首页 > 最新文献

Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

英文 中文
A scale invariant keypoints detector 尺度不变关键点检测器
Tao Zhou
We propose a novel approach for detecting keypoints invariant to scale changes based on M-wavelet theory. The theory description and detecting process of our approach are presented The comparative evaluation of different detectors shows our approach can provides a competent performance in rotation invariant, scale invariant, illumination invariant and noiseproof. In terms of scale changes, our proposed approach improves keypoint repeatability by 2%~10% compared with scale invariant feature transform (SIFT), speeded up robust features (SURF), Harris-Laplace, Hessian-Laplace.
提出了一种基于m -小波理论的关键点不随尺度变化的检测方法。给出了该方法的理论描述和检测过程,并对不同检测器进行了比较评价,结果表明该方法具有良好的旋转不变性、尺度不变性、光照不变性和噪声不变性。在尺度变化方面,与尺度不变特征变换(SIFT)、加速鲁棒特征变换(SURF)、Harris-Laplace、hessia - laplace等方法相比,关键点可重复性提高2%~10%。
{"title":"A scale invariant keypoints detector","authors":"Tao Zhou","doi":"10.1109/SPAC.2014.6982695","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982695","url":null,"abstract":"We propose a novel approach for detecting keypoints invariant to scale changes based on M-wavelet theory. The theory description and detecting process of our approach are presented The comparative evaluation of different detectors shows our approach can provides a competent performance in rotation invariant, scale invariant, illumination invariant and noiseproof. In terms of scale changes, our proposed approach improves keypoint repeatability by 2%~10% compared with scale invariant feature transform (SIFT), speeded up robust features (SURF), Harris-Laplace, Hessian-Laplace.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid improved gravitional search algorithm and kernel based extreme learning machine method for classification problems 混合改进重力搜索算法和基于核的极值学习机分类问题方法
Chao Ma, Jihong Ouyang, J. Guan
In this paper, we hybridize the improved gravitational search algorithm (IGSA) with kernel based extreme learning machine (KELM) method. Based on this, a novel hybrid system IGSA-KELM is proposed to improve the generalization performance for classification problems. In this system, IGSA is designed by combining the search strategy of particle swarm optimization and GSA to effectively reduce the problem of slow convergence rate, moreover, the continuous-value IGSA and binary IGSA are integrated in one algorithm in order to optimize the KELM parameters and feature subset selection simultaneously. This proposed hybrid algorithm is evaluated on several well-known UCI machine learning datasets. The results indicate that the superiority of the proposed model in terms of classification accuracy. Our hybrid method not only can select the most relevant feature subset, but also achieves a high classification accuracy over other similar state-of-the-art classifier systems.
本文将改进的引力搜索算法(IGSA)与基于核的极限学习机(KELM)方法相结合。在此基础上,提出了一种新的混合系统IGSA-KELM,以提高分类问题的泛化性能。该系统将粒子群优化的搜索策略与GSA算法相结合,设计了IGSA算法,有效降低了IGSA算法收敛速度慢的问题,并将连续值IGSA算法与二值IGSA算法集成在一个算法中,同时对KELM参数和特征子集选择进行优化。在几个著名的UCI机器学习数据集上对该混合算法进行了评估。结果表明,该模型在分类精度方面具有优越性。我们的混合方法不仅可以选择最相关的特征子集,而且比其他类似的最先进的分类器系统具有更高的分类精度。
{"title":"Hybrid improved gravitional search algorithm and kernel based extreme learning machine method for classification problems","authors":"Chao Ma, Jihong Ouyang, J. Guan","doi":"10.1109/SPAC.2014.6982703","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982703","url":null,"abstract":"In this paper, we hybridize the improved gravitational search algorithm (IGSA) with kernel based extreme learning machine (KELM) method. Based on this, a novel hybrid system IGSA-KELM is proposed to improve the generalization performance for classification problems. In this system, IGSA is designed by combining the search strategy of particle swarm optimization and GSA to effectively reduce the problem of slow convergence rate, moreover, the continuous-value IGSA and binary IGSA are integrated in one algorithm in order to optimize the KELM parameters and feature subset selection simultaneously. This proposed hybrid algorithm is evaluated on several well-known UCI machine learning datasets. The results indicate that the superiority of the proposed model in terms of classification accuracy. Our hybrid method not only can select the most relevant feature subset, but also achieves a high classification accuracy over other similar state-of-the-art classifier systems.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of an Internet Public Opinion Monitoring System 网络舆情监测系统的设计与实现
Wen Liu, Zhijun Song
In this paper, an Internet Public Opinion Monitoring System based on Administration for Industry and Commerce is proposed. The paper first analyzes the design of the system. Then describes the system in detail as five modules, they are Internet Collection Module, Data Preprocessing Module, Public Opinion Analysis Module, Service Module and System Management Module.
本文提出了一种基于工商行政管理部门的网络舆情监测系统。论文首先对系统的设计进行了分析。然后详细描述了系统的五大模块,分别是网络采集模块、数据预处理模块、舆情分析模块、服务模块和系统管理模块。
{"title":"Design and implementation of an Internet Public Opinion Monitoring System","authors":"Wen Liu, Zhijun Song","doi":"10.1109/SPAC.2014.6982668","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982668","url":null,"abstract":"In this paper, an Internet Public Opinion Monitoring System based on Administration for Industry and Commerce is proposed. The paper first analyzes the design of the system. Then describes the system in detail as five modules, they are Internet Collection Module, Data Preprocessing Module, Public Opinion Analysis Module, Service Module and System Management Module.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"242 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical analysis based fast intra prediction algorithm in HEVC 基于数值分析的HEVC快速帧内预测算法
Yubei Lin, Qinyi Chen, Xingming Zhang
The latest video coding standard HEVC (High Efficiency Video Coding) provides up to 35 intra prediction modes to achieve more accurate prediction. However, a larger number of prediction modes leads to higher encoding complexity. To accelerate the intra mode decision in HEVC, an improved algorithm based on numerical analysis of the neighboring reference samples of coding units is proposed. Four filters are designed to reduce the candidate modes. And an algorithm to seek the proper thresholds for the filters is developed. The experimental results show that when compared to the test model HM 12.0 of HEVC, the proposed method can save up to 28.40% of encoder time with slight increase of BD-rate and negligible loss of PSNR. Furthermore, it is easy to combine our approach with other fast algorithms to achieve more improvement.
最新的视频编码标准HEVC (High Efficiency video coding)提供多达35种帧内预测模式,以实现更准确的预测。但是,预测模式的数量越多,编码复杂度也就越高。为了加速HEVC中的模式内决策,提出了一种基于相邻编码单元参考样本数值分析的改进算法。设计了四个滤波器来减少候选模式。并提出了一种寻找滤波器合适阈值的算法。实验结果表明,与HEVC的测试模型HM 12.0相比,该方法可节省28.40%的编码器时间,且bd率略有提高,PSNR的损失可以忽略不计。此外,我们的方法很容易与其他快速算法相结合,以实现更多的改进。
{"title":"Numerical analysis based fast intra prediction algorithm in HEVC","authors":"Yubei Lin, Qinyi Chen, Xingming Zhang","doi":"10.1109/SPAC.2014.6982719","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982719","url":null,"abstract":"The latest video coding standard HEVC (High Efficiency Video Coding) provides up to 35 intra prediction modes to achieve more accurate prediction. However, a larger number of prediction modes leads to higher encoding complexity. To accelerate the intra mode decision in HEVC, an improved algorithm based on numerical analysis of the neighboring reference samples of coding units is proposed. Four filters are designed to reduce the candidate modes. And an algorithm to seek the proper thresholds for the filters is developed. The experimental results show that when compared to the test model HM 12.0 of HEVC, the proposed method can save up to 28.40% of encoder time with slight increase of BD-rate and negligible loss of PSNR. Furthermore, it is easy to combine our approach with other fast algorithms to achieve more improvement.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating joint and surface for human action recognition in indoor environments 结合关节和表面进行室内环境人体动作识别
Qingyang Li, Yu Zhou, Anlong Ming
Action recognition has a long research history, despite several contributed approaches have been introduced, it remains a challenging task in computer vision. In this paper, we present a uniform fusion framework for action recognition, which integrates not only the local depth cues but also the global depth cues. Firstly, the action recognition task is formulated as the maximize the posterior probability, and then the observation for the original action is decomposed into the sub-observations for each individual feature representation strategy of the original action. For the local depth cues, the joints inside the human skeleton is employed to model the local variation of the human motion. In addition, the normal of the depth surface is utilized as the global cue to capture the holistic structure of the human motion. Rather than using the original feature directly, the support vector machine model learning both the discriminative local cue (i.e., the joint) and the discriminative global cue (i.e., the depth surface), respectively. The presented approach is validated on the famous MSR Daily Activity 3D Dataset. And the experimental results demonstrate that our fusion approach can outperform the baseline approaches.
动作识别有着悠久的研究历史,尽管已经引入了一些有贡献的方法,但它仍然是计算机视觉中的一项具有挑战性的任务。本文提出了一种统一的动作识别融合框架,既融合了局部深度线索,又融合了全局深度线索。首先将动作识别任务表述为后验概率最大化,然后将原始动作的观测值分解为原始动作各个特征表示策略的子观测值。对于局部深度线索,利用人体骨骼内部的关节来模拟人体运动的局部变化。此外,利用深度表面的法线作为全局线索来捕捉人体运动的整体结构。支持向量机模型不是直接使用原始特征,而是分别学习判别性局部线索(即关节)和判别性全局线索(即深度面)。该方法在著名的MSR日常活动3D数据集上进行了验证。实验结果表明,我们的融合方法优于基线方法。
{"title":"Integrating joint and surface for human action recognition in indoor environments","authors":"Qingyang Li, Yu Zhou, Anlong Ming","doi":"10.1109/SPAC.2014.6982665","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982665","url":null,"abstract":"Action recognition has a long research history, despite several contributed approaches have been introduced, it remains a challenging task in computer vision. In this paper, we present a uniform fusion framework for action recognition, which integrates not only the local depth cues but also the global depth cues. Firstly, the action recognition task is formulated as the maximize the posterior probability, and then the observation for the original action is decomposed into the sub-observations for each individual feature representation strategy of the original action. For the local depth cues, the joints inside the human skeleton is employed to model the local variation of the human motion. In addition, the normal of the depth surface is utilized as the global cue to capture the holistic structure of the human motion. Rather than using the original feature directly, the support vector machine model learning both the discriminative local cue (i.e., the joint) and the discriminative global cue (i.e., the depth surface), respectively. The presented approach is validated on the famous MSR Daily Activity 3D Dataset. And the experimental results demonstrate that our fusion approach can outperform the baseline approaches.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information query for public bicycle service based on Andriod 基于android的公共自行车服务信息查询
Guihua Liao, Jian Zhang
This paper presents an information query system for renting and returning public bicycles based on Android system. The system provides two parts of services: position locating and station query. Position locating is tackled by baidu API entirely, station query includes two sub parts: station marking and information updating. We use the latitude and longitude of the station to mark the station on the map, and query the station around current location. We use the station ID as the open API's parameter to query the station information, then analyze the returned JSON data with station information, and extract the remaining bicycles for renting and remaining seats for returning from the JSON data. At last, we update the station information on the map. This system aims to propose an integrated solution for public bicycle service. Experiments in 3 test cases demonstrate the effect of the proposed system, and indicate that the system can fully meet the requirement for public bicycle service.
提出了一种基于Android系统的公共自行车租还信息查询系统。系统提供位置定位和站点查询两部分服务。位置定位全部由百度API解决,站点查询包括站点标记和信息更新两个子部分。我们使用该站的经纬度在地图上标记该站,并查询该站周围的当前位置。我们使用站点ID作为open API的参数来查询站点信息,然后用站点信息分析返回的JSON数据,从JSON数据中提取出剩余的要出租的自行车和剩余的要返回的座位。最后,在地图上更新站点信息。本系统旨在为公共自行车服务提供一个一体化的解决方案。通过3个测试用例的实验验证了系统的有效性,表明系统完全可以满足公共自行车服务的需求。
{"title":"Information query for public bicycle service based on Andriod","authors":"Guihua Liao, Jian Zhang","doi":"10.1109/SPAC.2014.6982671","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982671","url":null,"abstract":"This paper presents an information query system for renting and returning public bicycles based on Android system. The system provides two parts of services: position locating and station query. Position locating is tackled by baidu API entirely, station query includes two sub parts: station marking and information updating. We use the latitude and longitude of the station to mark the station on the map, and query the station around current location. We use the station ID as the open API's parameter to query the station information, then analyze the returned JSON data with station information, and extract the remaining bicycles for renting and remaining seats for returning from the JSON data. At last, we update the station information on the map. This system aims to propose an integrated solution for public bicycle service. Experiments in 3 test cases demonstrate the effect of the proposed system, and indicate that the system can fully meet the requirement for public bicycle service.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new attempt of white-box AES implementation 白盒AES实现的新尝试
R. Luo, Xuejia Lai, R. You
In this paper, we propose an improved table-based white-box implementation of AES which is able to resist different types of attack, including the BGE attack and De Mulder et al.'s cryptanalysis, to protect information under “white-box attack context”. The notion of white-box attack context, introduced by Chow et al., describes a general setting in which cryptographic algorithms are executed in untrusted environments. In this setting, adversaries have attained complete access to the implementations of cryptographic algorithms as well as the dynamic execution environments. The key strategy applied to our design is to compose different operations of the AES round function and convert the composition into encoded lookup tables. The new scheme exploits larger key-dependent tables, each of which contains two bytes of the round keys. We then analyze the security against different types of attack and measure two security metrics: the “white-box diversity” and “ambiguity”. The new scheme can withstand the BGE attack due to the utilization of larger mixing bijections and tabulated “ShiftRows” it can also resist the cryptanalysis of De Mulder et al. since the bindings between “nTMC” and “TSR” are irreducible and the non-linear encodings are introduced to all tables.
在本文中,我们提出了一种改进的基于表的AES白盒实现,它能够抵抗不同类型的攻击,包括BGE攻击和De Mulder等人的密码分析,以保护“白盒攻击环境”下的信息。由Chow等人引入的白盒攻击上下文的概念描述了在不受信任的环境中执行加密算法的一般设置。在这种情况下,攻击者可以完全访问加密算法的实现以及动态执行环境。应用于我们设计的关键策略是组合AES round函数的不同操作,并将组合转换为编码的查找表。新方案利用了更大的键依赖表,每个表包含两个字节的轮键。然后,我们分析了针对不同类型攻击的安全性,并度量了两个安全度量:“白盒多样性”和“模糊性”。由于使用了更大的混合双向量和表化的“ShiftRows”,新方案可以抵御BGE攻击,也可以抵抗De Mulder等人的密码分析,因为“nTMC”和“TSR”之间的绑定是不可约的,并且所有表都引入了非线性编码。
{"title":"A new attempt of white-box AES implementation","authors":"R. Luo, Xuejia Lai, R. You","doi":"10.1109/SPAC.2014.6982727","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982727","url":null,"abstract":"In this paper, we propose an improved table-based white-box implementation of AES which is able to resist different types of attack, including the BGE attack and De Mulder et al.'s cryptanalysis, to protect information under “white-box attack context”. The notion of white-box attack context, introduced by Chow et al., describes a general setting in which cryptographic algorithms are executed in untrusted environments. In this setting, adversaries have attained complete access to the implementations of cryptographic algorithms as well as the dynamic execution environments. The key strategy applied to our design is to compose different operations of the AES round function and convert the composition into encoded lookup tables. The new scheme exploits larger key-dependent tables, each of which contains two bytes of the round keys. We then analyze the security against different types of attack and measure two security metrics: the “white-box diversity” and “ambiguity”. The new scheme can withstand the BGE attack due to the utilization of larger mixing bijections and tabulated “ShiftRows” it can also resist the cryptanalysis of De Mulder et al. since the bindings between “nTMC” and “TSR” are irreducible and the non-linear encodings are introduced to all tables.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An instance selection and optimization method for multiple instance learning 一种多实例学习的实例选择与优化方法
Haifeng Zhao, Wenbo Mao, Jiang-tao Wang
Multiple Instance Learning (MIL) has been an interesting topic in the machine learning community. Since proposed, it has been widely used in content-based image retrieval and classification. In the MIL setting, the samples are bags, which are made of instances. In positive bags, at least one instance is positive. Whereas negative bags have all negative instances. This makes it different from the supervised learning. In this paper, we propose an instance selection and optimization method by selecting the most/least positive/negative instances to form a new training set, and learning the optimal distance metric between instances. We evaluate the proposed method on two benchmark datasets, by comparing with representative MIL algorithms. The experimental results suggest the effectiveness of our algorithm.
在机器学习领域,多实例学习(MIL)一直是一个有趣的话题。自提出以来,它已广泛应用于基于内容的图像检索和分类。在MIL设置中,样本是由实例组成的包。在阳性袋中,至少有一个实例是阳性的。而消极的袋子有所有消极的实例。这使得它不同于监督式学习。在本文中,我们提出了一种实例选择和优化方法,通过选择最多/最少的正/负实例组成新的训练集,并学习实例之间的最优距离度量。通过与具有代表性的MIL算法进行比较,我们在两个基准数据集上评估了所提出的方法。实验结果表明了算法的有效性。
{"title":"An instance selection and optimization method for multiple instance learning","authors":"Haifeng Zhao, Wenbo Mao, Jiang-tao Wang","doi":"10.1109/SPAC.2014.6982686","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982686","url":null,"abstract":"Multiple Instance Learning (MIL) has been an interesting topic in the machine learning community. Since proposed, it has been widely used in content-based image retrieval and classification. In the MIL setting, the samples are bags, which are made of instances. In positive bags, at least one instance is positive. Whereas negative bags have all negative instances. This makes it different from the supervised learning. In this paper, we propose an instance selection and optimization method by selecting the most/least positive/negative instances to form a new training set, and learning the optimal distance metric between instances. We evaluate the proposed method on two benchmark datasets, by comparing with representative MIL algorithms. The experimental results suggest the effectiveness of our algorithm.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A general solution for multi-thread based multi-source compressed video surveillance system 基于多线程的多源压缩视频监控系统的通用解决方案
Lu Han, Yixiao Zhao, Shujian Yu, Baojun Zhao, Jiatong Li, Jinghui Wu
This paper proposes a general solution for the multi-source high resolution real-time monitoring system. Our proposed system is realized on a PCI bus-based real-time image processing board, based on H.264 video compression standards. The main function of the system includes video decompression, image scaling, image stitching, as well as multi-mode real-time display in PC software. Unlike traditional multi-board based multi-source surveillance system, our solution focuses on single board system with synchronously processing and independently display of multi-source video, which is more resource-saving The main contributions of this paper are twofold: firstly, we propose a new logical control method of multi-thread to overcome the limitation of single-board bandwidth, and secondly we give a DirectDraw based display solution to avoid screen flicker caused by different frame rates of multi-source. In addition, we elaborate an approach on multi-thread control and synchronization to reduce CPU utility and monitor abnormal system condition.
提出了一种多源高分辨率实时监控系统的通用解决方案。该系统是在基于H.264视频压缩标准的PCI总线实时图像处理板上实现的。该系统的主要功能包括视频解压、图像缩放、图像拼接以及PC软件的多模式实时显示。与传统的基于多板的多源监控系统不同,我们的解决方案侧重于单板系统,对多源视频进行同步处理和独立显示,更加节约资源。首先,我们提出了一种新的多线程逻辑控制方法,以克服单板带宽的限制;其次,我们提出了一种基于DirectDraw的显示方案,以避免多源不同帧率引起的屏幕闪烁。此外,我们还详细阐述了一种多线程控制和同步的方法,以降低CPU利用率和监控系统异常状态。
{"title":"A general solution for multi-thread based multi-source compressed video surveillance system","authors":"Lu Han, Yixiao Zhao, Shujian Yu, Baojun Zhao, Jiatong Li, Jinghui Wu","doi":"10.1109/SPAC.2014.6982664","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982664","url":null,"abstract":"This paper proposes a general solution for the multi-source high resolution real-time monitoring system. Our proposed system is realized on a PCI bus-based real-time image processing board, based on H.264 video compression standards. The main function of the system includes video decompression, image scaling, image stitching, as well as multi-mode real-time display in PC software. Unlike traditional multi-board based multi-source surveillance system, our solution focuses on single board system with synchronously processing and independently display of multi-source video, which is more resource-saving The main contributions of this paper are twofold: firstly, we propose a new logical control method of multi-thread to overcome the limitation of single-board bandwidth, and secondly we give a DirectDraw based display solution to avoid screen flicker caused by different frame rates of multi-source. In addition, we elaborate an approach on multi-thread control and synchronization to reduce CPU utility and monitor abnormal system condition.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122592607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic-based intelligent data clean framework for big data 基于语义的大数据智能数据清理框架
Jia Wang, Zhijun Song, Qian Li, Jun Yu, Fei Chen
In order to overcome the limitation of existing data cleansing methods working on massive data, in this paper, we propose a generic semantic-based framework using parallelized processing model for effective big data cleansing. We also use an improved Semantic-Based Keyword Matching Algorithm to deal with duplicate data. Experimental results show that this parallelized framework with improved Semantic-Based Keyword Matching Algorithm can identify duplicates with high recall and precision and have a good performance for big data cleansing.
为了克服现有数据清理方法在海量数据上的局限性,本文提出了一种基于语义的通用框架,利用并行处理模型进行有效的大数据清理。我们还使用改进的基于语义的关键字匹配算法来处理重复数据。实验结果表明,该并行化框架结合改进的基于语义的关键字匹配算法,能够以较高的查全率和查准率识别重复项,具有良好的大数据清理性能。
{"title":"Semantic-based intelligent data clean framework for big data","authors":"Jia Wang, Zhijun Song, Qian Li, Jun Yu, Fei Chen","doi":"10.1109/SPAC.2014.6982731","DOIUrl":"https://doi.org/10.1109/SPAC.2014.6982731","url":null,"abstract":"In order to overcome the limitation of existing data cleansing methods working on massive data, in this paper, we propose a generic semantic-based framework using parallelized processing model for effective big data cleansing. We also use an improved Semantic-Based Keyword Matching Algorithm to deal with duplicate data. Experimental results show that this parallelized framework with improved Semantic-Based Keyword Matching Algorithm can identify duplicates with high recall and precision and have a good performance for big data cleansing.","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1