In this paper, a novel supervised classification approach called Collateral Representative Subspace Projection Modeling (C-RSPM) is presented. C-RSPM facilitates schemes for collateral class modeling, class-ambiguity ...
详细信息
Dismounted targets can be tracked in urban environments with video sensors. Real-time systems are unable to process all of the imagery, demanding some method for prioritization of the processing resources. Furthermore...
详细信息
ISBN:
(纸本)1424409535
Dismounted targets can be tracked in urban environments with video sensors. Real-time systems are unable to process all of the imagery, demanding some method for prioritization of the processing resources. Furthermore, various segmentation algorithms exist within image processing, each algorithm possesses unique capabilities, and each algorithm has an associated computational cost. Additional complexity arises in the prioritization problem when targets become occluded (i.e., a building) and when the targets are intermixed with other dismounted entities. This added complexity leads to the question "which portions of the scene warrant both low cost and high cost processing?" The approach presented in this paper is to apply multi-target tracking techniques in conjunction with an integer programming optimization routine to determine optimal allocation of the video processing resources. This architecture results in feedback from the tracking routine to the image processing function which in turn enhances the ability of the tracker
In this paper, we present a robot middleware technology named robot software communications architecture (RSCA) for its use in networked home service robots. The RSCA provides a standard operating environment for the ...
详细信息
ISBN:
(纸本)9781424400546
In this paper, we present a robot middleware technology named robot software communications architecture (RSCA) for its use in networked home service robots. The RSCA provides a standard operating environment for the robot applications together with a framework that expedites the development of such applications. The operating environment is comprised of a real-time operating system, a communication middleware, and a deployment middleware. Particularly, the deployment middleware supports the reconfiguration of component-based robot applications including installation, creation, start, stop, tear-down, and un-installation. In designing RSCA, we have adopted a middleware called SCA from the software defined radio domain and extend it since the original SCA lacks the real-time guarantees and appropriate event services. We have fully implemented RSCA and performed measurements to quantify its run-time performance. Our implementation clearly shows the viability of RSCA
In this paper, a novel agent-based distributed intrusion detection system (IDS) is proposed, which integrates the desirable features provided by the distributed agent-based design methodology with the high accuracy an...
详细信息
ISBN:
(纸本)0769525539;97
In this paper, a novel agent-based distributed intrusion detection system (IDS) is proposed, which integrates the desirable features provided by the distributed agent-based design methodology with the high accuracy and speed response of the principal component classifier (PCC). Experimental results have shown that the PCC lightweight anomaly detection classifier outperforms other existing anomaly detection algorithms such as the KNN and LOF classifiers. In order to assess the performance of the PCC classifier on a real network environment, the relative assumption model together with feature extraction techniques are used to generate normal and anomalous traffic in a LAN testbed. Finally, scalability and response performance of the proposed system are investigated through the simulation of the proposed communication architecture. The simulation results demonstrate a satisfactory linear relationship between the degradation of response performance and the scalability of the system
In this paper, a novel supervised classification approach called collateral representative subspace projection modeling (C-RSPM) is presented. C-RSPM facilitates schemes for collateral class modeling, class-ambiguity ...
详细信息
In this paper, a novel supervised classification approach called collateral representative subspace projection modeling (C-RSPM) is presented. C-RSPM facilitates schemes for collateral class modeling, class-ambiguity solving, and classification, resulting a multi-class supervised classifier with high detection rate and various operational benefits including low training and classification times and low processing power and memory requirements. In addition, C-RSPM is capable of adaptively selecting nonconsecutive principal dimensions from the statistical information of the training data set to achieve an accurate modeling of a representative subspace. Experimental results have shown that the proposed C-RSPM approach outperforms other supervised classification methods such as SIMCA, C4.5 decision tree, decision table (DT), nearest neighbor (NN), KNN, support vector machine (SVM), I-NN best warping window DTW, I-NN DTW with no warping window, and the well-known classifier boosting method AdaBoost with SVM
The development of effective classification techniques, particularly unsupervised classification, is important for real-world applications since information about the training data before classification is relatively ...
详细信息
The development of effective classification techniques, particularly unsupervised classification, is important for real-world applications since information about the training data before classification is relatively unknown. In this paper, a novel unsupervised classification algorithm is proposed to meet the increasing demand in the domain of network intrusion detection. Our proposed UNPCC (unsupervised principal component classifier) algorithm is a multiclass unsupervised classifier with absolutely no requirements for any a priori class related data information (e.g., the number of classes and the maximum number of instances belonging to each class), and an inherently natural supervised classification scheme, both which present high detection rates and several operational advantages (e.g., lower training time, lower classification time, lower processing power requirement, and lower memory requirement). Experiments have been conducted with the KDD Cup 99 data and network traffic data simulated from our private network testbed, and the promising results demonstrate that our UNPCC algorithm outperforms several well-known supervised and unsupervised classification algorithms
In this research, we propose an integrated and interactive framework to manage and retrieve large scale video archives. The video data are modeled by a hierarchical learning mechanism called HMMM (hierarchical Markov ...
详细信息
In this research, we propose an integrated and interactive framework to manage and retrieve large scale video archives. The video data are modeled by a hierarchical learning mechanism called HMMM (hierarchical Markov model mediator) and indexed by an innovative semantic video database clustering strategy. The cumulated user feedbacks are reused to update the affinity relationships of the video objects as well as their initial state probabilities. Correspondingly, both the high level semantics and user perceptions are employed in the video clustering strategy. The clustered video database is capable of providing appealing multimedia experience to the users because the modeled multimedia database system can learn the user's preferences and interests interactively
A comparative study between Java and Avaj, a concurrent programming language, is presented. java uses wait (), notify (), and notifyAll () construct to support monitors, while Avaj simply supports the construct await ...
详细信息
A comparative study between Java and Avaj, a concurrent programming language, is presented. java uses wait (), notify (), and notifyAll () construct to support monitors, while Avaj simply supports the construct await (B), where B is any Boolean expression. The syntax for the Avaj abort () construct is simple and allows programmer to call abort () inside any method. Avaj also incorporates the selective communication construct in the language. The invariant (B) construct in Avaj allows a Boolean expression to be invariant in a program.
In this paper we investigate the problem of finding a delay- and degree-bounded maximum sum of nodes application level multicast tree. We then proved the problem is NP-hard, and its relationship with the well-studied ...
详细信息
In this paper, we present BioGrid, a novel computing resource that combines advantages of grid computing technology with bioinformatics parallel applications. The grid environment permits the sharing of a large amount...
详细信息
暂无评论