The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cross-modal hashing is usually regarded as an effective technique for large-scale textual-visual cross retrieval, where data from different modalities are mapped into a shared Hamming space for matching. Most of the traditional textual-visual binary encoding methods only consider holistic image representations and fail to model descriptive sentences. This renders existing methods inappropriate to...
The purpose was to use mathematical modeling calculate the fingerprints, quantitative research on traditional Chinese medicine information. We gave a new way to establish four common diseases CGR fingerprint sequence diagram, then gave their usage degree of the synonymous fingerprint sequence defined QRSFU. The preference characteristics of four common disease fingerprint sequences for synonymous...
Learning to hash has attracted broad research interests in recent computer vision and machine learning studies, due to its ability to accomplish efficient approximate nearest neighbor search. However, the closely related task, maximum inner product search (MIPS), has rarely been studied in this literature. To facilitate the MIPS study, in this paper, we introduce a general binary coding framework...
Learning to hash has been recognized to accomplish highly efficient storage and retrieval for large-scale visual data. Particularly, ranking-based hashing techniques have recently attracted broad research attention because ranking accuracy among the retrieved data is well explored and their objective is more applicable to realistic search tasks. However, directly optimizing discrete hash codes without...
Numerous methods have been proposed for person re-identification, most of which however neglect the matching efficiency. Recently, several hashing based approaches have been developed to make re-identification more scalable for large-scale gallery sets. Despite their efficiency, these works ignore cross-camera variations, which severely deteriorate the final matching accuracy. To address the above...
Traditional action recognition methods aim to recognize actions with complete observations/executions. However, it is often difficult to capture fully executed actions due to occlusions, interruptions, etc. Meanwhile, action prediction/recognition in advance based on partial observations is essential for preventing the situation from deteriorating. Besides, fast spotting human activities using partially...
Natural and synthesized speech in L2 Mandarin produced by American English learners was evaluated by native Mandarin speakers to identify focus status and rate the naturalness of the speech. The results reveal that natural speech was recognized and rated better than synthesized speech, early learners' speech better than late learners' speech, focused sentences better than no-focus sentences, and initial...
The structure of traditional distribution network is changed from a single supply radial network to a more power ring network when grid is connected with distributed generations (DG), and island phenomenon occurs higher in the process of reconstruction, which becomes uncontrolled and high risk operation and increased the difficulty of distribution network reconstruction. The improved immune genetic...
Software maintainability evaluation index system is built up in consideration of software maintainability metrics and evaluation problem. Fuzzy integral evaluation approach is applied to measure software maintainability, and virtual maintenance system is taken as an example to validate the maintainability status.
Image representations using code words from a visual dictionary are widely applied in object detection and categorization. Traditionally, there are two types of methods to construct a dictionary: k-means and optimization-based method. The former cannot achieve a good discriminability because it extracts too many background features. The latter needs to cooperate with coding methods and brings about...
Video coding standards are rapidly evolving with the advance of the video compression techniques. As the state of the art video coding standard, H.264/AVC exhibits superior coding performance improvement over its predecessors. Currently, both VCEG and MPEG are launching their next-generation video coding project, which aims to meet the new requirements future applications may impose on the video coding...
In the field of software developing, project is almost the most common organizational form. But with the enhancement of software products' complexity and the constant change of customers' demand, the importance of communication in software development projects is increasingly prominent.Based on literature review about communication management and software development life cycle, the paper identified...
In this paper, we systematically explore the problem of frequent subtree mining and present a novel pruning strategy, F2SC (frequent 2-subtree checking), which can be used in all Apriori-like subtree mining algorithms. With a little more memory overhead of keeping frequent 2-subtrees list, F2SC can prunes the invalid candidate which contains infrequent 2-subtree by checking the frequent 2-subtrees...
Though rate control is not normalized in any video coding standards, it plays an important role in video coding/communication area. Rate control algorithms aim to achieve perceivable video quality in video communication applications under some real-world constraints, such as bandwidth, delay, buffer sizes, etc. This paper presents a novel rate control mechanism for low delay video communication of...
Rate distortion (RD) optimization, which is used to decide the best coding mode of a macroblock (MB) in H.264/AVC video coding standard, is a very efficient technique to improve coding performance. On the other hand, this RD optimization process also incurs a considerable complexity increase of the encoder. To reduce computational cost of RD optimization, fast bit estimation method can be adopted...
Vibrotactile sensations to sight and sound cues on mobile handsets make content more realistic, fun and operation more intuitive. An intuitive method to render human facial feature for visually impaired is evaluated for effectiveness. In current system, the vibration of a mobile phone is used to provide emotion information based on human lip??s shape. Using designed vibration patterns, the users are...
A key issue of error resilient transcoding using ldquointra freshrdquo algorithm is how to decide the intra coding rate and adjust corresponding bits for error resilience, so that jointly optimization between video source and error resilience bit can be achieved. To provide practical solution for this issue, we propose to use rate distortion (RD) optimization criterion to decide the application of...
H.264 coding standard offers several coding modes, including intra mode and inter prediction mode with different block sizes. Since intra mode does not need reference from previous frames, in packet loss environment, intra mode can be a good choice to stop error propagation and enhance decoded video quality. To achieve best coding efficiency, such best mode decision is often made upon optimizing rate...
Inspired by biological immunity mechanism, a novel immune network model named as UOFC-AINet was proposed to specifically perform unsupervised optimal fuzzy clustering. The bottom layer of UOFC-AINet generated optimal centroids of clusters with given cluster number and network parameters, which were controlled by the top layer of UOFC- AINet. Unlike aiNet immune network for data analysis, each antibody...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.