When the high occlusion occurs in crowded scene, face detection is a better substitute for detecting pedestrian. In this paper, we present a novel crowd analysis method based on discriminative descriptor of faces and ...
详细信息
This paper will present an obstacle detection approach that relies on the three-dimensional information from stereo vision. Concerning real-time response of the system and high accuracy of the reconstructed points, in...
详细信息
Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model, a novel MAD model was developed according to the hierarchical structure. The experimental results demonstrate that the proposed algorithm provides better performance, in terms of average peak signal-to-noise ratio (PSNR) and quality smoothness, than the H.264 reference model, JM14.2, under various sequences.
Representation learning on dynamic graphs has drawn much attention due to its ability to learn hidden relationships as well as capture temporal patterns in graphs. It can be applied to represent a broad spectrum of gr...
详细信息
With the explosive growth of data information, the object-oriented storage system has been widely used. This paper proposed a metadata management strategy based on Distributed File system-Ceph in terms of event classi...
详细信息
Hadoop Distributed File system (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constra...
详细信息
In this paper, we investigate the cluster synchronization problem with unbounded time-varying delays for complex networks by adding some external controllers. Previous related works mainly focused on bounded time-vary...
详细信息
ISBN:
(纸本)9789881563910
In this paper, we investigate the cluster synchronization problem with unbounded time-varying delays for complex networks by adding some external controllers. Previous related works mainly focused on bounded time-varying or constant time delays, which may not be consistent with the real world. Therefore, unbounded time-varying delays is considered in this paper,which can be regarded as the main difference between this paper and previous related works. We discuss the necessary condition for cluster synchronization with external controllers, which can be used to guide the design of external controllers. Then, by using the Lyapunov function method, we prove that cluster synchronization could be achieved under some sufficient ***, the effects of time delays for the convergence of cluster synchronization are also discussed, which are named as theμ-cluster synchronization. Finally, numerical simulations are presented to show the validity of the obtained criteria.
暂无评论