The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a novel deep end-to-end network to automatically learn the spatial-temporal fusion features for video-based person re-identification. Specifically, the proposed network consists of CNN and RNN to jointly learn both the spatial and the temporal features of input image sequences. The network is optimized by utilizing the siamese and softmax losses simultaneously to pull the...
Software has been changing during its whole life cycle. Therefore, identification of source code changes becomes a key issue in software evolution analysis. However, few current change analysis research focus on dynamic language software. In this paper, we pay attention to the fine-grained source code changes of Python software. We implement an automatic tool named PyCT to extract 77 kinds of fine-grained...
This research focused on the BBS (Bulletin Board System) site, PTT. We used web crawler method to retrieve posts from the PTT web site. Then we cleared and stored the data like posts and replies in MySQL database for a further study. Finally through the analysis by data mining algorithm, we can detect the relation among the users from different boards. And we also show the unique culture in PTT, the...
Due to the data stream is real-time, fast, unlimited, one-pass, clustering data stream requires algorithms which are capable to process the data stream in the limited time and memory. In this paper, we propose a clustering algorithm based on the improved similarity search tree (SSMC-Tree), and introduce buffer, hitchhike processing and local aggregation strategy, it can adapt to different speed data...
Online dating networks, a type of social network, are gaining popularity. With many people joining and being available in the network, users are overwhelmed with choices when choosing their ideal partners. This problem can be overcome by utilizing recommendation methods. However, traditional recommendation methods are ineffective and inefficient for online dating networks where the dataset is sparse...
Design pattern is an effective way to describe software architecture. But with the increasing size and complexity of the software, it is difficult to recognize design patterns are used in software. In order to comprehend and maintain software system, a lot of detecting design pattern algorithms were proposed. In this paper, we proposed an algorithm to discovery design patterns more efficient by automatic...
Very large word-length logarithmic number system (LNS) addition/subtraction requires a lot of hardware and long pipeline latency. In this paper, we proposed an algorithm that utilized two novel methods to solve these problems. With this algorithm, the convergence rate of LNS addition/subtraction unit can be exponential. All the possible cases are thoroughly tested by simulations and thus we have proved...
Examination plays a role to judge learner's learning behavior and achievement in evaluation. In most cases, good grade means good learner. Teachers do not realize what learners know and how much they understand. Learners with poor grades are becoming giving up them easily. Modern evaluation, diagnoses students with learning ability not grade. There are two assumptions. First, the difficulty level...
This paper proposed a low profile RFID tag antenna design for metallic objects application. The antenna structure consists of two non-connected capacitance loads and two rectangular patches electrically connected through vias to the ground plane to form an RFID tag antenna that is suitable for mounting on metallic objects. The experimental tests show that the maximum read range of RFID tag placed...
This paper presents a triple-feed RFID tag antenna whose radiation pattern is near omni-directional in three dimensions, and which has less than 3.0 dB gain deviation in all directions. The presented tag with a near omni-directional radiation pattern can be employed to overcome the null-reading problem of dipole-type RFID tag applications. A unique feature of the triple-feed design is that the tag...
A multi-modulus programmable frequency divider architecture with 33.3% to 66.7% duty cycle output signal is presented. Key circuits of the architecture are 2/3 divider cells, which share the same logic and almost same circuit cells. This architecture can divide the input clock frequency by 22 to 2n+1 -1 with unit step increment, where n is the number of 2/3 divider cells; and 33.3% to 66.7% duty cycle...
This paper is devoted to an in-depth study of Chua's Bernoulli-shift rules 11, 14, 43 and 142 from the viewpoint of symbolic dynamics. It is shown that each of these four rules identifies two chaotic dynamical subsystems and presents very rich and complicated dynamical properties. In particular, they are topologically mixing and possess the positive topological entropies on their two subsystems. Therefore,...
Personal objects in Netnews oral reviews are important component of public opinion. Recognition of personal objects is the base of sentiment analysis for oral reviews. This paper analyzes the characteristics of personal objects in Netnews oral reviews. Based on these characteristics, we present an efficient recognition approach. The approach firstly evaluates reliability of one Chinese character as...
Parametric design allows that the CAD system not only has the capabilities of interactive plotting, but also has the function of automatic drawing. Combined with expression operation, in the paper, the data structure of facade windows is firstly defined utilizing the basic principles of feature-based modeling, and then the characteristic database is built up which is used as the basis for the realization...
In this paper, we address the crucial issue of how to design efficient MAC protocols in autonomous wireless networks with selfish users. We model the wireless medium access control problem as a non-cooperative game in which the MAC protocol can be regarded as distributed strategy update scheme approaching the equilibrium point. Under such game theoretic framework, three MAC protocols, the aggressive,...
The cellular neural/nonlinear network (CNN) is a powerful tool for image and video signal processing, robotic and biological visions. In this paper, the robust CNN template for extracting the selected objects in binary images is designed, and the parameter inequalities for determining parameter intervals for implementing the corresponding tasks are provided. The selected objects extraction CNN derived...
With the rapidly changes in the market, the businesses need to produce according to order more and more. As currently there is no order production planning based on lead time and balanced production, an order production planning model based on lead time and balanced production is proposed. It is goal programming model aiming at restraining the capacity of resources in production process, in which...
This study presents an effective system for detecting and tracking moving vehicles in nighttime traffic scene for traffic surveillance. The proposed method identifies vehicles based on detecting and locating vehicle headlights and taillights by using the techniques of image segmentation and pattern analysis. First, to effectively extract bright objects of interest, a fast bright-object segmentation...
Queries to search engine on the Internet are usually short, and cannot provide enough information for effective retrievals. Researchers have developed query expansion to cope with the problem and proved its usefulness. But previous researches have mainly on the general search engine and do not give the semantic enough attention. In this paper, we introduced a novel algorithm especially for the vertical...
CEP(complex event processing) over RFID (radio frequency identification) data streams has become a new paradigm recently. Existing NFA (non-deterministic finite automata) based RFID event detection techniques assume single granularity RFID data (e.g., only item-level RFID readings) in the stream. In this paper, we consider CEP problems over multiple granularities RFID data streams (e.g., item-level,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.