The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Effective image and sentence matching depends on how to well measure their global visual-semantic similarity. Based on the observation that such a global similarity arises from a complex aggregation of multiple local similarities between pairwise instances of image (objects) and sentence (words), we propose a selective multimodal Long Short-Term Memory network (sm-LSTM) for instance-aware image and...
Leading methods for object detection and recognition using neural networks improve markedly when given very large training sets. In the case of infrequent objects, such as traffic signs, hand labeling many hours of road scene video becomes impractical. In this paper, we propose an iterative Search & Learn method capable of quickly creating object detection datasets numbering in the 10's of thousands...
In this paper, we propose an analog phase shifter aided spatial modulation scheme. The proposed scheme is able to send more spatial symbols than conventional spatial modulation (SM), while reserving the low complexity of single RF-chain MIMO structure. The main idea is to transmit Nt different phase-shifted copies of the digitally modulated signal through Nt antennas. In each time slot, the transmitted...
In this paper, our goal is to speed up a standard sliding window detector while maintaining detection accuracies. We do this by decomposing its weight template into multiple component detectors with no redundancy. Each component detector captures partial discriminative appearance, and they can be used in a cascade detection pipeline to aggressively reduce the size of search space. We formulate the...
This paper proposes a practical static analysis tool named LUKE, for detecting null pointer dereferences (NPD) in C programs. LUKE first uses a guarded value-dependence graph (VDG) to track the dependence relations of values, and then detects NPD by solving the graph reachability problem on its VDG. To improve accuracy as well as scalability, the detection algorithm leverages heuristic inference algorithms...
Traditional hyperspectral anomaly detection methods either model the global background or the local neighborhood, that bring some apparent drawbacks, such as the unreasonable assumption of uni-modular background in global detectors, or the high false alarms by sliding windows in local detectors. In this paper, a source component-based anomaly detection approach is proposed. It first extracts the source...
Lattice reduction (LR) aided detectors mitigate the exponentially increasing complexity of large multiple-input, multiple-output (MIMO) systems while achieving near-optimal performance with low computational complexity. In this paper, a channel-adaptive complex-domain LR-aided K-best MIMO detector is presented that reduces the gap between the K-best sphere decoding (SD) detector and the maximum likelihood...
This paper proposes a novel distributed multiple-input and multiple-output (MIMO) phased radar with orthogonal frequency-division multiplexing (OFDM) waveform, i.e., OFDM-MIMO phased radar system, to improve the detection performance of high speed moving target with radar cross-section (RCS) fluctuation. The parallel incoherent processing of the spatial diversity multi-channel echoes data in a short...
Developers know that copy-pasting code (aka code cloning) is often a convenient shortcut to achieving a design goal, albeit one that carries risks to the code quality over time. However, deciding which, if any, clones should be eliminated within an existing system is a daunting task. Fixing a clone usually means performing an invasive refactoring, and not all clones may be worth the effort, cost,...
This paper presents an ultra-wideband and ultra-low-voltage compact power detector IC for microwave and millimeter-wave applications. The power detector circuit includes an nMOSFET differential pair with resistive feedback and a pMOSFET buffer. The power detector IC was designed, fabricated and fully evaluated using Fujitsu 65-nm CMOS technology. The detector IC exhibits an operation frequency from...
Metal-insulator-metal (MIM) circular grating structure has been introduced to couple with superconducting nanowire single-photon detector (SNSPD) to enhance its response. According to our numerical simulation results, the coupling efficiency at 1.55μm can be enhanced by MIM circular grating and improving the response of SNSPD obviously. About 19.5 times of enhancement in response can be obtained with...
Dense sample video patches have been used for video representation in action recognition and achieve better performance than sparse spatiotemporal local features. However, two problems of this method must be considered. First one, many video patches are from background other than human body. Second one, the descriptor is not reliable, since it is neither shift nor scale invariant. To solve these two...
sophisticated automatic incident detection (AID) technology plays a key role in contemporary transportation systems. Though many papers were devoted to study incident classification algorithms, few study investigated how to enhance feature representation of incidents to improve AID performance. In this paper, we propose to use an unsupervised feature learning algorithm to generate higher level features...
To date, most research on software code cloning has concentrated on detection and analysis techniques and their evaluation, and most empirical studies of cloning have investigated cloning within single system versions. In this paper, we present the results of a longitudinal study of cloning among the SCSI drivers for the Linux operating system that spans 16 years of evolution. We have chosen the SCSI...
The basic theory and the working principle on quantum secret communication are introduced in this paper, the realization process of protocols of quantum key distribution are analyzed, the key technology of quantum secret communication is discussed. In the resent year, relative experiment and research progress on quantum secret communication are summarized at home and abroad. Finally, the application...
An edge detection approach of SAR image based on edge localization with optical edge image of the same scene is proposed. First, image association is done to the two images. Then, edge detection is taken to the SAR image with the ROA detector and to the optical image with the Canny detector, respectively. Finally, the final edge result is obtained by deciding edge points in the SAR edge image based...
In order to protect the copyright of digital productions, a novel watermarking algorithm based on phase congruency corner detection and Singular Value Decomposition (SVD) is presented. By introducing the phase congruency detects corners and edges method, the attacked watermarked image can be corrected and the watermark synchronization is realized. In this way, which are used for information hiding,...
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is considered as candidates for future 3G/B3G broadband wireless services. In this paper a novel signal detection scheme based on Quantum Genetic Algorithm (QGA) is proposed for MIMO-OFDM systems. Quantum Genetic Algorithm (QGA) is based on the concept and principles of quantum computing, such as quantum bit and...
Robust and accurate handwritten character segmentation is the essential step for automatic Uighur word recognition on mobile phone. However, it's a hard work to do character segmentation due to Uighur's cursive style and other characteristics. In this paper, a hybrid multiple feature cooperation based algorithm is presented, the main characteristics of the proposed approach include: (1) A multi-feature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.