Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
A scale invariant keypoints detector 尺度不变关键点检测器
Tao Zhou
{"title":"A scale invariant keypoints detector","authors":"Tao Zhou","doi":"10.1109/SPAC.2014.6982695","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982695","url":null,"abstract":"We propose a novel approach for detecting keypoints invariant to scale changes based on M-wavelet theory. The theory description and detecting process of our approach are presented The comparative evaluation of different detectors shows our approach can provides a competent performance in rotation invariant, scale invariant, illumination invariant and noiseproof. In terms of scale changes, our proposed approach improves keypoint repeatability by 2%~10% compared with scale invariant feature transform (SIFT), speeded up robust features (SURF), Harris-Laplace, Hessian-Laplace.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid improved gravitional search algorithm and kernel based extreme learning machine method for classification problems 混合改进重力搜索算法和基于核的极值学习机分类问题方法
Chao Ma, Jihong Ouyang, J. Guan
{"title":"Hybrid improved gravitional search algorithm and kernel based extreme learning machine method for classification problems","authors":"Chao Ma, Jihong Ouyang, J. Guan","doi":"10.1109/SPAC.2014.6982703","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982703","url":null,"abstract":"In this paper, we hybridize the improved gravitational search algorithm (IGSA) with kernel based extreme learning machine (KELM) method. Based on this, a novel hybrid system IGSA-KELM is proposed to improve the generalization performance for classification problems. In this system, IGSA is designed by combining the search strategy of particle swarm optimization and GSA to effectively reduce the problem of slow convergence rate, moreover, the continuous-value IGSA and binary IGSA are integrated in one algorithm in order to optimize the KELM parameters and feature subset selection simultaneously. This proposed hybrid algorithm is evaluated on several well-known UCI machine learning datasets. The results indicate that the superiority of the proposed model in terms of classification accuracy. Our hybrid method not only can select the most relevant feature subset, but also achieves a high classification accuracy over other similar state-of-the-art classifier systems.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of an Internet Public Opinion Monitoring System 网络舆情监测系统的设计与实现
Wen Liu, Zhijun Song
{"title":"Design and implementation of an Internet Public Opinion Monitoring System","authors":"Wen Liu, Zhijun Song","doi":"10.1109/SPAC.2014.6982668","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982668","url":null,"abstract":"In this paper, an Internet Public Opinion Monitoring System based on Administration for Industry and Commerce is proposed. The paper first analyzes the design of the system. Then describes the system in detail as five modules, they are Internet Collection Module, Data Preprocessing Module, Public Opinion Analysis Module, Service Module and System Management Module.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical analysis based fast intra prediction algorithm in HEVC 基于数值分析的HEVC快速帧内预测算法
Yubei Lin, Qinyi Chen, Xingming Zhang
{"title":"Numerical analysis based fast intra prediction algorithm in HEVC","authors":"Yubei Lin, Qinyi Chen, Xingming Zhang","doi":"10.1109/SPAC.2014.6982719","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982719","url":null,"abstract":"The latest video coding standard HEVC (High Efficiency Video Coding) provides up to 35 intra prediction modes to achieve more accurate prediction. However, a larger number of prediction modes leads to higher encoding complexity. To accelerate the intra mode decision in HEVC, an improved algorithm based on numerical analysis of the neighboring reference samples of coding units is proposed. Four filters are designed to reduce the candidate modes. And an algorithm to seek the proper thresholds for the filters is developed. The experimental results show that when compared to the test model HM 12.0 of HEVC, the proposed method can save up to 28.40% of encoder time with slight increase of BD-rate and negligible loss of PSNR. Furthermore, it is easy to combine our approach with other fast algorithms to achieve more improvement.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating joint and surface for human action recognition in indoor environments 结合关节和表面进行室内环境人体动作识别
Qingyang Li, Yu Zhou, Anlong Ming
{"title":"Integrating joint and surface for human action recognition in indoor environments","authors":"Qingyang Li, Yu Zhou, Anlong Ming","doi":"10.1109/SPAC.2014.6982665","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982665","url":null,"abstract":"Action recognition has a long research history, despite several contributed approaches have been introduced, it remains a challenging task in computer vision. In this paper, we present a uniform fusion framework for action recognition, which integrates not only the local depth cues but also the global depth cues. Firstly, the action recognition task is formulated as the maximize the posterior probability, and then the observation for the original action is decomposed into the sub-observations for each individual feature representation strategy of the original action. For the local depth cues, the joints inside the human skeleton is employed to model the local variation of the human motion. In addition, the normal of the depth surface is utilized as the global cue to capture the holistic structure of the human motion. Rather than using the original feature directly, the support vector machine model learning both the discriminative local cue (i.e., the joint) and the discriminative global cue (i.e., the depth surface), respectively. The presented approach is validated on the famous MSR Daily Activity 3D Dataset. And the experimental results demonstrate that our fusion approach can outperform the baseline approaches.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information query for public bicycle service based on Andriod 基于android的公共自行车服务信息查询
Guihua Liao, Jian Zhang
{"title":"Information query for public bicycle service based on Andriod","authors":"Guihua Liao, Jian Zhang","doi":"10.1109/SPAC.2014.6982671","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982671","url":null,"abstract":"This paper presents an information query system for renting and returning public bicycles based on Android system. The system provides two parts of services: position locating and station query. Position locating is tackled by baidu API entirely, station query includes two sub parts: station marking and information updating. We use the latitude and longitude of the station to mark the station on the map, and query the station around current location. We use the station ID as the open API's parameter to query the station information, then analyze the returned JSON data with station information, and extract the remaining bicycles for renting and remaining seats for returning from the JSON data. At last, we update the station information on the map. This system aims to propose an integrated solution for public bicycle service. Experiments in 3 test cases demonstrate the effect of the proposed system, and indicate that the system can fully meet the requirement for public bicycle service.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new attempt of white-box AES implementation 白盒AES实现的新尝试
R. Luo, Xuejia Lai, R. You
{"title":"A new attempt of white-box AES implementation","authors":"R. Luo, Xuejia Lai, R. You","doi":"10.1109/SPAC.2014.6982727","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982727","url":null,"abstract":"In this paper, we propose an improved table-based white-box implementation of AES which is able to resist different types of attack, including the BGE attack and De Mulder et al.'s cryptanalysis, to protect information under “white-box attack context”. The notion of white-box attack context, introduced by Chow et al., describes a general setting in which cryptographic algorithms are executed in untrusted environments. In this setting, adversaries have attained complete access to the implementations of cryptographic algorithms as well as the dynamic execution environments. The key strategy applied to our design is to compose different operations of the AES round function and convert the composition into encoded lookup tables. The new scheme exploits larger key-dependent tables, each of which contains two bytes of the round keys. We then analyze the security against different types of attack and measure two security metrics: the “white-box diversity” and “ambiguity”. The new scheme can withstand the BGE attack due to the utilization of larger mixing bijections and tabulated “ShiftRows” it can also resist the cryptanalysis of De Mulder et al. since the bindings between “nTMC” and “TSR” are irreducible and the non-linear encodings are introduced to all tables.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An instance selection and optimization method for multiple instance learning 一种多实例学习的实例选择与优化方法
Haifeng Zhao, Wenbo Mao, Jiang-tao Wang
{"title":"An instance selection and optimization method for multiple instance learning","authors":"Haifeng Zhao, Wenbo Mao, Jiang-tao Wang","doi":"10.1109/SPAC.2014.6982686","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982686","url":null,"abstract":"Multiple Instance Learning (MIL) has been an interesting topic in the machine learning community. Since proposed, it has been widely used in content-based image retrieval and classification. In the MIL setting, the samples are bags, which are made of instances. In positive bags, at least one instance is positive. Whereas negative bags have all negative instances. This makes it different from the supervised learning. In this paper, we propose an instance selection and optimization method by selecting the most/least positive/negative instances to form a new training set, and learning the optimal distance metric between instances. We evaluate the proposed method on two benchmark datasets, by comparing with representative MIL algorithms. The experimental results suggest the effectiveness of our algorithm.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A general solution for multi-thread based multi-source compressed video surveillance system 基于多线程的多源压缩视频监控系统的通用解决方案
Lu Han, Yixiao Zhao, Shujian Yu, Baojun Zhao, Jiatong Li, Jinghui Wu
{"title":"A general solution for multi-thread based multi-source compressed video surveillance system","authors":"Lu Han, Yixiao Zhao, Shujian Yu, Baojun Zhao, Jiatong Li, Jinghui Wu","doi":"10.1109/SPAC.2014.6982664","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982664","url":null,"abstract":"This paper proposes a general solution for the multi-source high resolution real-time monitoring system. Our proposed system is realized on a PCI bus-based real-time image processing board, based on H.264 video compression standards. The main function of the system includes video decompression, image scaling, image stitching, as well as multi-mode real-time display in PC software. Unlike traditional multi-board based multi-source surveillance system, our solution focuses on single board system with synchronously processing and independently display of multi-source video, which is more resource-saving The main contributions of this paper are twofold: firstly, we propose a new logical control method of multi-thread to overcome the limitation of single-board bandwidth, and secondly we give a DirectDraw based display solution to avoid screen flicker caused by different frame rates of multi-source. In addition, we elaborate an approach on multi-thread control and synchronization to reduce CPU utility and monitor abnormal system condition.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic-based intelligent data clean framework for big data 基于语义的大数据智能数据清理框架
Jia Wang, Zhijun Song, Qian Li, Jun Yu, Fei Chen
{"title":"Semantic-based intelligent data clean framework for big data","authors":"Jia Wang, Zhijun Song, Qian Li, Jun Yu, Fei Chen","doi":"10.1109/SPAC.2014.6982731","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982731","url":null,"abstract":"In order to overcome the limitation of existing data cleansing methods working on massive data, in this paper, we propose a generic semantic-based framework using parallelized processing model for effective big data cleansing. We also use an improved Semantic-Based Keyword Matching Algorithm to deal with duplicate data. Experimental results show that this parallelized framework with improved Semantic-Based Keyword Matching Algorithm can identify duplicates with high recall and precision and have a good performance for big data cleansing.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信