首页 > 最新文献

2009 International Conference on Apperceiving Computing and Intelligence Analysis最新文献

英文 中文
Fuzzy PID control for landing gear based on magneto-rheological (MR) damper 基于磁流变阻尼器的起落架模糊PID控制
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361162
Liu Hua-lin, Chen Yong, Huang Qi, Li Jian
Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.
起落架是飞机的关键部件。起落架的磁流变阻尼器可以保证飞机起飞、降落和滚转过程中的稳定性和安全性。由于起落架是一个非线性、多变量、多自由度的系统。传统的PID控制不能获得理想的控制效果。基于模糊控制理论不需要精确数学模型的优点,本文将PID控制与模糊控制相结合,提出了模糊PID控制。对被动控制、PID控制和模糊PID控制下的起落架模型进行了仿真分析。仿真结果表明,模糊PID控制能有效降低机身振动加速度幅值,提高飞机的平顺性和安全性。它对起落架系统的最优控制有重要的影响。
{"title":"Fuzzy PID control for landing gear based on magneto-rheological (MR) damper","authors":"Liu Hua-lin, Chen Yong, Huang Qi, Li Jian","doi":"10.1109/ICACIA.2009.5361162","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361162","url":null,"abstract":"Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A hardware/software co-verification platform for ASIC design ASIC设计的硬件/软件协同验证平台
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361068
Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang
This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.
本文提出了一种基于Windows-Linux操作系统的ASIC设计软硬件协同验证平台。该平台不仅用于验证维护更新开发ASIC芯片的硬件/软件兼容性,而且用于开发全新ASIC芯片时实现硬件和软件的同步开发。采用该平台,不仅可以更高效地对我们的硬件和软件进行全面的功能验证,还可以缩短我们产品的整个开发周期。本文介绍了该平台的系统方案及其工作原理,并对总线-功能模型接口的算法进行了说明。采用该平台,保证了多款维护更新芯片的软硬件兼容性,最终产品上市时间平均缩短3个月。
{"title":"A hardware/software co-verification platform for ASIC design","authors":"Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang","doi":"10.1109/ICACIA.2009.5361068","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361068","url":null,"abstract":"This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of FII-based Image Retrieval Engine 基于fii的图像检索引擎实现
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361084
Tan Hao, Chen Yu, Q. Hang
An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.
提出了一种图像特征倒排索引(FII)方法。在此基础上,实现了基于内容的图像检索引擎原型Eva。从用户图片中提取形状和纹理特征,用FII方法检索相似图片。分析了FII的效率。
{"title":"Implementation of FII-based Image Retrieval Engine","authors":"Tan Hao, Chen Yu, Q. Hang","doi":"10.1109/ICACIA.2009.5361084","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361084","url":null,"abstract":"An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cache replacement strategy for streaming media based on semantic mining 基于语义挖掘的流媒体缓存替换策略
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361078
Ling Xing, Jianguo Ma, Hong Cheng
In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.
为了处理复杂的网络视频数据,重点研究了流媒体的多层语义挖掘和代理缓存技术。提出了基于网络参数的语义挖掘方法。引入二次回归流行度预测模型对当前流媒体流行度进行分析。然后设计了基于语义挖掘的缓存替换策略。仿真结果表明了该缓存替换策略的可行性和有效性。
{"title":"Cache replacement strategy for streaming media based on semantic mining","authors":"Ling Xing, Jianguo Ma, Hong Cheng","doi":"10.1109/ICACIA.2009.5361078","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361078","url":null,"abstract":"In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution 基于DCT系数分布的H.264全零系数早期检测
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361088
Haotian Yang, Yuanjun Huang, Jie Li
Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.
基于离散余弦变换(DCT)系数分布,提出了一种有效的H.264中离散余弦系数全零块的早期检测方法。基于离散余弦变换系数的拉普拉斯分布,建立了离散余弦变换系数的数学模型,并推导了每个量化系数为零的判据。仿真结果表明,对于中低比特率的视频序列,与基于高斯分布的Xie方法相比,该方法在不降低视频质量的前提下平均缩短了编码时间。
{"title":"Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution","authors":"Haotian Yang, Yuanjun Huang, Jie Li","doi":"10.1109/ICACIA.2009.5361088","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361088","url":null,"abstract":"Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121215068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of group users' interests in audio/video programs in network backbone environment 网络骨干环境下群用户对音视频节目的兴趣分析
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361075
Qiang Ma, Ling Xing, Jianguo Ma
Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.
不同于基于日志文件的用户兴趣分析方法,本文提出的音频/视频节目组用户兴趣分析方法致力于处理来自网络骨干网环境的数据包。该方法采用Key-Value策略从网络数据包中提取信息。同时,提出了相应的数学模型来计算群用户的交叉利益和统一利益。结果表明,该方法能较好地分析群组用户的兴趣。
{"title":"Analysis of group users' interests in audio/video programs in network backbone environment","authors":"Qiang Ma, Ling Xing, Jianguo Ma","doi":"10.1109/ICACIA.2009.5361075","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361075","url":null,"abstract":"Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of a remote user authentication scheme based on bilinear pairing 基于双线性配对的远程用户认证方案的密码分析
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361150
Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li
Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.
远程用户身份验证方案是一种允许服务器通过不安全通道对远程用户进行身份验证的机制。最近,Goriparthi等人在Das等人使用双线性对的远程用户认证方案的基础上进行了改进。该方案具有无验证表、密码可自由更改、防止伪造攻击和重放攻击等优点。然而,本文证明了Goriparthi等人的改进方案容易受到内部攻击、拒绝服务攻击和服务器假脱机攻击的攻击。
{"title":"Cryptanalysis of a remote user authentication scheme based on bilinear pairing","authors":"Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li","doi":"10.1109/ICACIA.2009.5361150","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361150","url":null,"abstract":"Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An authenticated Mobile IPv6 Fast Handover scenario 经过认证的移动IPv6快速切换场景
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361105
Hongzhi Xing, Changyuan Luo, Hailin Li
Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.
移动IPv6允许移动节点在改变其接入路由器时保持与互联网的连接。由于链路切换和IP操作,移动节点会有一段时间无法收发报文。移动IPv6快速切换协议缩短了“切换延迟”。但是,在切换之后,移动节点必须通过身份验证,在此期间它仍然无法与相应节点通信。本文档描述了一个结合移动IPv6快速切换和认证过程的场景。该场景减少了综合延迟,为快速切换带来了安全性。
{"title":"An authenticated Mobile IPv6 Fast Handover scenario","authors":"Hongzhi Xing, Changyuan Luo, Hailin Li","doi":"10.1109/ICACIA.2009.5361105","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361105","url":null,"abstract":"Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research on transaction system based on mainframe 基于大型机的事务处理系统研究
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361064
Qin Li, Di Liu
In order to make all get the benefits of health care system, we need one platform which can hold very large scale data for all participation. And this platform is non-none other than IBM Z900 mainframe server system, DB2 Large-scale relational database and CICS transaction middleware. As the lowest bottom of all system dealing data, we store all concerned data through DB2 large-scale relational database which is at the mainframe. We also deal with data for program which concern many table data through the storage procedures of mainframe; of course, if the data is little, for example the small transaction-participation user medical clinic or medication card transactions, we use the CICS transaction middleware in the mainframe. The paper firstly introduces the background of system design, purpose and design goals. Following this, it mainly states system requirements, running environments, system structure, basic design concepts, functionality and system security precautions. The last gives the summary of this paper.
为了使所有人都能从医疗保健系统中受益,我们需要一个能够容纳所有人参与的大规模数据的平台。该平台由IBM Z900大型机服务器系统、DB2大型关系数据库和CICS事务中间件组成。作为所有系统处理数据的最底层,我们通过位于大型机的DB2大型关系数据库来存储所有相关数据。通过主机的存储过程对涉及到大量表数据的程序进行数据处理;当然,如果数据很少,例如少量的事务参与用户医疗诊所或药物卡事务,我们将在大型机中使用CICS事务中间件。论文首先介绍了系统设计的背景、目的和设计目标。接下来主要阐述了系统需求、运行环境、系统结构、基本设计理念、功能和系统安全注意事项。最后对全文进行了总结。
{"title":"The research on transaction system based on mainframe","authors":"Qin Li, Di Liu","doi":"10.1109/ICACIA.2009.5361064","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361064","url":null,"abstract":"In order to make all get the benefits of health care system, we need one platform which can hold very large scale data for all participation. And this platform is non-none other than IBM Z900 mainframe server system, DB2 Large-scale relational database and CICS transaction middleware. As the lowest bottom of all system dealing data, we store all concerned data through DB2 large-scale relational database which is at the mainframe. We also deal with data for program which concern many table data through the storage procedures of mainframe; of course, if the data is little, for example the small transaction-participation user medical clinic or medication card transactions, we use the CICS transaction middleware in the mainframe. The paper firstly introduces the background of system design, purpose and design goals. Following this, it mainly states system requirements, running environments, system structure, basic design concepts, functionality and system security precautions. The last gives the summary of this paper.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123477223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust person identification with face and iris by modified PUM method 基于改进PUM方法的人脸和虹膜鲁棒识别
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361089
Jie Lin, Jianping Li, Hui Lin, J. Ming
In previous works, we have applied the modified PUM method in face recognition and demonstrated the effectiveness of this method for deal with partial occlusion and distortion. Based on the similitude between the face features and iris features, this paper proposes a new method for person recognition by the combining of iris and face. This new method combines the iris and face features as a new feature for representing persons and then acts the modified PUM on the new features for recognition. Generally, the iris features, however, is more reliable than the face features. Hence the iris feature should be given a higher weight. For this, this paper further improves the method to form a better strategy for combining the face and iris on recognition. The new improved approach has been evaluated on combined-face and iris databases, using face testing images subjected to various types of partial distortion and occlusion. The new system has demonstrated improved performance over other systems.
在之前的工作中,我们已经将改进的PUM方法应用于人脸识别,并证明了该方法处理部分遮挡和失真的有效性。基于人脸特征与虹膜特征的相似性,提出了一种虹膜与人脸相结合的人脸识别新方法。该方法将虹膜特征和人脸特征结合起来作为代表人物的新特征,然后对新特征进行改进后的PUM进行识别。一般来说,虹膜特征比面部特征更可靠。因此,虹膜特征应该被赋予更高的权重。为此,本文进一步改进了该方法,形成了更好的人脸与虹膜相结合的识别策略。利用不同类型的部分失真和遮挡的人脸测试图像,在组合人脸和虹膜数据库上对改进后的方法进行了评估。新系统的性能优于其他系统。
{"title":"Robust person identification with face and iris by modified PUM method","authors":"Jie Lin, Jianping Li, Hui Lin, J. Ming","doi":"10.1109/ICACIA.2009.5361089","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361089","url":null,"abstract":"In previous works, we have applied the modified PUM method in face recognition and demonstrated the effectiveness of this method for deal with partial occlusion and distortion. Based on the similitude between the face features and iris features, this paper proposes a new method for person recognition by the combining of iris and face. This new method combines the iris and face features as a new feature for representing persons and then acts the modified PUM on the new features for recognition. Generally, the iris features, however, is more reliable than the face features. Hence the iris feature should be given a higher weight. For this, this paper further improves the method to form a better strategy for combining the face and iris on recognition. The new improved approach has been evaluated on combined-face and iris databases, using face testing images subjected to various types of partial distortion and occlusion. The new system has demonstrated improved performance over other systems.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2009 International Conference on Apperceiving Computing and Intelligence Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1