Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
Compressive tracking via appearance modeling based on structural local patch 基于结构局部斑块的外观建模压缩跟踪
Xiaoyu Hu, Hongquan Yun, Delie Ming, Tian Tian
{"title":"Compressive tracking via appearance modeling based on structural local patch","authors":"Xiaoyu Hu, Hongquan Yun, Delie Ming, Tian Tian","doi":"10.1109/SPAC.2014.6982649","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982649","url":null,"abstract":"In this paper, we propose a compressive tracking method via appearance model based on structural local patchs and improved Haar-like feature. In contrast to previous compressive tracking only considering the holistic representation, an object can be represented by local image patches with spatial layout in an object. This representation takes advantage of both partial information and spatial information of the target. Each local patch has a fixed position in the target field, and all local patches can represent the whole target. In addition, our appearance model based on features extracted from image patches, which can guarantee the randomness of the rectangular boxes and the distribution of the rectangular boxes over the entire image area, avoiding the randomness of the rectangular boxes is too strong to weak the feature expression. We sample the positive and negative samples and divide them into patchs to train a binary classification via a naive Bayes classifier with online update, then the classifier is used to discriminate the candidate samples. The candidate sample which gets the highest classify score is the target. After that we draw positive and negative samples in the same way with the candidate samples to update the classifier to get ready for next frame. Our approach helps not only locate the target more accurately but also can handle partial occlusion effectively. The proposed tracker is compared with several state-of-the-art trackers on some challenging video sequences. Our proposed tracker is better and more stable in both quantitative and qualitative comparisons.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiband CUWB system pulse design methods and performance analysis 多波段CUWB系统脉冲设计方法及性能分析
Zhao Bing, Wu Jing, Liu Jingyu, Ben Xian-ye
{"title":"Multiband CUWB system pulse design methods and performance analysis","authors":"Zhao Bing, Wu Jing, Liu Jingyu, Ben Xian-ye","doi":"10.1109/SPAC.2014.6982673","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982673","url":null,"abstract":"Cognitive ultra wideband wireless communication system as a new type of intelligent communication system will be utilized with a variety of techniques, now research focuses on the generation and detection of short RF pulses. Prolate spheroidal wave function possess many desirable properties, such as high energy concentration and inherent Orthogonal properties, which is important because the regulatory rules for CUWB pluse have not been finalized. This paper describes an optimized pluse design for very high spectrum utilization, low Interference, divides the spectrum into several sub-bands which could be canceled in the interfering bands, combines sub-band pulse phase with spectrum overlap rate to improve spectrum utilization. So as to realize revising seamless transmitted waveform to adapt with the wireless environment efficiently.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development principles of gesture interaction in smart space 智能空间中手势交互的开发原则
Yan Houyi, Ling Yunxiang, Fan Lin-jun
{"title":"Development principles of gesture interaction in smart space","authors":"Yan Houyi, Ling Yunxiang, Fan Lin-jun","doi":"10.1109/SPAC.2014.6982676","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982676","url":null,"abstract":"Human-computer interaction in intelligent space is more complex and requires higher design principles. Gesture is an important interactive modal because of its natural and nonconflicting feature. The gesture interaction patterns of various devices fall into four types, i.e. barehanded/auxiliary touch/touchless mode. Gesture interaction meeting the demand of intelligent space should satisfy several development requirements, including multi-device collaboration, user-centered interaction and task-oriented design, each of which will be elaborated on.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keyframe extraction using AdaBoost 关键帧提取使用AdaBoost
Jing Yuan, Wei Wang, Wei Yang, Maojun Zhang
{"title":"Keyframe extraction using AdaBoost","authors":"Jing Yuan, Wei Wang, Wei Yang, Maojun Zhang","doi":"10.1109/SPAC.2014.6982663","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982663","url":null,"abstract":"An approach for keyframe extraction using AdaBoost is proposed which is based on foreground detection. The aim of this approach is to extract keyframes from sequences of specific vehicle images of lane vehicle surveillance video. This method utilizes integral channel features and the area feature as the image feature descriptor, combined with training an AdaBoost classifier. The experimental results on real-road test video show that the algorithm presented in this paper effectively selects the most distinct and clearest image for a sequence of vehicle images which begins counting when a motional vehicle enters into the surveillance area and ends when it leaves. Compared with other methods, it has increased the effectiveness and precision for keyframe extraction of lane vehicle surveillance video and achieves more effective compression of video analytical data for lane vehicle surveillance.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124149990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient parallel implementation of morphological operation on GPU and FPGA 形态学运算在GPU和FPGA上的高效并行实现
Teng Li, Y. Dou, Jingfei Jiang, Jing Gao
{"title":"Efficient parallel implementation of morphological operation on GPU and FPGA","authors":"Teng Li, Y. Dou, Jingfei Jiang, Jing Gao","doi":"10.1109/SPAC.2014.6982728","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982728","url":null,"abstract":"Morphological operation constitutes one of a powerful and versatile image and video applications applied to a wide range of domains, from object recognition, to feature extraction and to moving objects detection in computer vision where real-time and high-performance are required. However, the throughput of morphological operation is constrained by the convolutional characteristic. In this paper, we analysis the parallelism of morphological operation and parallel implementations on the graphics processing unit (GPU), and field programming gate array (FPGA) are presented. For GPU platform, we propose the optimized schemes based on global memory, texture memory and shared memory, achieving the throughput of 942.63 Mbps with 3×3 structuring element. For FPGA platform, we present an optimized method based on the traditional delay-line architecture. For 3×3 structuring element, it achieves a throughput of 462.64 Mbps.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approaches to grey state modeling and modal control of complicated systems 复杂系统的灰色状态建模与模态控制方法
Weizhen Chen, Long Zhou
{"title":"Approaches to grey state modeling and modal control of complicated systems","authors":"Weizhen Chen, Long Zhou","doi":"10.1109/SPAC.2014.6982677","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982677","url":null,"abstract":"As we all known that complicated system is too difficult to be identified. A system designed here may be expected to get good control effects. Firstly, grey state modeling and modal decomposition is proposed. Secondly, an approach to modal control, which is to control the complicated system's behavior is designed. The applicable field of modal control systems is rather far and wide especially for varieties of multivariable complicated systems.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semi-fragile watermarking for image tamper localization and self-recovery 用于图像篡改定位和自恢复的半脆弱水印
Yuhang Li, Ling Du
{"title":"Semi-fragile watermarking for image tamper localization and self-recovery","authors":"Yuhang Li, Ling Du","doi":"10.1109/SPAC.2014.6982711","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982711","url":null,"abstract":"This paper proposes a semi-fragile digital watermarking scheme for image tamper localization and self-recovery. Firstly, the authentication watermark is generated for tampered area localization. After that, for content recovery, the recovery watermark is calculated from high frequency band with redundancy free. Then, for the two type of watermarks, the DWT-based watermark embedding method makes our proposed scheme tolerable against friendly manipulations. Even some parts of the watermarked image are tampered and the corresponding embedded information are missing, we can still recover the image from the untouched area based on the localization results and compressive sensing. Moreover, the encryption algorithm based on chaotic function guarantees the safety of our two type of watermarks. Extensive experiments demonstrate the effectiveness of the proposed scheme, which is sensitive against malicious tamper and robust to some incidental manipulations (e.g. JPEG compression, slight noise addition, brightness/contract adjustment and format conversion).","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127862074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An on-line signature verification based on timely nonlinear sampling and sparse representation 基于实时非线性采样和稀疏表示的在线签名验证
Zhihua Yang, Yishu Liu
{"title":"An on-line signature verification based on timely nonlinear sampling and sparse representation","authors":"Zhihua Yang, Yishu Liu","doi":"10.1109/SPAC.2014.6982705","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982705","url":null,"abstract":"A novel approach which generates so-called ”potential genuine signatures” by timely nonlinear sampling from an original on-line signature is presented. Velocity vectors of these potential genuine signatures are exploited to construct an user-dependent overcomplete dictionary. Finally, sparse coefficients which served as features are used for verification. There are two main advantages: 1) The DTW becomes unnecessary, which makes the proposed method computationally inexpensive; 2) Multiply potential genuine signatures can be generated from a genuine one, so the difficulties causing by insufficient train samples in a real system are effectively alleviated. Experiments show encouraging results.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A force fields-based multi-scale docking method in drug molecular design 基于力场的药物分子设计多尺度对接方法
L. Kang, Z. Liu, Quan Guo
{"title":"A force fields-based multi-scale docking method in drug molecular design","authors":"L. Kang, Z. Liu, Quan Guo","doi":"10.1109/SPAC.2014.6982674","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982674","url":null,"abstract":"A force fields-based multi-scale docking method is proposed in this paper. Molecular docking problem has been divided into three sub problems: rigid-rigid phase, flexible-flexible phase and flexible-rigid phase. Residue groups of protein have been adopted to describe the conformation of protein. K-mean clustering algorithm and genetic algorithm have been developed to solve the optimization problem. A new docking program, which relies on calculated non-bonded interaction terms between protein and ligand atoms based on standard force fields, has been developed. In comparison with other docking methods, the docking method has significant improvement in docking accuracy.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122921840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The roboticized technology and application in electric vehicles 电动汽车的自动化技术及应用
Yimin Zhou, Guoqing Xu
{"title":"The roboticized technology and application in electric vehicles","authors":"Yimin Zhou, Guoqing Xu","doi":"10.1109/SPAC.2014.6982730","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982730","url":null,"abstract":"In this paper, the development of the roboticized technology has been described. Since the first robot has been designed, robots have been gone through three generations from the individual robots to intelligent robots from 60's. The general structure of an intelligent robot is introduced. Potential development directions of the robotic technology is described as well. Besides, the problems encountered during the research are also discussed. Furthermore, the robotizied technology are applied in the intelligent electric vehicles to improve the driving safety in human-road-vehicle environment.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信