首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Accurate video tagging has been becoming increasingly crucial for online video management and search. This article documents a novel framework called comprehensive video tagger (CVTagger) to facilitate accurate tag-based video annotation. The system applies both multimodal and temporal properties combined with a novel classification framework with hierarchical structure based on multilayer concept model and regression analysis. The advanced architecture enables effective incorporation of both video concept dependency and temporal dynamics. Using a large-scale test collection containing 50,000 YouTube videos, a set of empirical studies have been carried out and experimental results demonstrate various advantages of CVTagger over the state-of-the-art techniques.  相似文献   

2.
Bellamine  I.  Silkan  H.  Tmiri  A. 《Multimedia Tools and Applications》2020,79(33-34):24579-24593
Multimedia Tools and Applications - Color Space-Time Interest Points (CSTIP) are among all the interesting low-level features which can be extracted from videos; they provide an efficient...  相似文献   

3.
4.
A relation between probabilistic logic and capacities (belief functions) is formally established. the use of lower probabilities is demonstrated to enrich expressiveness for frameworks based on polytopes of probability laws. © 1995 John Wiley & Sons, Inc.  相似文献   

5.
Distributed video coding (DVC) constitutes an original coding framework to meet the stringent requirements imposed by uplink-oriented and low-power mobile video applications. The quality of the side information available to the decoder and the efficiency of the employed channel codes are primary factors determining the success of a DVC system. This contribution introduces two novel techniques for probabilistic motion compensation in order to generate side information at the Wyner-Ziv decoder. The employed DVC scheme uses a base layer, serving as a hash to facilitate overlapped block motion estimation at the decoder side. On top of the base layer, a supplementary Wyner-Ziv layer is coded in the DCT domain. Both proposed probabilistic motion compensation techniques are driven by the actual correlation channel statistics and reuse information contained in the hash. Experimental results report significant rate savings caused by the novel side information generation methods compared to previous techniques. Moreover, the compression performance of the presented DVC architecture, featuring the proposed side-information generation techniques, delivers state-of-the-art compression performance.  相似文献   

6.
Structural engineers are often constrained by cost or manufacturing considerations to select member thicknesses from a discrete set of values. Conventional, gradient-free techniques to solve these discrete problems cannot handle large problem sizes, while discrete material optimization (DMO) techniques may encounter difficulties, especially for bending-dominated problems. To resolve these issues, we propose an efficient gradient-based technique to obtain engineering solutions to the discrete thickness selection problem. The proposed technique uses a series of constraints to enforce an effective stiffness-to-mass and strength-to-mass penalty on intermediate designs. In conjunction with these constraints, we apply an exact penalty function which drives the solution towards a discrete design. We utilize a continuation approach to obtain approximate solutions to the discrete thickness selection problem by solving a sequence of relaxed continuous problems with increasing penalization. We also show how this approach can be applied to combined discrete thickness selection and topology optimization design problems. To demonstrate the effectiveness of the proposed technique, we present both compliance and stress-constrained results for in-plane and bending-dominated problems.  相似文献   

7.
There is a growing concern about anonymity and privacy on the Internet, resulting in lots of work on formalization and verification of anonymity. In particular, the importance of probabilistic aspects of anonymity has recently been highlighted by many authors. Several different notions of “probabilistic anonymity” have been studied so far, but proof methods for such probabilistic notions have not yet been elaborated. In this paper we introduce a simulation-based proof method for one notion of probabilistic anonymity introduced by Bhargava and Palamidessi, called strong probabilistic anonymity. The method is a probabilistic adaptation of the one by Kawabe, Sakurada et al. for non-deterministic anonymity; anonymity of a protocol is proved by finding a forward/backward simulation between certain automata. For the jump from non-determinism to probability we exploit a generic, coalgebraic theory of traces and simulations developed by Hasuo, Jacobs and Sokolova. In particular, an appropriate notion of probabilistic simulation is obtained as an instantiation of the generic definition, for which soundness theorem comes for free. Additionally, we show how we can use a similar idea to verify a weaker notion of probabilistic anonymity called probable innocence.  相似文献   

8.
9.
Traffic modeling is a key step in several intelligent transportation systems (ITS) applications. This paper regards the traffic modeling through the enhancement of the cell transmission model. It considers the traffic flow as a hybrid dynamic system and proposes a piecewise switched linear traffic model. The latter allows an accurate modeling of the traffic flow in a given section by considering its geometry. On the other hand, the piecewise switched linear traffic model handles more than one congestion wave and has the advantage to be modular. The measurements at upstream and downstream boundaries are also used in this model in order to decouple the traffic flow dynamics of successive road portions. Finally, real magnetic sensor data, provided by the performance measurement system on a portion of the Californian SR60-E highway are used to validate the proposed model.  相似文献   

10.
Motivated by the space-time diversity transmission technique in wireless communications, a novel probabilistic quantum relay communication scheme in the quantum noisy channel is proposed in order to maximize the correct information transmission and the range of quantum communication, in which quantum signal sequences that carrying two-particle entangled states are transmitted from two senders to two relays and then retransmitted to the receiver after space-time encoded by relays. The quantum signal states can be restored via filtering out the channel noise with two-dimensional Bell measurements by the receiver. Analysis and discussions indicate that our scheme can increase and approximately double the range of quantum communication while not to reduce too much quantum signal-to-noise ratio, and meanwhile the security can be guaranteed under strongest collective attacks and LOCC attacks.  相似文献   

11.
In accounting and finance domains, bankruptcy prediction is of great utility for all of the economic stakeholders. The challenge of accurate assessment of business failure prediction, specially under scenarios of financial crisis, is known to be complicated. Although there have been many successful studies on bankruptcy detection, seldom probabilistic approaches were carried out. In this paper we assume a probabilistic point-of-view by applying Gaussian processes (GP) in the context of bankruptcy prediction, comparing it against the support vector machines (SVM) and the logistic regression (LR). Using real-world bankruptcy data, an in-depth analysis is conducted showing that, in addition to a probabilistic interpretation, the GP can effectively improve the bankruptcy prediction performance with high accuracy when compared to the other approaches. We additionally generate a complete graphical visualization to improve our understanding of the different attained performances, effectively compiling all the conducted experiments in a meaningful way. We complete our study with an entropy-based analysis that highlights the uncertainty handling properties provided by the GP, crucial for prediction tasks under extremely competitive and volatile business environments.  相似文献   

12.
传统的推荐算法多以优化推荐列表的精确度为目标,而忽略了推荐算法的另一个重要指标——多样性。提出了一种新的提高推荐列表多样性的方法。该方法将列表生成步骤转换为N次概率选择过程,每次概率选择通过两个步骤完成:类型选择与项目选择。在类型选择中,引入项目的类型信息,根据用户对不同项目类型的喜好计算概率矩阵,并依照该概率矩阵选择一个类型;在项目选择中,根据项目的预测评分、项目的历史流行度、项目的推荐流行度3个因素重新计算项目的最终得分,选择得分最高的项目推荐给用户。通过阈值TR来调节多样性与精确度之间的折中。最后,通过对比实验证明了该方法的有效性。  相似文献   

13.
Discrete-time receding horizon optimal control is employed in model-based anti-windup augmentation. The optimal control formulation enables designs that minimize the mismatch between the unconstrained closed-loop response with a given controller and the constrained closed-loop response with anti-windup augmentation. Recently developed techniques for off-line computation of the constrained linear regulator's solution, which is piecewise affine, facilitate implementation. The resulting sampled-data, anti-windup closed-loop system's properties are established and its performance is demonstrated on a simulation example.  相似文献   

14.
This paper addresses the problem of identification of hybrid dynamical systems, by focusing the attention on hinging hyperplanes and Wiener piecewise affine autoregressive exogenous models, in which the regressor space is partitioned into polyhedra with affine submodels for each polyhedron. In particular, we provide algorithms based on mixed-integer linear or quadratic programming which are guaranteed to converge to a global optimum. For the special case where the estimation data only seldom switches between the different submodels, we also suggest a way of trading off between optimality and complexity by using a change detection approach.  相似文献   

15.
Affective video content representation and modeling   总被引:7,自引:0,他引:7  
This paper looks into a new direction in video content analysis - the representation and modeling of affective video content . The affective content of a given video clip can be defined as the intensity and type of feeling or emotion (both are referred to as affect) that are expected to arise in the user while watching that clip. The availability of methodologies for automatically extracting this type of video content will extend the current scope of possibilities for video indexing and retrieval. For instance, we will be able to search for the funniest or the most thrilling parts of a movie, or the most exciting events of a sport program. Furthermore, as the user may want to select a movie not only based on its genre, cast, director and story content, but also on its prevailing mood, the affective content analysis is also likely to contribute to enhancing the quality of personalizing the video delivery to the user. We propose in this paper a computational framework for affective video content representation and modeling. This framework is based on the dimensional approach to affect that is known from the field of psychophysiology. According to this approach, the affective video content can be represented as a set of points in the two-dimensional (2-D) emotion space that is characterized by the dimensions of arousal (intensity of affect) and valence (type of affect). We map the affective video content onto the 2-D emotion space by using the models that link the arousal and valence dimensions to low-level features extracted from video data. This results in the arousal and valence time curves that, either considered separately or combined into the so-called affect curve, are introduced as reliable representations of expected transitions from one feeling to another along a video, as perceived by a viewer.  相似文献   

16.
《国际计算机数学杂志》2012,89(10):2100-2111
ABSTRACT

Due to the non-locality of fractional derivative, the analytical solution and good approximate solution of fractional partial differential equations are usually difficult to get. Reproducing kernel space is a perfect space in studying this type of equations, however the numerical results of equations by using the traditional reproducing kernel method (RKM) isn't very good. Based on this problem, we present the piecewise technique in the reproducing kernel space to solve this type of equations. The focus of this paper is to verify the stability and high accuracy of the present method by comparing the absolute error with traditional RKM and study the effect on absolute error for different values of α. Furthermore, we can study the distribution of entire space at a particular time period. Three numerical experiments are provided to verify the efficiency and stability of the proposed method. Meanwhile, it is tested by experiments that the change of the value of α has little effect on its accuracy.  相似文献   

17.
We present an algorithm for generating a binary search tree that allows efficient computation of piecewise affine (PWA) functions defined on a polyhedral partition. This is useful for PWA control approaches, such as explicit model predictive control, as it allows the controller to be implemented online with small computational effort. The computation time is logarithmic in the number of regions in the PWA partition.  相似文献   

18.
Theoretical modeling of manufacturing processes assists the design of new systems for predictions of future behavior, identifies improvement areas, and evaluates changes to existing systems. A novel approach is proposed to model industrial machines using probabilistic Boolean networks (PBNs) to study the relationship between machine components, their reliability and function. Once a machine is modeled as a PBN, through identification of regulatory nodes, predictors and selection probabilities, simulation and property verification are used to verify model correctness and behavior. Using real machine data, model parameters are estimated and a PBN is built to describe the machine, and formulate valid predictions about probability of failure through time. Two models were established: one with non-deterministic inputs (proposed), another with components’ MTBFs inputs. Simulations were used to generate data required to conduct inferential statistical tests to determine the level of correspondence between predictions and real machine data. An ANOVA test shows no difference between expected and observed values of the two models (p value = 0.208). A two-sample T test demonstrates the proposed model provides values closer to expected values; consequently, it can model observable phenomena (p value \(=\) 0.000). Simulations are used to generate data required to conduct inferential statistical tests to determine the level of correspondence between model prediction and real machine data. This research demonstrates that using PBNs to model manufacturing systems provides a new mechanism for the study and prediction of their future behavior at the design phase, assess future performance and identify areas to improve design reliability and system resilience.  相似文献   

19.
Probabilistic fiber element modeling of reinforced concrete structures   总被引:1,自引:0,他引:1  
A computational model based on a stochastic fiber element model is developed in this study. This model can be utilized for probabilistic evaluation of reinforced concrete (RC) members. The stochastic fiber element model is developed by combining the conventional fiber element formulation and the midpoint method for random field representation, to account for spatial variability of material and geometrical properties within a structural member. Three verification examples show the capability of the developed model in estimating the nonlinear structural behavior including softening. As an application of the developed computational model, a probabilistic strength analysis of a RC column is conducted in terms of the axial load-bending moment interaction. An approach of evaluating RC structural systems using the developed probabilistic computational model is also presented.  相似文献   

20.
The solution of linear piecewise constant delay systems has been derived by using the block pulse series expansion method. A matrix called the delay operational matrix is introduced first to manipulate the time delay. Then the solution is obtained through using the matrix and the properties of block pulse functions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号