Detection of shot transitions servers as the preliminary step to video indexing and retrieval. Locally linear embedding (LLE) algorithm fails when it is applied to video with multi-shot. In this paper, we present a ...
详细信息
ISBN:
(纸本)9781424450015
Detection of shot transitions servers as the preliminary step to video indexing and retrieval. Locally linear embedding (LLE) algorithm fails when it is applied to video with multi-shot. In this paper, we present a novel framework of shot transitions detection. The method involves two processes: First we extract the manifold feature of shot transition using LLE through addition of virtual frames on an enriched set, and then they are classified by *** show that the recognition rate of shot transition is reached over 90%.
Inspired by the growth of dendritic trees in biological neurons, we introduce spiking neural P systems with budding rules. By applying these rules in a maximally parallel way, a spiking neural P system can exponential...
详细信息
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the database. In this case, many of the popular...
详细信息
Real-world face recognition systems often have to face the single sample per person (SSPP) problem, that is, only a single training sample for each person is enrolled in the database. In this case, many of the popular face recognition methods fail to work well due to the inability to learn the discriminatory information specific to the persons to be identified. To address this problem, in this paper, we propose an Adaptive Generic Learning (AGL) method, which adapts a generic discriminant model to better distinguish the persons with single face sample. As a specific implementation of the AGL, a Coupled Linear Representation (CLR) algorithm is proposed to infer, based on the generic training set, the within-class scatter matrix and the class mean of each person given its single enrolled sample. Thus, the traditional Fisher's Linear Discriminant (FLD) can be applied to SSPP task. Experiments on the FERET and a challenging passport face database show that the proposed method can achieve better results compared with other common solutions to the SSPP problem.
In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversif...
详细信息
In this paper, a novel method for predicting RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS) is proposed. In RNATS, two search models, intensification search and diversification search, are designed to exploit the local regions around the current solution and explore the unvisited space, respectively. Simulation experiments are conducted for six RNA sequences to show that the proposed method is feasible and effective.
In this paper we review the major approaches to nonrigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more impo...
详细信息
In this paper we review the major approaches to nonrigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more importance in the literature. In this context most of the paper is devoted to present all kinds of approaches for non-rigid object reconstruction based on multiview images. A number of references are provided that describe applications of non-rigid object reconstruction based on multiview images The paper ends by addressing some important issues and open questions that can be subject of future research.
Tranditionally the medical monitoring used in hospital brought a lot inconvenience because of the complex wires between patients and equipments. In order to solve these problems, a human health wireless monitoring sys...
详细信息
This paper introduces an improved BCI system based on alpha rhythm, the main composition units of the system are electrodes, acquisition circuit, online detecting algorithm and outer devices. For improving the perform...
详细信息
In this paper, a novel algorithm for image classification is presented which uses the projective value of adjacency spectrum as classified samples. Firstly, the eigenvalues of adjacency matrices constructed on the fea...
详细信息
In this paper, a novel algorithm for image classification is presented which uses the projective value of adjacency spectrum as classified samples. Firstly, the eigenvalues of adjacency matrices constructed on the feature point-sets of images are obtained by singular value decomposition. Secondly, the eigenvalues are projected onto the eigenspace by means of the covariance matrix. Finally, image classification is performed by adopting RBF and PNN neural networks as classifiers respectively. Meanwhile, some theoretical analyses are given to support the proposed method.
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t...
详细信息
ISBN:
(纸本)9781424471645;9781424471638
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In the proposed method, each individual component of the protection system in the simulated plane is modeled. Then, the threat report of each component according to the specific tactics is determined based on its real environment. Finally, the comprehensive threat distribution is obtained based on through the D-S evidence theory to combine multi-sources information. The proposed method can easily applied to the evaluation of the effectiveness of the protection system. We make the total threat of the protection system lowest through changes of the protection resources allocation. A numerical example is used to illustrate the efficiency of the proposed method.
Rough sets,proposed by Pawlak and rough fuzzy sets proposed by Dubois and Prade were expressed with the different computing formulas that were more complex and not conducive to computer operations,In this paper,we use...
详细信息
Rough sets,proposed by Pawlak and rough fuzzy sets proposed by Dubois and Prade were expressed with the different computing formulas that were more complex and not conducive to computer operations,In this paper,we use the composition of a fuzzy matrix and fuzzy vectors in a given non-empty finite universal,constitute an algebraic system composed of finite dimensional fuzzy vectors and discuss some properties of the algebraic system about a basis and *** give an effective calculation representation of rough fuzzy sets by the inner and outer products that unify computing of rough sets and rough fuzzy sets with a *** basis of the algebraic system play a key role in this *** give some essential properties of the lower and upper approximation operators generated by reflexive,symmetric,and transitive fuzzy *** reflexive,symmetric,and transitive fuzzy relations are charac terized by the basis of the algebraic system.A set of axioms,as the axiomatic approach,has been constructed to characterize the upper approximation of fuzzy sets on the basis of the algebraic system.
暂无评论