Background modeling is a fundamental yet challenging issue in video surveillance. Traditional methods usually adopt single feature type to solve the problem, while the performance is usually unsatisfactory when handli...
详细信息
ISBN:
(纸本)9781457701221
Background modeling is a fundamental yet challenging issue in video surveillance. Traditional methods usually adopt single feature type to solve the problem, while the performance is usually unsatisfactory when handling complex scenes. In this paper, we propose a multi-scale framework, which combines both texture and intensity feature, to achieve a robust and accurate solution. Our contributions are three folds: first, we provide a multi-scale analysis for the issue;second, for texture feature we propose a novel texture operator named Scale-invariant Centersymmetric Local Ternary Pattern, and a corresponding Pattern Adaptive Kernel Density Estimation technique for its probability estimation;third, we design a Simplified Gaussian Mixture Models for intensity feature. Our method is tested on several complex real world videos with illumination variation, soft shadows and dynamic backgrounds. The experimental results clearly demonstrate that our method is superior to the previous methods.
Image-To-Class distance is first proposed in Naive- Bayes Nearest-Neighbor. NBNN is a feature-based image classifier, and can achieve impressive classification accuracy. However, the performance of NBNN relies heavily...
详细信息
ISBN:
(纸本)9781457701221
Image-To-Class distance is first proposed in Naive- Bayes Nearest-Neighbor. NBNN is a feature-based image classifier, and can achieve impressive classification accuracy. However, the performance of NBNN relies heavily on the large number of training samples. If using small number of training samples, the performance will degrade. The goal of this paper is to address this issue. The main contribution of this paper is that we propose a robust Image-to-Class distance by local learning. We define the patch-to-class distance as the distance between the input patch to its nearest neighbor in one class, which is reconstructed in the local manifold space;and then our image-toclass distance is the sum of patch-to-class distance. Furthermore, we take advantage of large-margin metric learning framework to obtain a proper Mahalanobis metric for each class. We evaluate the proposed method on four benchmark datasets: Caltech, Corel, Scene13, and Graz. The results show that our defined Image-To-Class Distance is more robust than NBNN and Optimal-NBNN, and by combining with the learned metric for each class, our method can achieve significant improvement over previous reported results on these datasets.
Recently, Independent Component Analysis based foreground detection has been proposed for indoor surveillance applications where the foreground tends to move slowly or remain still. Yet such a method often causes disc...
详细信息
ISBN:
(纸本)9781457701221
Recently, Independent Component Analysis based foreground detection has been proposed for indoor surveillance applications where the foreground tends to move slowly or remain still. Yet such a method often causes discrete segmented foreground objects. In this paper, we propose a novel foreground detection method named Contextual Constrained Independent Component Analysis (CCICA) to tackle this problem. In our method, the contextual constraints are explicitly added to the optimization objective function, which indicate the similarity relationship among neighboring pixels. In this way, the obtained de-mixing matrix can produce the complete foreground compared with the previous ICA model. In addition, our method performs robust to the indoor illumination changes and features a high processing speed. Two sets of image sequences involving room lights switching on/of and door opening/closing are tested. The experimental results clearly demonstrate an improvement over the basic ICA model and the image difference method.
In this work, we took the analysis of neural interactions change in M1 of a monkey during the adaptation process for it to complete reach-to-grasp tasks with external perturbation across days. BN model was applied to ...
详细信息
Wireless sensor networks consist of a large number of sensor nodes that have low power and limited transmission range and can be used in various scenario. The nodes can be deployed in the long and narrow region, such ...
详细信息
Generalized second-price (GSP) is currently the dominant auction mechanism used in the sponsored search advertising market. However, despite its tremendous commercial success and theoretical optimality, its effectiven...
详细信息
Generalized second-price (GSP) is currently the dominant auction mechanism used in the sponsored search advertising market. However, despite its tremendous commercial success and theoretical optimality, its effectiveness is jeopardized by the severe click frauds conducted by advertisers and third-party publishers and the vicious bidding strategy used by advertisers to exhaust the budget of rivals. In this paper, we analyze the drawbacks of GSP that tolerate or even encourage such negative behaviors (i.e., click fraud and vicious bidding) and propose a dynamic modification of the original GSP mechanism to address these drawbacks. Our modified auction mechanism incorporates budget into slot allocation and payment determination and relates the quality score of an advertisement to the current bid. Our analysis shows that our mechanism can effectively reduce the effects of click fraud and vicious bidding.
A robotic dolphin with a pair of 3-DOF flippers, two turning units and a multi-link oscillatory propulsion mechanism is designed. The mechanical, hardware and software designs of the robotic dolphin are given. The fli...
详细信息
This paper proposes a reinforcement learning based tag recommendation algorithm to deal with the data sparseness that affects the performance stability of collaborative filtering algorithms. Our algorithm integrates u...
详细信息
In terms of the difficulty of vehicle tracking in complex environment of the visual surveillance system, an object tracking algorithm is proposed for the applications in practical visual surveillance systems for intel...
详细信息
In terms of the difficulty of vehicle tracking in complex environment of the visual surveillance system, an object tracking algorithm is proposed for the applications in practical visual surveillance systems for intelligent traffic. A block-based Gaussian mixture background modeling method for object detection is presented to reduce the computational complexity of moving vehicle object abstraction. An adaptive tracking algorithm fused with color features and texture features is described to better adapt the traffic scene variation. The experimental results show that the proposed algorithm can effectively deal with the complex urban traffic conditions and the tracking performance is better than the conventional particle filter method and single feature based non-adaptive object tracking method.
Serving as the major source of news for internet users, online news portals usually do not generate most of their online content by themselves. Instead, they reprint news from other sources for various reasons. The pa...
Serving as the major source of news for internet users, online news portals usually do not generate most of their online content by themselves. Instead, they reprint news from other sources for various reasons. The paper demonstrates for the first time the topological features of online news reprinting network, providing first-hand empirical evidence to decision-makers in various domains who are interested in event identification, crisis management, branding, and interaction with society. Main findings include that the news reprinting network in China is a scale-free social network with a core-periphery structure. In this network information spreads out widely and quickly. The reprinting network has two types of important nodes, those serving as the source of original news to the network and those where the public goes for news. More importantly, those hubs have dense links among them, forming a core in the network, while nodes in the periphery have sparse links among them and they mainly connect to each other through the core. Practical implications of the findings were also discussed in the paper.
暂无评论