An improved face verification algorithm is proposed based on the combination of modular 2DPCA and CSLDA in this paper. Feature extraction of client specific linear discriminant analysis (CSLDA) transforms an image mat...
详细信息
An improved face verification algorithm is proposed based on the combination of modular 2DPCA and CSLDA in this paper. Feature extraction of client specific linear discriminant analysis (CSLDA) transforms an image matrix to a vector which causes great dimensionality and computational complexity. Furthermore, the local feature is not considered in CSLDA. Then the new method is studied to avoid the deficiency. The initial features are extracted with the original images which are divided into modular sub-images. The 2DPCA is performed to get the low dimensional features which can be computed conveniently. The local features are extracted efficiently using the proposed new method. Then CSLDA is utilized on the new pattern which is obtained through the modular 2DPCA to extract the final features. Compared with PCA, the discriminant information obtained from the between-class scatter matrix and within-class scatter matrix are included using CSLDA. Moreover, client specific subspace could describe the diversity of the different face better and has more robust discriminant information than the traditional LDA. The experimental results obtained on the facial database XM2VTS using the Lausanne protocol and the facial database ORL using the user-defined protocol show that the verification performance of the new method is superior to that of the primary method CSLDA.
This paper deals with the joint estimation of time-delay and spatial (direction-of-arrival, DOA) parameters of several replicas of a known signal in an unknown spatially correlated field. Unstructured and structured m...
详细信息
This paper deals with the joint estimation of time-delay and spatial (direction-of-arrival, DOA) parameters of several replicas of a known signal in an unknown spatially correlated field. Unstructured and structured models have been proposed for maximum likelihood (ML) estimators in the literature. The former suffers from a severe performance degradation in some scenarios, whereas the latter involves huge complexity. It is shown how the extended invariance principle (EXIP) can be applied to obtain estimates with the quality of those of the structured model, but with the complexity of the unstructured one. We present a method to improve the quality of the time-delay estimates obtained with an unstructured spatial model when an estimate of the DOAs is available. Exemplarily, simulation results for time-delay estimation for GPS (Global Positioning System) are included and confirm that our proposal approaches the Cramer-Rao lower bound (CRLB) of the structured model even when suboptimal DOA estimates obtained by ESPRIT are introduced.
Searching in large-scale unstructured peer-to-peer networks is challenging due to the lack of effective hint information to guide queries. In this paper, we propose POP, a Parallel, cOllaborative and Probabilistic sea...
详细信息
Based on the property of Human vision system (HVS) that human eye's sensitivity to an image varies with different information regions of the image, Pulse-coupled neural network (PCNN) model is modified for image s...
详细信息
Based on the property of Human vision system (HVS) that human eye's sensitivity to an image varies with different information regions of the image, Pulse-coupled neural network (PCNN) model is modified for image segmentation. The modified PCNN stimulated by an input image has pulse output with multiple pulse values rather than only two in the conventional PCNN, according to the local information rate of the input image. This results in image segmentation according to local information rate delivered from the image by the modified PCNN. Experiments with the modified PCNN on image segmentation and image compression on the segmented images with the principle that the lower information rate is, the higher compression rate is applied, show much better performance in compression rate compared with that on the segmented images with the conventional PCNN.
In this article, we propose a (t,n) threshold verifiable multi-secret sharing scheme, in which to reconstruct t secrets needs to solve t simultaneous equations. The analysis results show that our scheme is as easy as ...
详细信息
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
Signals described by functions of continuous and discrete variables can be uniformly studied in a group theoretic framework. This paper presents a consideration which shows that in the case of multiple-valued (MV) fun...
详细信息
We consider the problem of a searcher that looks, for example, for a lost flashlight in a dusty environment. The search agent finds the flashlight as soon as it crosses the ray emanating from the flashlight, and in or...
详细信息
The fracture development during wire drawing operation is an important phenomenon governing the productivity as well as the mechanical properties of the drawn wire. The wire drawing processes was investigated in prese...
详细信息
The fracture development during wire drawing operation is an important phenomenon governing the productivity as well as the mechanical properties of the drawn wire. The wire drawing processes was investigated in present paper in two separate levels - using the 2-dimensional rigid-plastic finite element method (macro-level) and modelling the microstructure changes (micro-level) by the Representative Volume Elements (RVEs). To predict fracture initiation the phenomenological theory of fracture is used. The influence of initial cementite lamellas orientation on triaxity factor and localization of deformation in micro-level is investigated. Obtained results are helpful for a fundamental understanding of pearlitic deformation during development of high strength steel wires for tire cord applications.
暂无评论