This report presents results from the Video Person Recognition Evaluation held in conjunction with the 11th IEEE International Conference on Automatic Face and Gesture Recognition. Two experiments required algorithms ...
详细信息
This report presents results from the Video Person Recognition Evaluation held in conjunction with the 11th IEEE International Conference on Automatic Face and Gesture Recognition. Two experiments required algorithms to recognize people in videos from the Point-and-Shoot Face Recognition Challenge Problem (PaSC). The first consisted of videos from a tripod mounted high quality video camera. The second contained videos acquired from 5 different handheld video cameras. There were 1401 videos in each experiment of 265 subjects. The subjects, the scenes, and the actions carried out by the people are the same in both experiments. Five groups from around the world participated in the evaluation. The video handheld experiment was included in the International Joint Conference on Biometrics (IJCB) 2014 Handheld Video Face and Person Recognition Competition. The top verification rate from this evaluation is double that of the top performer in the IJCB competition. Analysis shows that the factor most effecting algorithm performance is the combination of location and action: where the video was acquired and what the person was doing.
Private Comparison (PC) protocol is a primitive in Secure Multiparty Computation (SMC). Though there were lots of PC protocols proposed in the past decades, most of them were inefficient and unfair because these proto...
详细信息
Locally linear embedding(LLE)algorithm has a distinct deficiency in practical *** requires users to select the neighborhood parameter,k,which denotes the number of nearest neighbors.A new adaptive method is presented ...
详细信息
Locally linear embedding(LLE)algorithm has a distinct deficiency in practical *** requires users to select the neighborhood parameter,k,which denotes the number of nearest neighbors.A new adaptive method is presented based on supervised LLE in this article.A similarity measure is formed by utilizing the Fisher projection distance,and then it is used as a threshold to select *** samples will produce different k adaptively according to the density of the data *** method is applied to classify plant *** experimental results show that the average classification rate of this new method is up to 92.4%,which is much better than the results from the traditional LLE and supervised LLE.
The problem of base station (BS) planning for TD-LTE network is studied in this paper. This method takes various factors into consideration according to the public attitude. The public attitude plays an important role...
详细信息
ISBN:
(纸本)9781479970926
The problem of base station (BS) planning for TD-LTE network is studied in this paper. This method takes various factors into consideration according to the public attitude. The public attitude plays an important role in the process of BS planning. We choose the area where the network performance is the worst to build BS, according to public attitude, Monte Carlo method and least cost path analysis. The experience results show that after building a few BS, the network performance of planning area is generally good. The method has good application value.
A fast multi-baseline Interferometric synthetic aperture radar(In SAR) phase ambiguity resolving method is presented. The ambiguity solution vector of the shortest baseline is first computed and used as a reference, a...
详细信息
ISBN:
(纸本)9781629939865
A fast multi-baseline Interferometric synthetic aperture radar(In SAR) phase ambiguity resolving method is presented. The ambiguity solution vector of the shortest baseline is first computed and used as a reference, and then the ambiguity solutions of all the other baselines are selected with logical judgment of phase difference between the measured phase and the wrapped phase, which is obtained by rewrapping the product of the referenced phase and the ratios of the other baselines to the referenced baseline. 1-dimensional searching is then executed on the same index of the reserved ambiguity solutions vectors. Furthermore, the wrong estimates affected by noise are eliminated by taking the largest frequency of the ambiguity numbers counted in a window. Compared to the conventional Chinese remainder theory(CRT), the proposed method is more robust and has much less computational complexity. The validity is investigated with simulated results.
In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, i...
详细信息
ISBN:
(纸本)9781845649302
In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, in each cluster, cluster members will form a queue and adopt a new queue-based privacy-preserving scheme to send data for aggregation upon the cluster head's request. We evaluate our scheme in terms of overheads, capacity of privacy-preservation, and data aggregation accuracy. The results show that our scheme is efficient and reasonable.
In the real word, the complex problems usually have netted structure, namely netted problems. The general methods to solve this kind of problems are based on the sequence structural description or tree structural desc...
详细信息
In this paper, a discrete time model of the mixed TCP and UDP connection with the RED is introduced. We use this one order discrete-time model to explain the instability, bifurcation and chaotic behaviors of the syste...
详细信息
Random walk on heterogeneous networks is a recently emerging approach to effective disease gene prioritization. Laplacian normalization is a technique capable of normalizing the weight of edges in a network. We use th...
详细信息
Random walk on heterogeneous networks is a recently emerging approach to effective disease gene prioritization. Laplacian normalization is a technique capable of normalizing the weight of edges in a network. We use this technique to normalize the gene matrix and the phenotype matrix before the construction of the heterogeneous network, and also use this idea to define the transition matrices of the heterogeneous network. Our method has remarkably better performance than the existing methods for recovering known gene-phenotype relationships. The Shannon information entropy of the distribution of the transition probabilities in our networks is found to be smaller than the networks constructed by the existing methods, implying that a higher number of top-ranked genes can be verified as disease genes. In fact, the most probable gene-phenotype relationships ranked within top 3 or top 5 in our gene lists can be confirmed by the OMIM database for many cases. Our algorithms have shown remarkably superior performance over the state-of-the-art algorithms for recovering gene-phenotype relationships. All Matlab codes can be available upon email request.
This paper is concerned with the problem of the full-order observer design for a class of fractional-order Lipschitz nonlinear systems. By introducing a continuous frequency distributed equivalent model and using an i...
详细信息
This paper is concerned with the problem of the full-order observer design for a class of fractional-order Lipschitz nonlinear systems. By introducing a continuous frequency distributed equivalent model and using an indirect Lyapunov approach, the sufficient condition for asymptotic stability of the full-order observer error dynamic system is presented. The stability condition is obtained in terms of LMI, which is less conservative than the existing one. A numerical example demonstrates the validity of this approach.
暂无评论