonable multi-sphere by finding global optimum solutions in the clustering process. Simulation results with the chosen feature set and well-known steganographic techniques indicated that our approach was able to afford reasonable accuracy to distinguish between covers and stego images.
暂无评论