The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The performance of underwater acoustic target recognition system decreases significantly mainly due to the complex underwater acoustic conditions. Nevertheless, human auditory system is capable of segregating different targets in noisy conditions. Several auditory-based features have been applied to underwater acoustic target recognition, but only represent amplitude of the signal. However, phase...
Phishing is a security attack that involves the creation of websites that mimic legitimate websites, and these fraud websites bring Internet users a lot of loss. Traditional anti-phishing methods usually worked in a passive way by receiving report data of user. Due to the growing shorter survival time of phishing, this kind of methods is not efficient enough to find and take down new phishing attacks...
Detecting pedestrians in groups and cluttered scenes is one of the most important technology in computer vision. We observe that contour is often an important factor to distinguish pedestrian from others. The particular contour structure of pedestrian head, upper body and lower body becomes the key in pedestrian detection. Inspired by the connection of these three components of pedestrian, a pedestrian...
For aircraft complex systems such as auxiliary power unit (APU), the performance evaluation is currently restricted to observation of several typical parameters. Many other monitoring parameters recorded in Quick Access Recorder (QAR) reflect the APU condition from various aspects yet without enough attention. This study intends to propose integrated performance indicators through feature extraction...
An effective lane boundaries projective model (LBPM) and improved detection method in the images captured with a vehicle-mounted monocular camera in complex environments, especially for sharp circular curve lane, is proposed in this paper. Firstly, a lane boundaries projective model is deduced. This lane model can not only express straight-line lane boundaries, but also describe the actual sharp circular...
Due to their damage to Internet security, malware and phishing website detection has been the Internet security topics that are of great interests. Compared with malware attacks, phishing website fraud is a relatively new Internet crime. However, they share some common properties: 1) both malware samples and phishing websites are created at a rate of thousands per day driven by economic benefits;...
A robust and effective method to detect lane in the images captured with a vehicle-mounted monocular camera in challenging environments is proposed in this paper. In the newly proposed approach, the gradient direction (GD) feature and the lane boundaries projection model are used. Using GD feature and GD Gaussian distribution with the likelihood function, the lane detection is performed by employing...
This paper proposes a method of identified reciprocating motion in pornographic video from other human action using Hidden Markov Model (HMM). The motion vectors are obtained by decoding the compressed MPEG video. Then the feature vectors are extracted by calculating the direction and the magnitude of the motion vectors. The feature vectors are fed to Hidden Markov Model for training and classification...
Much of action recognition research is recently based on a bag of words (BOW) representation by quantizing the extracted 3D interest points from videos. The k-means algorithm is commonly used to construct a visual vocabulary. However, it has two major drawbacks. Firstly, the visual vocabulary is sensitive to the vocabulary size and the initialization. Secondly, k-means is unable to capture the salient...
There is a widely held belief in the NLP and computational linguistics communities that identifying and defining roles of predicate arguments in a sentence has a lot of potential for and is a significant step toward improving important applications such as document retrieval, machine translation, question answering and information extraction. In this paper, we present an semantic role labeling (SRL)...
Aimed at that there is a missing detection in the video shot segmentation because of that the global color feature can't reflect the changes in the image's substance, a new method of shot detection is proposed using global color feature combined with the characteristic of local edge. In order to determine the border of the shot segmentation, the paper eliminated the flash interference with the gray...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.