Existing portrait segmentation methods are easily affected by the background. To address this challenge, we propose a simple convolution-based portrait segmentation algorithm to solve the problems of complex backgroun...
详细信息
We propose new techniques for 2-D shape/contour completion, which is one of the important research topics related to shape analysis and computer vision, e.g. the detection of incomplete objects due to occlusion and no...
详细信息
We propose new techniques for 2-D shape/contour completion, which is one of the important research topics related to shape analysis and computer vision, e.g. the detection of incomplete objects due to occlusion and noises. The purpose of shape completion is to find the optimal curve segments that fill the missing contour parts, so as to acquire the best estimation of the original complete object shapes. Unlike the previous work using local smoothness or minimum curvature priors, we solve the problem under a Bayesian formulation taking advantage of global shape prior knowledge. With the priors, our methods are expert in recovering significant shape structures and dealing with large occlusion cases. There are two different priors adopted in this paper: (i) A generic prior model that prefers minimal global shape transformation (including non-rigid deformation and affine transformation with respect to a reference object shape) of the recovered complete shape; and (ii) a class-specific shape prior model learned from training examples of an object category, which prefers the reconstructed shape to follow the learned shape variation models of the category. Efficient contour completion algorithms are suggested corresponding to the two types of priors. Our experimental results demonstrate the advantage of the proposed shape completion approaches compared to the existing techniques, especially for objects with complex structure under severe occlusion.
In binocular vision, the pixel matching of no obvious feature refers to the matching of pixels in the area where the gray value does not change significantly or in the area where there is no significant gradient chang...
详细信息
A novel method based on rough sets (RS) and the affinity propagation (AP) clustering algorithm is developed to optimize a radial basis function neural network (RBFNN). First, attribute reduction (AR) based on RS theor...
详细信息
A novel method based on rough sets (RS) and the affinity propagation (AP) clustering algorithm is developed to optimize a radial basis function neural network (RBFNN). First, attribute reduction (AR) based on RS theory, as a preprocessor of RBFNN, is presented to eliminate noise and redundant attributes of datasets while determining the number of neurons in the input layer of RBFNN. Second, an AP clustering algorithm is proposed to search for the centers and their widths without a priori knowledge about the number of clusters. These parameters are transferred to the RBF units of RBFNN as the centers and widths of the RBF function. Then the weights connecting the hidden layer and output layer are evaluated and adjusted using the least square method (LSM) according to the output of the RBF units and desired output. Experimental results show that the proposed method has a more powerful generalization capability than conventional methods for an RBFNN.
In response to problems in the centralized storage of personal resumes on third-party recruitment platforms,such as inadequate privacy protection,inability of individuals to accurately authorize downloads,and inabilit...
详细信息
In response to problems in the centralized storage of personal resumes on third-party recruitment platforms,such as inadequate privacy protection,inability of individuals to accurately authorize downloads,and inability to determine who downloaded the resume and when,this study proposes a blockchain-based framework for secure storage and sharing of *** can employ an authorized access mechanism to protect their privacy *** proposed framework uses smart contracts,interplanetary file system,symmetric encryption,and digital signatures to protect,verify,and share *** keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these *** key escrow incentives are implemented using smart contracts to automatically verify the correctness of keys and encourage the active participation of honest key escrow *** framework combines blockchain and searchable symmetric encryption technology to realize multikeyword search using inverted indexing and Bloom filters and verify search results on the *** search service fees are charged through *** after the search results are verified can the search service provider obtain the search fee,thus ensuring fair and efficient search for encrypted *** framework is decentralized,secure,and tamper-evident,and achieves controlled sharing while protecting personal privacy and information security.
The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, ...
详细信息
The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism. Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.
Traditional methods for measuring and monitoring plankton populations are time consuming and can not scale to the granularity or scope necessary for large-scale *** approaches are needed. Manual analysis of the imager...
详细信息
ISBN:
(纸本)9781467391955
Traditional methods for measuring and monitoring plankton populations are time consuming and can not scale to the granularity or scope necessary for large-scale *** approaches are needed. Manual analysis of the imagery captured by underwater camera system is infeasible. Automated image classification using machine learning tools is an alternative to the manual approach. In this paper, we present a deep neural network model for plankton classification which exploits translational and rotational symmetry. In this work, we propose two constrains in the design of deep convolutional neural network structure to guarantee the performance gain when going ***, for each convolutional layer, its capacity of learning more complex patterns should be guaranteed;Secondly, the receptive field of the topmost layer should be no larger than the image region. We also developed a "inception layer" like structure to deal with multi-size imagery input with convolutional neural network. The experimental result on Plankton Set 1.0 imagery data set show the feasibility and effectiveness of the proposed method.
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour *...
详细信息
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour *** the existing influence maximization methods,the community‐based ones can achieve a good balance between effectiveness and ***,this kind of algorithm usually utilise the network community structures by viewing each node as a non‐overlapping *** fact,many nodes in social networks are overlapping ones,which play more important role in influence *** this end,an overlapping community‐based particle swarm opti-mization algorithm named OCPSO for influence maximization in social networks,which can make full use of overlapping nodes,non‐overlapping nodes,and their interactive information is ***,an overlapping community detection algorithm is used to obtain the information of overlapping community structures,based on which three novel evolutionary strategies,such as initialisation,mutation,and local search are designed in OCPSO for better finding influential *** results in terms of influence spread and running time on nine real‐world social networks demonstrate that the proposed OCPSO is competitive and promising comparing to several state‐of‐the‐arts(***,CMA‐IM,CIM,CDH‐SHRINK,CNCG,and CFIN).
In the existing cloud computing environment, batch scheduling strategies mainly focus on the management of resources allocation. This paper provides the task scheduling algorithm based on service quality which fully c...
详细信息
1 *** visual speech representations from talking face videos is an important problem for several speech-related tasks,such as lip reading,talking face generation,and audiovisual speech separation[1,2].The key difficul...
详细信息
1 *** visual speech representations from talking face videos is an important problem for several speech-related tasks,such as lip reading,talking face generation,and audiovisual speech separation[1,2].The key difficulty lies in tackling speech-irrelevant factors presented in the videos,such as lighting,resolution,viewpoints,and head motion.
暂无评论