The Journal of Supercomputing - With the fast growth of big data applications, it has brought about a huge increase in the energy consumption for big data processing in Cloud data centers. In this... 相似文献
Journal of Mathematical Imaging and Vision - Different from the traditional watermarking schemes, zero-watermarking schemes are lossless embedding methods, which are applicable to be used in... 相似文献
We propose a novel online multiple object tracker taking structure information into account. State-of-the-art multi-object tracking (MOT) approaches commonly focus on discriminative appearance features, while neglect in different levels structure information and the core of data association. Addressing this, we design a new tracker fully exploiting structure information and encoding such information into the cost function of the graph matching model. Firstly, a new measurement is proposed to compare the structure similarity of two graphs whose nodes are equal. With this measurement, we define a complete matching which performs association in high efficiency. Secondly, for incomplete matching scenarios, a structure keeper net (SKnet) is designed to adaptively establish the graph for matching. Finally, we conduct extensive experiments on benchmarks including MOT2015 and MOT17. The results demonstrate the competitiveness and practicability of our tracker.
Neural Computing and Applications - Muti-focus image fusion is the extraction of focused regions from different images to create one all-in-focus fused image. The key point is that only objects... 相似文献
Neural Computing and Applications - Image classification tasks widely exist in many actual scenarios, including medicine, security, manufacture and finance. A major problem that hurts algorithm... 相似文献
Neural Computing and Applications - RNA-binding proteins play an important role in the biological process. However, the traditional experiment technology to predict RNA-binding residues is... 相似文献
Neural Computing and Applications - In real-world application of affective brain–computer interface (aBCI), individual differences across subjects and non-stationary characteristics of... 相似文献
Radio frequency identification (RFID) tag delegation enables a centralized back-end server to delegate the right to identify
and authenticate a tag to specified readers. This should be used to mitigate the computational load on the server side and
also to solve the issues in terms of latency and dependency on network connectivity. In this study, we describe a basic RFID
delegation architecture and then under this model, we investigate the security of an RFID delegation protocol: Song Mitchell
delegation (SMD), which is recently proposed by Song and Mitchell. We point out security flaws that have gone unnoticed in
the design and present two attacks namely, a tag impersonation attack and a desynchronization attack against it. We also discover
a subtle flaw by which a delegated entity can still keep its delegation rights after the expire of them—this infringes security
policy of the scheme. More precisely, we show that the protocol will be still vulnerable to previously mentioned attacks,
even if the back-end server ends the delegation right of a delegated reader and update the secrets of the delegated tags.
To counteract such flaws, we improve the SMD protocol with a stateful variant so that it provides the claimed security properties. 相似文献
Examining several sources of data on smartphone use, this paper presents evidence for the popular conjecture that mobile devices
are “habit-forming.” The form of habits we identified is called a checking habit: brief, repetitive inspection of dynamic content quickly accessible on the device. We describe findings on kinds and frequencies
of checking behaviors in three studies. We found that checking habits occasionally spur users to do other things with the
device and may increase usage overall. Data from a controlled field experiment show that checking behaviors emerge and are
reinforced by informational “rewards” that are very quickly accessible. Qualitative data suggest that although repetitive
habitual use is frequent, it is experienced more as an annoyance than an addiction. We conclude that supporting habit-formation
is an opportunity for making smartphones more “personal” and “pervasive.” 相似文献