Public safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep public safe and at...
详细信息
We propose a discriminative latent model for annotating images with unaligned object-level textual annotations. Instead of using the bag-of-words image representation currently popular in the computer vision community...
详细信息
ISBN:
(纸本)9781617823800
We propose a discriminative latent model for annotating images with unaligned object-level textual annotations. Instead of using the bag-of-words image representation currently popular in the computer vision community, our model explicitly captures more intricate relationships underlying visual and textual information. In particular, we model the mapping that translates image regions to annotations. This mapping allows us to relate image regions to their corresponding annotation terms. We also model the overall scene label as latent information. This allows us to cluster test images. Our training data consist of images and their associated annotations. But we do not have access to the ground-truth regionto-annotation mapping or the overall scene label. We develop a novel variant of the latent SVM framework to model them as latent variables. Our experimental results demonstrate the effectiveness of the proposed model compared with other baseline methods.
With Graphics Processing Units (GPUs) becoming more and more popular in general purpose computing, more attentions have been paid on building a framework to provide convenient interfaces for GPU programming. MapReduce...
详细信息
ISBN:
(纸本)9781450323697
With Graphics Processing Units (GPUs) becoming more and more popular in general purpose computing, more attentions have been paid on building a framework to provide convenient interfaces for GPU programming. MapReduce can greatly simplify the programming for data-parallel applications in cloud computing environment, and it is also naturally suitable for GPUs. However, there are some problems in recent reduction-based MapReduce implementation on GPUs. Its performance is dramatically degraded when handling massive distinct keys because the massive data cannot be stored in tiny shared memory entirely. A new MapReduce framework on GPUs, called Jupiter, is proposed with continuous reduction structure. Two improvements are supported in Jupiter, a multi-level reduction scheme tailored for GPU memory hierarchy and a frequencybased cache policy on key-value pairs in shared memory. Shared memories are utilized efficiently for various dataparallel applications whether involving little or abundant distinct keys. Experiments show that Jupiter can achieve up to 3x speedup over the original reduction-based GPU MapReduce framework on the applications with lots of distinct keys. Categories and Subject Descriptors D.1.3 [Programming Techniques]: Concurrent Programming- parallel programming General Terms Algorithms, Performance, Design.
This research paper discusses on the phishing websites Prevention and Detection. A phishing website is a common social engineering method that mimics trustful uniform resource locators (URLs) and webpages. Phishing is...
详细信息
ISBN:
(纸本)9781728177410
This research paper discusses on the phishing websites Prevention and Detection. A phishing website is a common social engineering method that mimics trustful uniform resource locators (URLs) and webpages. Phishing is the most commonly used social engineering and cyber-attack. Through such attacks, the phisher targets naïve online users by tricking them into revealing confidential information, with the purpose of using it fraudulently. In our paper we will be discussing and listing a few of the artificial intelligence models, that will help us to detect these phishing websites so that in the future these data and techniques can be used in machine learning to make our system better and efficient. The problem of phishing is widespread and there is no particular single solution available to effectively reduce all vulnerabilities, so many techniques are often used to reduce certain attacks. Machine learning is a useful tool used to reduce phishing *** innovation keeps on developing, phishing strategies began to advance quickly several anti-phishing tools are available and have their own disadvantages. The paper concentrates on basic Machine learning supervised classification techniques to seek out an answer to phishing attacks. The Basic principle of this paper is to execute the frameworks with good efficiency, exactness, and cost-effectively. The task is attained by using 4 ML managed classification models. The four classification models are KNN, Kernel-SVM, Rando Forest Classifier and Decision tree. The supervised classification contains a labeled dataset that is used to train the models. All the four algorithms used: KNN, Kernel-SVM, Rando Forest Classifier and Decision tree are classification models. With machine learning, cybersecurity systems can analyze patterns and learn from them to assist prevent similar attacks and answer changing behavior. It can help users to be more active in preventing threats and respond to active attacks in real-time. So, by usin
Understanding the peer distribution over the global Internet is the key issue toward building new generation of ISP-friendly peer-to-peer systems. However, there are unfortunately significant scalability and represent...
详细信息
ISBN:
(纸本)9781424459889
Understanding the peer distribution over the global Internet is the key issue toward building new generation of ISP-friendly peer-to-peer systems. However, there are unfortunately significant scalability and representability challenges in measuring and understanding real-world peer distribution. In this paper, we demonstrate a novel hybrid measurement methodology that uses the PlanetLab as a distributed probing platform to interact with BitTorrent trackers and peers in the global Internet.
In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, (1) without...
详细信息
Recently, there have been several research efforts to design a transport layer that meets the security requirements of anonymous communications while maximizing the network performance experienced by users. In this wo...
详细信息
This paper describes an automated tabu search based method for drawing general simple graph layouts with straight lines. To our knowledge, this is the first time tabu methods have been applied to graph drawing. We for...
详细信息
Gesture is one of the most natural and expressive ways of communications between human and computer in a virtual reality system. We naturally use various gestures to express our own intentions in everyday life. Hand g...
详细信息
ISBN:
(纸本)9781424445189
Gesture is one of the most natural and expressive ways of communications between human and computer in a virtual reality system. We naturally use various gestures to express our own intentions in everyday life. Hand gesture is one of the important methods of non-verbal communication for human beings for its freer in movements and much more expressive than any other body parts. Hand gesture recognition has a number of potential applications in human-computer interaction, machine vision, virtual reality, machine control in industry, and so on. As a gesture is a continuous motion on a sequential time series, the HMMs (Hidden Markov Models) must be a prominent recognition tool. The most important thing in hand gesture recognition is what the input features are that best represent the characteristics of the moving hand gesture. This paper presents part of literature review on ongoing research and findings on different technique and approaches in gesture recognition using HMMs for vision-based approach.
Neural Style Transfer (NST) has emerged as a powerful technique for artistic image synthesis by fusing the base image with style source. In this study, we present a comparative analysis of NST using popular convolutio...
详细信息
暂无评论