In this paper,the Locality-constrained Linear Coding(LLC) algorithm is incorporated into the object tracking ***,we extract local patches within a candidate and then utilize the LLC algorithm to encode these *** on th...
详细信息
ISBN:
(纸本)9781509009107
In this paper,the Locality-constrained Linear Coding(LLC) algorithm is incorporated into the object tracking ***,we extract local patches within a candidate and then utilize the LLC algorithm to encode these *** on these codes,we exploit pyramid max pooling strategy to generate a richer feature *** feature histogram which integrates holistic and part-based features can be more discriminative and ***,an occlusion handling strategy is utilized to make our tracker more ***,an efficient graph-based manifold ranking algorithm is exploited to capture the relevance between target templates and *** tracking,target templates are taken as labeled nodes while target candidates are taken as unlabeled nodes,and the goal of tracking is to search for the candidate that is the most relevant to existing labeled nodes by manifold ranking *** on challenging video sequences have demonstrated the superior accuracy and robustness of the proposed method in comparison to other state-of-the-art baselines.
Sterile insect technique has been successfully applied in the control of agricultural pests, however, it has a limited ability to control mosquitoes. A promising alternative approach is Trojan Y Chromosome strategy, w...
详细信息
Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar ...
详细信息
Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar echo and feeds back to the radar system,and then the radar system adaptively designs the transmission waveform. So the close-loop system is formed. The correlations between these transmission waveforms are decreased because of the adaptive change of these transmission waveforms,and the number of illuminations is reduced for adopting the SHT,which lowers the transmission power of the radar system. The radar system using the new method possesses the RF stealth performance. Aiming at the application of radar automatic target recognition(RATR),experimental simulations show the effectiveness and feasibility of the proposed method.
Under the effect of solar variation, atmospheric attenuation and thermal radiation distribution, the grey value of interference source is close to or equal to the target grey value. With the distance between the imagi...
详细信息
We present the design and fabrication of metamaterials, and investigated the power transmission properties of the metamaterials in the frequency ranging from 1.04THz to 4.25THz. The measured results reveal a global ma...
详细信息
One key challenge of facial trait recognition is the large non-rigid appearance variations due to some irrelevant real world factors, such as viewpoint and expression changes. In this paper, we explore how the shape i...
详细信息
ISBN:
(纸本)9781467369657
One key challenge of facial trait recognition is the large non-rigid appearance variations due to some irrelevant real world factors, such as viewpoint and expression changes. In this paper, we explore how the shape information, i.e. facial landmark positions, can be explicitly deployed into the popular Convolutional Neural Network (CNN) architecture to disentangle such irrelevant non-rigid appearance variations. First, instead of using fixed kernels, we propose a kernel adaptation method to dynamically determine the convolutional kernels according to the spatial distribution of facial landmarks, which helps learning more robust features. Second, motivated by the intuition that different local facial regions may demand different adaptation functions, we further propose a tree-structured convolutional architecture to hierarchically fuse multiple local adaptive CNN subnetworks. Comprehensive experiments on WebFace, Morph II and MultiPIE databases well validate the effectiveness of the proposed kernel adaptation method and tree-structured convolutional architecture for facial trait recognition tasks, including identity, age and gender recognition. For all the tasks, the proposed architecture consistently achieves the state-of-the-art performances.
We prove that Fv(3,5;6) = 16, which solves the smallest open case of vertex Folkman numbers of the form Fv(3,k;k + 1). The proof uses computer algorithms.
We prove that Fv(3,5;6) = 16, which solves the smallest open case of vertex Folkman numbers of the form Fv(3,k;k + 1). The proof uses computer algorithms.
Matching confidence is an important element for evaluating image matching quality. A method is presented which uses the technique of tests of hypotheses to determine image matching confidence under a certain testing l...
详细信息
ISBN:
(纸本)0780340531
Matching confidence is an important element for evaluating image matching quality. A method is presented which uses the technique of tests of hypotheses to determine image matching confidence under a certain testing level. The authors use similarity measurement values to be the statistics. Experimental results with large real images prove the effectiveness of the method to determine image matching confidence.
We present the design and fabrication of metamaterials, and investigated the normalized power transmission properties of four metamaterials at different frequency in terahertz regime. We compared the power transmissio...
详细信息
暂无评论