International Conference on Artificial Intelligence and Pattern Recognition最新文献

筛选
英文 中文
MirrorTrack MirrorTrack
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1109/AIPR.2008.4906442
Pak-Kiu Chung, Bing Fang, R. Ehrich, Francis K. H. Quek
{"title":"MirrorTrack","authors":"Pak-Kiu Chung, Bing Fang, R. Ehrich, Francis K. H. Quek","doi":"10.1109/AIPR.2008.4906442","DOIUrl":"https://doi.org/10.1109/AIPR.2008.4906442","url":null,"abstract":"This paper presents a real-time multiple camera approach for multi-touch interaction system that takes advantage of specular display surface (such as conventional LCD displays) and the mirror-effect in a low-azimuth camera angle to detect and track fingers their reflections simultaneously. Building on our prior work, 1. We use multi-resolution processing to greatly improve runtime performance of the system; 2. We employ different edge detection and pattern recognition algorithms for different processing resolution to help detect fingers more accurately and efficiently; 3. We track both the location of a fingertip and its pointing direction so it can be identified more effectively; 4. We use a full stereo algorithm to compute finger locations in the 3D space more accurately. Our system has many advantages. 1. It works with any glossy flat panel display; 2. It avoids clumsy set-up time of a top-down camera with the concomitant screen glare problems; 3. It supports both touch and hover operation; 4. It can work with large vertical display without the usual occlusion problems. We describe our approach and implementation in details.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Improved Multi-Sensor Data Fusion Algorithm Based on D-S Evidence Theory 基于D-S证据理论的改进多传感器数据融合算法研究
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3488933.3488995
Junsuo Qu, Xing Cai, Haonan Shi
{"title":"Research on Improved Multi-Sensor Data Fusion Algorithm Based on D-S Evidence Theory","authors":"Junsuo Qu, Xing Cai, Haonan Shi","doi":"10.1145/3488933.3488995","DOIUrl":"https://doi.org/10.1145/3488933.3488995","url":null,"abstract":"The data fusion of multi-sensor enhances the intrinsic relationship of data between sensors, reduces the workload of information processing, and will not miss the important information features. This paper points out the main problems in the application of D-S evidence theory, analyzes and compares the existing improved methods. When the evidence conflict is large, the traditional D-S evidence theory synthesis formula is inconsistent with the actual situation and the result is invalid. The priority factor is introduced to reallocate the basic probability assignment of the evidence conflict part. And the method is used for map construction simulation. From the constructed ring map, it can be seen that the obstacle points of each decision are very close to the obstacle points in the simulation. The reliability and accuracy of the method of introducing priority factor in drawing construction are explained.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Digital Watermarking Algorithm Based on DCT-SVD and QR Code 基于DCT-SVD和QR码的鲁棒数字水印算法
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3430199.3430244
Xiaolei Zhao, Guangqin Wang, Xibin Xu
{"title":"Robust Digital Watermarking Algorithm Based on DCT-SVD and QR Code","authors":"Xiaolei Zhao, Guangqin Wang, Xibin Xu","doi":"10.1145/3430199.3430244","DOIUrl":"https://doi.org/10.1145/3430199.3430244","url":null,"abstract":"Digital watermarking technology is an important technology for copyright protection. In practical applications, the robustness of digital watermarking technology is more demanding. In order to resist attacks and improve invisibility, a new data watermarking scheme is proposed. First, watermark local feature regions will be determined by an improved method which contains two steps: texture complexity roughly location and SIFT precisely location. Second, DCT transformation on these regions is applicated and a set of low frequency coefficients of chosen regions are selected to construct a DCT coefficient matrix. Last, SVD decomposition is performed on DCT coefficient matrix and a QR code carrying watermark information is embedded by the additive rule. The watermark detection algorithm is the reverse process of embedding. The experimental results show that the algorithm has good robustness to common attacks.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127698213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning Resource Recommendation Method Based on Knowledge Graph and Neural Network 基于知识图和神经网络的学习资源推荐方法
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3488933.3488965
Chenyu Shi, Jinbao Teng, F. Guo, Wenwen Fu
{"title":"Learning Resource Recommendation Method Based on Knowledge Graph and Neural Network","authors":"Chenyu Shi, Jinbao Teng, F. Guo, Wenwen Fu","doi":"10.1145/3488933.3488965","DOIUrl":"https://doi.org/10.1145/3488933.3488965","url":null,"abstract":"In view of the traditional learning resource recommendation technology for different learners' learning style, knowledge level, learning mode and other characteristics of the difference, lack of personalized consideration, this paper proposes a individualization online learning resource recommendation method based on knowledge graph. Firstly, according to the knowledge structure and ability of students, the cognitive model of students is established, and the knowledge graph is used to describe the sequence relationship between knowledge points and learning resources; secondly, the word embedding technology is used to vectorize the information of learners' characteristics and learning behavior, and the learner characteristics are integrated and embedded into the recommendation model; finally, the bidirectional long short-term memory network is used Memory and attention mechanism are used for feature extraction to mine learners' implicit feedback information, so as to achieve the purpose of personalized recommendation for learners. The experimental results show that the proposed model is better than the traditional recommendation algorithm, and greatly improves the personalized learning efficiency of learners.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rapid Pose Estimation of Mongolian Faces using Projective Geometry 基于投影几何的蒙古族人脸姿态快速估计
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1109/AIPR.2004.37
Huaming Li, Mingquan Zhou, Guohua Geng
{"title":"Rapid Pose Estimation of Mongolian Faces using Projective Geometry","authors":"Huaming Li, Mingquan Zhou, Guohua Geng","doi":"10.1109/AIPR.2004.37","DOIUrl":"https://doi.org/10.1109/AIPR.2004.37","url":null,"abstract":"We present a new method to estimate the pose of human head from a monocular image in this paper. The method only uses a face model that formed by five points (four eye-corners and subnasale) in human face, does not need any auxiliary equipment. The estimation involves the research result of the anthropometry in the Mongolian race's feature we had obtained, and employs the theory of the projective geometry. We divide the pose computation into separate estimation of the orientation about X, Y and Z-axis, respectively. For the automatic detection of these points, active appearance models (AAM) are utilized in our experiment. It had been shown that the results of experiment -were very close with actual rotational angles of human face. Especially when facial rotation in a naturally small angle, less than 30/spl deg/, we can obtain the approximate accurate value of rotational angles by using this method.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Spectrum Management Schemes Based on Consortium Blockchain 基于联盟区块链的频谱管理方案研究
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3488933.3489005
Taotao Wang, Jianhua Liu
{"title":"A Study of Spectrum Management Schemes Based on Consortium Blockchain","authors":"Taotao Wang, Jianhua Liu","doi":"10.1145/3488933.3489005","DOIUrl":"https://doi.org/10.1145/3488933.3489005","url":null,"abstract":"In the face of the rapidly growing number of users and the demand for real-time access in the 6G era, the central allocation method in traditional spectrum management will encounter processing bottlenecks, and this paper proposes a distributed spectrum management scheme based on the federated chain. Firstly, a distributed spectrum management architecture is established and distributed ledger storage technology is adopted to ensure the integrity and security of user transaction data; secondly, different nodes are described and the specific transaction process is analyzed in this management scheme; the security of the whole management scheme can be guaranteed by the characteristics and mechanism of blockchain itself; finally, the main reasons affecting user transaction time and the relationship between block generation time and transaction time are analyzed through simulation experiments. Finally, the main reasons affecting the user transaction time as well as the block generation time are analyzed through simulation experiments.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122387131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Traffic Sign Detection Algorithm Based on YOLO 基于YOLO的交通标志检测算法研究
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3488933.3488955
Min Feng, Wen-Quing Ma, Zemin Hou
{"title":"Research on Traffic Sign Detection Algorithm Based on YOLO","authors":"Min Feng, Wen-Quing Ma, Zemin Hou","doi":"10.1145/3488933.3488955","DOIUrl":"https://doi.org/10.1145/3488933.3488955","url":null,"abstract":"In view of the large amount of network parameters and calculations of the current two-stage target detection algorithm, and the low recognition accuracy of the single-stage target detection algorithm, an improved traffic sign detection algorithm based on yolov4-tiny is proposed.The algorithm uses the SSD structure idea to divide the ordinary convolution into two steps, which not only reduces the computing resources and the number of parameters, but also adds a new feature extraction structure to obtain more target features.Then, bottom-up multi-scale fusion is used, combined with low-level information to enrich the feature level of the network to improve feature utilization.Finally, CIoU is used as the bounding box regression loss function to speed up model convergence and improve the accuracy of traffic sign detection.The experimental results on the CCTSDB data set show that, compared with the original YOLOv4-tiny, the mAP is increased by about 12%, and the recognition speed is 10 ms. It indicates that the method proposed in this paper has a faster speed and higher accuracy.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Graph Embedding Method Based on Opinion Dynamics 一种基于意见动态的图嵌入方法
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3488933.3488975
Jinwei Du, Zhan Bu, Tao Yi
{"title":"A Graph Embedding Method Based on Opinion Dynamics","authors":"Jinwei Du, Zhan Bu, Tao Yi","doi":"10.1145/3488933.3488975","DOIUrl":"https://doi.org/10.1145/3488933.3488975","url":null,"abstract":"∗Graph (a.k.a. network), as an important form of data representation, exists widely in real scenes. Effective graph analysis helps users to understand the information hidden behind the data, which will benefit the following tasks (such as node classification, link prediction). Graph embedding is a very effective method to solve the problem of graph analysis. It maps the graph data into the low-dimensional space, and retains the structure and attribute information of the graph to the maximum extent. Graph embedding has become a hot topic in recent years.We propose a neural network graph embeddingmethod based onOpinionDynamics, called Graph Opinion Dynamics Networks (GODNs), which is a neural network architecture that adopts a new information aggregation strategy to process structured data, leveraging attentional mechanism and trusted neighours convergence to address the shortcomings of prior methods based on graph convolutions. Node embeddings are updated through multiple rounds of aggregation of trusted neighbors with different weights, and the rules are set to achieve convergence state. For transductive semi-supervised learning problems, we divide the datasets into sparse networks and dense networks. Our GODNs models have matched the results across the sparse networks (the Cora, Citeseer and Pubmed citation network datasets) and achieved a great improvement over dense networks (amazonphoto, amazon-computer and coauthor-cs electronic commerce datasets).","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Unbalanced Data Processing Algorithm Base Tomeklinks-Smote 基于tomeklinksmote的不平衡数据处理算法研究
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3430199.3430222
Ai-hua Li, Peng Zhang
{"title":"Research on Unbalanced Data Processing Algorithm Base Tomeklinks-Smote","authors":"Ai-hua Li, Peng Zhang","doi":"10.1145/3430199.3430222","DOIUrl":"https://doi.org/10.1145/3430199.3430222","url":null,"abstract":"Traditional machine learning algorithms tend to bias \"majority\" for classification of unbalanced data, which makes the classification accuracy of less-class samples lower. In order to improve the classification accuracy of less-class samples in the data set, this paper proposes a method based on imbalance TLS algorithm for data processing. This method first deletes duplicate samples in the original data set, and then deletes the boundary samples and noise samples that are Tomek links pairs' in the majority class and the minority class in the data set through the Tomek links undersampling algorithm and then oversampling the minority class samples with the smoth algorithm. After the obtained large-class sample and the obtained small-class sample are approximately balanced. On several commonly used data sets in the UCI database, compare with the original data set, the tradition al SMOTE oversampling only for small samples, and the traditional Tomek link under- sampling method for large samples only, Use SVM, logistic regression, Multilayer Perceptron (Neural Network) and random forest for classification. The experiment proves that the sampling method adopted in this paper can indeed improve the recognition of small class samples.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Dynamic Gesture Recognition Method Based on Encoded Video 基于编码视频的动态手势识别方法
International Conference on Artificial Intelligence and Pattern Recognition Pub Date : 1900-01-01 DOI: 10.1145/3573942.3574084
Xi-Jiong Xie, Panyu Cao, Zhaozhe Zhang
{"title":"A Dynamic Gesture Recognition Method Based on Encoded Video","authors":"Xi-Jiong Xie, Panyu Cao, Zhaozhe Zhang","doi":"10.1145/3573942.3574084","DOIUrl":"https://doi.org/10.1145/3573942.3574084","url":null,"abstract":"Most of the video-based dynamic gesture recognition methods require decoding video into raw RGB images. The approved accuracy relies on multiple data patterns, such as depth map or optical flow, in specific scenario. So, the more complexity models, the huger calculation power and storage consumption. In this paper, a new characterized model for spatiotemporal data is proposed to represent the spatiotemporal features of dynamic gestures, take advantage of Intra-frames (I-frame), motion vectors, and residuals in encoded videos, so that the additional consumption of computation and storage caused by decoding videos are escaped. Furthermore, a key predicted frames (P-frame) selection (KPFS) module is proposed to filter those P-frames having no useful information, based on an image entropy estimated with the residuals. The more distinguished features are obtained. Comprehensively experiments are performed on two benchmark datasets, VIVA and SKIG. The results show that our method can achieve an average accuracy of 81.13% and 98.70% using lone RGB data, reduce the storage overhead by 88.5%. The result is similar to that of the state-of-the-art methods with the running speed of more than 4.3 times.","PeriodicalId":361892,"journal":{"name":"International Conference on Artificial Intelligence and Pattern Recognition","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125017097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信