Machine learning techniques have facilitated image retrieval by automatically classifying and annotating images with keywords. Among them Support Vector Machines (SVMs) are used extensively due to their generalization...
详细信息
Kubernetes has become the basic platform for building cloud native applications. However, existing horizontal scaling methods based on Kubernetes have problems with resource redundancy. Furthermore, the combined horiz...
详细信息
The distributed computations are widely used in the modern world for processing large scale jobs. Hadoop framework which is based on Google MapReduce model becomes popular due to its great processing power and ease to...
详细信息
Recent advances in mobile technologies have emerged new challenges for researchers. File management and retrieval on resource-limited devices has become a challenging problem as these devices are now equipped with lar...
详细信息
This study was designed to develop solutions for facial action human computer interaction on embedded devices. This paper presents a new facial detection algorithm using dimension reduction and regionalization computi...
详细信息
ISBN:
(纸本)9781467374439
This study was designed to develop solutions for facial action human computer interaction on embedded devices. This paper presents a new facial detection algorithm using dimension reduction and regionalization computing. Then, a dynamic action judgement algorithm based on simplified Facial Expression Coding system is proposed to describe human facial action. This paper also provide the facial action capture system ***, an accuracy report is presented to validate the usefulness of system.
The original Apriori algorithm is widely used in the intrusion detection field, but it may consume incredible computing resources in the process of handling network packets. We propose our optimized-Apriori algorithm ...
详细信息
Deadlock control is an important research issue in automated manufacturing systems that have a high degree of resource sharing and concurrency. Since minimal siphons are closely tied with deadlocks in Petri net models...
详细信息
Security has become an important issue for mobile ad hoc networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, intrusion detection system ha...
详细信息
ISBN:
(纸本)0780384032
Security has become an important issue for mobile ad hoc networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, intrusion detection system has been successfully applied in wired networks. However, these correlative researches are not fit for mobile ad hoc networks. This paper puts forward a novel architecture based on mobile agent platform for superior intrusion detection in mobile ad hoc networks. Furthermore, an IDS agent selection algorithm and its security communication mechanism are proposed.
The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which preven...
详细信息
ISBN:
(纸本)9781467388511
The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which prevents it to be real-time. This paper accelerates this architecture by replacing optical flow with motion vector which can be obtained directly from compressed videos without extra calculation. However, motion vector lacks fine structures, and contains noisy and inaccurate motion patterns, leading to the evident degradation of recognition performance. Our key insight for relieving this problem is that optical flow and motion vector are inherent correlated. Transferring the knowledge learned with optical flow CNN to motion vector CNN can significantly boost the performance of the latter. Specifically, we introduce three strategies for this, initialization transfer, supervision transfer and their combination. Experimental results show that our method achieves comparable recognition performance to the state-of-the-art, while our method can process 390.7 frames per second, which is 27 times faster than the original two-stream method.
In this paper, we study the relationship between the network-based inference method and global ranking method in personal recommendation. By some theoretical analysis, we prove that the recommendation result under the...
详细信息
ISBN:
(纸本)9781467386456
In this paper, we study the relationship between the network-based inference method and global ranking method in personal recommendation. By some theoretical analysis, we prove that the recommendation result under the global ranking method is the limit of applying network-based inference method with infinite times.
暂无评论