期刊文献+
共找到132篇文章
< 1 2 7 >
每页显示 20 50 100
A Comprehensive Survey of Deep Learning for Authentication in Vehicular Communication
1
作者 Tarak Nandy Sananda Bhattacharyya 《Computers, Materials & Continua》 2025年第10期181-219,共39页
In the rapidly evolving landscape of intelligent transportation systems,the security and authenticity of vehicular communication have emerged as critical challenges.As vehicles become increasingly interconnected,the n... In the rapidly evolving landscape of intelligent transportation systems,the security and authenticity of vehicular communication have emerged as critical challenges.As vehicles become increasingly interconnected,the need for robust authentication mechanisms to safeguard against cyber threats and ensure trust in an autonomous ecosystem becomes essential.On the other hand,using intelligence in the authentication system is a significant attraction.While existing surveys broadly address vehicular security,a critical gap remains in the systematic exploration of Deep Learning(DL)-based authentication methods tailored to these communication paradigms.This survey fills that gap by offering a comprehensive analysis of DL techniques—including supervised,unsupervised,reinforcement,and hybrid learning—for vehicular authentication.This survey highlights novel contributions,such as a taxonomy of DL-driven authentication protocols,real-world case studies,and a critical evaluation of scalability and privacy-preserving techniques.Additionally,this paper identifies unresolved challenges,such as adversarial resilience and real-time processing constraints,and proposes actionable future directions,including lightweight model optimization and blockchain integration.By grounding the discussion in concrete applications,such as biometric authentication for driver safety and adaptive key management for infrastructure security,this survey bridges theoretical advancements with practical deployment needs,offering a roadmap for next-generation secure intelligent vehicular ecosystems for the modern world. 展开更多
关键词 Intelligent transportation systems connected vehicles CYBERSECURITY deep learning AUTHENTICATION
在线阅读 下载PDF
Multidimensional image morphing-fast image-based rendering of open 3D and VR environments
2
作者 Simon SEIBT Bastian KUTH +2 位作者 Bartosz von Rymon LIPINSKI Thomas CHANG Marc Erich LATOSCHIK 《虚拟现实与智能硬件(中英文)》 2025年第2期155-172,共18页
Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and entertainment.However,achieving a balance b... Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and entertainment.However,achieving a balance between the quality and efficiency of high-performance 3D applications and virtual reality(VR)remains challenging.Methods This study addresses this issue by revisiting and extending view interpolation for image-based rendering(IBR),which enables the exploration of spacious open environments in 3D and VR.Therefore,we introduce multimorphing,a novel rendering method based on the spatial data structure of 2D image patches,called the image graph.Using this approach,novel views can be rendered with up to six degrees of freedom using only a sparse set of views.The rendering process does not require 3D reconstruction of the geometry or per-pixel depth information,and all relevant data for the output are extracted from the local morphing cells of the image graph.The detection of parallax image regions during preprocessing reduces rendering artifacts by extrapolating image patches from adjacent cells in real-time.In addition,a GPU-based solution was presented to resolve exposure inconsistencies within a dataset,enabling seamless transitions of brightness when moving between areas with varying light intensities.Results Experiments on multiple real-world and synthetic scenes demonstrate that the presented method achieves high"VR-compatible"frame rates,even on mid-range and legacy hardware,respectively.While achieving adequate visual quality even for sparse datasets,it outperforms other IBR and current neural rendering approaches.Conclusions Using the correspondence-based decomposition of input images into morphing cells of 2D image patches,multidimensional image morphing provides high-performance novel view generation,supporting open 3D and VR environments.Nevertheless,the handling of morphing artifacts in the parallax image regions remains a topic for future research. 展开更多
关键词 Computer graphics 3D real-time rendering Computer vision Image morphing Virtual reality
在线阅读 下载PDF
A Spectrum Allocation and Security-Sensitive Task Offloading Algorithm in MEC Using DVS
3
作者 Xianwei Li Bo Wei +3 位作者 Xiaoying Yang Amr Tolba Zijian Zeng Osama Alfarraj 《Computers, Materials & Continua》 2025年第11期3437-3455,共19页
With the advancements of the next-generation communication networking and Internet ofThings(IoT)technologies,a variety of computation-intensive applications(e.g.,autonomous driving and face recognition)have emerged.Th... With the advancements of the next-generation communication networking and Internet ofThings(IoT)technologies,a variety of computation-intensive applications(e.g.,autonomous driving and face recognition)have emerged.The execution of these IoT applications demands a lot of computing resources.Nevertheless,terminal devices(TDs)usually do not have sufficient computing resources to process these applications.Offloading IoT applications to be processed by mobile edge computing(MEC)servers with more computing resources provides a promising way to address this issue.While a significant number of works have studied task offloading,only a few of them have considered the security issue.This study investigates the problem of spectrum allocation and security-sensitive task offloading in an MEC system.Dynamic voltage scaling(DVS)technology is applied by TDs to reduce energy consumption and computing time.To guarantee data security during task offloading,we use AES cryptographic technique.The studied problem is formulated as an optimization problem and solved by our proposed efficient offloading scheme.The simulation results show that the proposed scheme can reduce system cost while guaranteeing data security. 展开更多
关键词 IoT DVS MEC AES
在线阅读 下载PDF
Arrangement of the computer code for the prediction of forest fire spread
4
作者 A.I.Karpov V.K.Bulgakov +1 位作者 S.V.Popovich H.P.Telitsyn 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第S1期134-137,共4页
The computer code for the prediction of forest fire behavior is presented. Basic concept of the study is a combined approach to the problem, including the original formulation of fire spread mathematical model, classi... The computer code for the prediction of forest fire behavior is presented. Basic concept of the study is a combined approach to the problem, including the original formulation of fire spread mathematical model, classification of natural fuels, processing of the forest inventory data and programming output of fire simulation code which is compatible with commonly used geographic information system. 展开更多
关键词 FOREST FIRE COMPUTER SIMULATION
在线阅读 下载PDF
Effects of triggers of senescence and senolysis in murine pancreatic cancer cells
5
作者 Denis Revskij Aline Woitas +5 位作者 Bianca Kölle Camilla Umstätter Dietmar Zechner Faiz M Khan Georg Fuellen Robert Jaster 《Hepatobiliary & Pancreatic Diseases International》 SCIE CAS CSCD 2024年第6期628-637,共10页
Background:The combination of senescence triggers with senolytic drugs is considered a promising new approach to cancer therapy.Here,we studied the efficacy of the genotoxic agent etoposide(Eto)and irradiation in indu... Background:The combination of senescence triggers with senolytic drugs is considered a promising new approach to cancer therapy.Here,we studied the efficacy of the genotoxic agent etoposide(Eto)and irradiation in inducing senescence of Panc02 pancreatic cancer cells,and the capability of the Bcl-2 inhibitor navitoclax(ABT-263;Nav)to trigger senolysis.Methods:Panc02 cells were treated with Eto or irradiated with 5–20 Gy before exposure to Nav.Cell survival,proliferation,and senescence were assessed by trypan blue staining,quantification of DNA synthesis,and staining of senescence-associatedβ-galactosidase(SA-β-Gal)-positive cells,respectively.Levels of mRNA were determined by real-time polymerase chain reaction,and protein expression was analyzed by immunoblotting.Panc02 cells were also grown as pancreatic tumors in mice,which were subsequently treated with Eto and Nav.Results:Eto and irradiation had an antiproliferative effect on Panc02 cells that was significantly or tendentially enhanced by Nav.In vivo,Eto and Nav together,but not Eto alone,significantly reduced the proportion of proliferating cells.The expression of the senescence markerγH2AX and tumor infiltration with T-cells were not affected by the treatment.In vitro,almost all Eto-exposed cells and a significant proportion of cells irradiated with 20 Gy were SA-β-Gal-positive.Application of Nav reduced the percentage of SA-β-Gal-positive cells after irradiation but not after pretreatment with Eto.In response to triggers of senescence,cultured Panc02 cells showed increased protein levels ofγH2AX and the autophagy marker LC3B-II,and higher mRNA levels of Cdkn1a,Mdm2,and PAI-1,while the effects of Nav were variable.Conclusions:In vitro and in vivo,the combination of senescence triggers with Nav inhibited tumor cell growth more effectively than the triggers alone.Our data also provide some evidence for senolytic effects of Nav in vitro. 展开更多
关键词 Pancreatic cancer Panc02 cells ETOPOSIDE IRRADIATION Navitoclax
暂未订购
Set Stabilization of Large-Scale Stochastic Boolean Networks:A Distributed Control Strategy
6
作者 Lin Lin Jinde Cao +1 位作者 Jianquan Lu Leszek Rutkowski 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期806-808,共3页
Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fr... Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fraction of agents. 展开更多
关键词 BOOLEAN STABILIZATION LETTER
在线阅读 下载PDF
Cerebral cortex contributions to Parkinson's disease tremor:what exactly generates the tremor?
7
作者 Manuel Bange Hao Ding Muthuraman Muthuraman 《Neural Regeneration Research》 2025年第12期3535-3536,共2页
Pathological tremor is one of the cardinal symptoms in Parkinson's disease (PD).Tremor is comprised of involuntary,rhythmic,a nd oscillating movements that can vary according to the circumstances under which they ... Pathological tremor is one of the cardinal symptoms in Parkinson's disease (PD).Tremor is comprised of involuntary,rhythmic,a nd oscillating movements that can vary according to the circumstances under which they occur,the body parts that are involved,and the frequency at which they present.For example,tremors can be mild to severe,are stress sensitive,and can affect arms,legs,or the head (Dirkx and Bologna,2022). 展开更多
关键词 TREMOR CORTEX EXACTLY
暂未订购
A Flexible Exponential Log-Logistic Distribution for Modeling Complex Failure Behaviors in Reliability and Engineering Data
8
作者 Hadeel Al Qadi Fatimah M.Alghamdi +2 位作者 Hamada H.Hassan Mohamed E.Mead Ahmed Z.Afify 《Computer Modeling in Engineering & Sciences》 2025年第8期2029-2061,共33页
Parametric survival models are essential for analyzing time-to-event data in fields such as engineering and biomedicine.While the log-logistic distribution is popular for its simplicity and closed-form expressions,it ... Parametric survival models are essential for analyzing time-to-event data in fields such as engineering and biomedicine.While the log-logistic distribution is popular for its simplicity and closed-form expressions,it often lacks the flexibility needed to capture complex hazard patterns.In this article,we propose a novel extension of the classical log-logistic distribution,termed the new exponential log-logistic(NExLL)distribution,designed to provide enhanced flexibility in modeling time-to-event data with complex failure behaviors.The NExLL model incorporates a new exponential generator to expand the shape adaptability of the baseline log-logistic distribution,allowing it to capture a wide range of hazard rate shapes,including increasing,decreasing,J-shaped,reversed J-shaped,modified bathtub,and unimodal forms.A key feature of the NExLL distribution is its formulation as a mixture of log-logistic densities,offering both symmetric and asymmetric patterns suitable for diverse real-world reliability scenarios.We establish several theoretical properties of the model,including closed-form expressions for its probability density function,cumulative distribution function,moments,hazard rate function,and quantiles.Parameter estimation is performed using seven classical estimation techniques,with extensive Monte Carlo simulations used to evaluate and compare their performance under various conditions.The practical utility and flexibility of the proposed model are illustrated using two real-world datasets from reliability and engineering applications,where the NExLL model demonstrates superior fit and predictive performance compared to existing log-logistic-basedmodels.This contribution advances the toolbox of parametric survivalmodels,offering a robust alternative formodeling complex aging and failure patterns in reliability,engineering,and other applied domains. 展开更多
关键词 Failure rate new exponential class log-logistic distribution maximum likelihood order statistics reallife data analysis
在线阅读 下载PDF
A review of remote sensing applications for oil palm studies 被引量:3
9
作者 Khai Loong Chong Kasturi Devi Kanniah +1 位作者 Christine Pohl Kian Pang Tan 《Geo-Spatial Information Science》 SCIE EI CSCD 2017年第2期184-200,共17页
Oil palm becomes an increasingly important source of vegetable oil for its production exceeds soybean,sunflower,and rapeseed.The growth of the oil palm industry causes degradation to the environment,especially when th... Oil palm becomes an increasingly important source of vegetable oil for its production exceeds soybean,sunflower,and rapeseed.The growth of the oil palm industry causes degradation to the environment,especially when the expansion of plantations goes uncontrolled.Remote sensing is a useful tool to monitor the development of oil palm plantations.In order to promote the use of remote sensing in the oil palm industry to support their drive for sustainability,this paper provides an understanding toward the use of remote sensing and its applications to oil palm plantation monitoring.In addition,the existing knowledge gaps are identified and recommendations for further research are given. 展开更多
关键词 Oil palm remote sensing MONITORING AGRICULTURE MAPPING SUSTAINABILITY
原文传递
CONVERGENCE OF ISHIKAWA TYPE ITERATIVE SEQUENCE WITH ERRORS FOR QUASI-CONTRACTIVE MAPPINGS IN CONVEX METRIC SPACES 被引量:3
10
作者 TIAN You-xian(田有先) +1 位作者 ZHANG Shi-sheng(张石生) 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2002年第9期1001-1008,共8页
Some convergence theorems of Ishikawa type iterative sequence with errors for nonlinear general quasi-contractive mapping in convex metric spaces are proved. The results not only extend and improve the corresponding r... Some convergence theorems of Ishikawa type iterative sequence with errors for nonlinear general quasi-contractive mapping in convex metric spaces are proved. The results not only extend and improve the corresponding results of L. B. Ciric, Q. H. Liu, H. E. Rhoades and H. K. Xu, et al., but also give an affirmative answer to the open question of Rhoades-Naimpally- Singh in convex metric spaces. 展开更多
关键词 convex metric space fixed point generalized Ishikawa (Mann) iterative sequence with errors general quasi-contractive mapping
在线阅读 下载PDF
Patient and physician perception of natural orifice transluminal endoscopic appendectomy 被引量:2
11
作者 Tomas Hucl Adela Saglova +4 位作者 Marek Benes Matej Kocik Martin Oliverius Zdenek Valenta Julius Spicak 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第15期1800-1805,共6页
AIM:To investigate perception of natural orifice transluminal endoscopic surgery(NOTES)as a potential technique for appendectomy.METHODS:One hundred patients undergoing endoscopy and 100 physicians were given a questi... AIM:To investigate perception of natural orifice transluminal endoscopic surgery(NOTES)as a potential technique for appendectomy.METHODS:One hundred patients undergoing endoscopy and 100 physicians were given a questionnaire describing in detail the techniques of NOTES and laparoscopic appendectomy.They were asked about the reasons for their preference,choice of orifice,and extent of complication risk they were willing to accept.RESULTS:Fifty patients(50%)and only 21 physicians(21%)preferred NOTES(P<0.001).Patients had previously heard of NOTES less frequently(7%vs73%,P<0.001)and had undergone endoscopy more frequently(88%vs 36%,P<0.001)than physicians.Absence of hernia was the most common reason for NOTES preference in physicians(80%vs 44%,P= 0.003),whereas reduced pain was the most common reason in patients(66%vs 52%).Physicians were more likely to refuse NOTES as a novel and unsure technique(P<0.001)and having an increased risk of infection(P<0.001).The preferred access site in both groups was colon followed by stomach,with vagina being rarely preferred.In multivariable modeling,those with high-school education[odds ratio(OR):2.68,95% confidence interval(CI):1.23-5.83]and prior colonoscopy(OR:2.10,95%CI:1.05-4.19)were more likely to prefer NOTES over laparoscopic appendectomy.There was a steep decline in NOTES preference with increased rate of procedural complications.Male patients were more likely to consent to their wives vaginal NOTES appendectomy than male physicians(P=0.02).CONCLUSION:The preference of NOTES for appendectomy was greater in patients than physicians and was related to reduced pain and absence of hernia rather than lack of scarring. 展开更多
关键词 Natural orifice transluminal endoscopic surgery Patient perception Physician perception APPENDECTOMY LAPAROSCOPY
暂未订购
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data 被引量:2
12
作者 Jiaquan Zhang Hui Chen +1 位作者 Xiaoming Yao Xiaoming Fu 《Digital Communications and Networks》 SCIE CSCD 2022年第3期324-332,共9页
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as ... Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively. 展开更多
关键词 Mobile big data Profession prediction Machine learning CLASSIFICATION Privacy protection
在线阅读 下载PDF
Cryptanalysis and improvement of controlled secure direct communication 被引量:2
13
作者 Kao Shih-Hung Hwang Tzonelih 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期203-205,共3页
This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal ... This paper points out that, due to a flaw in the sender's encoding, the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin. Phys. 14 (2005), No. 5, p. 893] can reveal the whole secret message without permission from the controller. An improvement is proposed to avoid this flaw. 展开更多
关键词 quantum cryptography quantum communication
原文传递
Dynamics and Stable Control for a Class of Underactuated Mechanical Systems 被引量:1
14
作者 LIU Dian-Tong GUO Wei-Ping YI Jian-Qiang 《自动化学报》 EI CSCD 北大核心 2006年第3期422-427,共6页
The control of underactuated mechanical systems is very complex for the loss of its control inputs. The model of underactuated mechanical systems in a potential field is built with Lagrangian method and its structural... The control of underactuated mechanical systems is very complex for the loss of its control inputs. The model of underactuated mechanical systems in a potential field is built with Lagrangian method and its structural properties are analyzed in detail. A stable control approach is proposed for the class of underactuated mechanical systems. This approach is applied to an underactuated double-pendulum-type overhead crane and the simulation results illustrate the correctness of dynamics analysis and validity of the proposed control algorithm. 展开更多
关键词 动态系统 稳定性控制 机械系统 起重机
在线阅读 下载PDF
Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines 被引量:1
15
作者 Syed Muhammad Saqlain Shah Tahir Afzal Malik +2 位作者 Robina khatoon SyedSaqlain Hassan Faiz Ali Shah 《Computers, Materials & Continua》 SCIE EI 2019年第8期535-553,共19页
Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers.In this paper,we have presented methodology to recognize human behavior in thin crowd which may b... Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers.In this paper,we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance.Research have mostly focused the problem of human detection in thin crowd,overall behavior of the crowd and actions of individuals in video sequences.Vision based Human behavior modeling is a complex task as it involves human detection,tracking,classifying normal and abnormal behavior.The proposed methodology takes input video and applies Gaussian based segmentation technique followed by post processing through presenting hole filling algorithm i.e.,fill hole inside objects algorithm.Human detection is performed by presenting human detection algorithm and then geometrical features from human skeleton are extracted using feature extraction algorithm.The classification task is achieved using binary and multi class support vector machines.The proposed technique is validated through accuracy,precision,recall and F-measure metrics. 展开更多
关键词 Human behavior classification SEGMENTATION human detection support vector machine
在线阅读 下载PDF
A Study of Secure Multi-Party Elementary Function Computation Protocols 被引量:1
16
作者 Wenjun Luo Xiang Li 《通讯和计算机(中英文版)》 2005年第5期32-40,共9页
关键词 安全系统 操作系统 基础功能 计算机设备安全
在线阅读 下载PDF
Statistical Modeling of Energy Production by Photovoltaic Farms 被引量:1
17
作者 M. Brabec E. Pelikan +2 位作者 P. Krc K. Eben P. Musilek 《Journal of Energy and Power Engineering》 2011年第9期785-793,共9页
This paper introduces several alternative statistical approaches to modeling and prediction of electric energy generated by photovoltaic farms. The statistical models use outputs of a numerical weather prediction mode... This paper introduces several alternative statistical approaches to modeling and prediction of electric energy generated by photovoltaic farms. The statistical models use outputs of a numerical weather prediction model as their inputs. Presented statistical models allow for easy-to-compute predictions, both in temporal sense and for out-of-sample individual farms. Model performance is illustrated on a sample of real photovoltaic farms located in the Czech Republic. 展开更多
关键词 Electrical energy solar energy numerical weather prediction model nonparametric regression beta regression.
在线阅读 下载PDF
ON NONLINEAR ELLIPTIC HEMIVARIATIONAL INEQUALITIES OF SECOND ORDER
18
作者 Leszek Gasinski Nikolaos S.Papageorgiou 《Acta Mathematica Scientia》 SCIE CSCD 2004年第3期451-462,共12页
In this paper, a nonlinear hemivariational inequality of second order with a forcing term of subcritical growth is studied. Using techniques from multivalued analysis and the theory of nonlinear operators of monotone ... In this paper, a nonlinear hemivariational inequality of second order with a forcing term of subcritical growth is studied. Using techniques from multivalued analysis and the theory of nonlinear operators of monotone type, an existence theorem for the Dirichlet boundary value problem is proved. 展开更多
关键词 Locally Lipschitz function Clarke subdifferential measurable selection pseudomonotone operator GENERALIZED coercive operator Rayleigh quotient surject operator
在线阅读 下载PDF
Sequential Bag-of-Words model for human action classification 被引量:1
19
作者 Hong Liu Hao Tang +3 位作者 Wei Xiao ZiYi Guo Lu Tian Yuan Gao 《CAAI Transactions on Intelligence Technology》 2016年第2期125-136,共12页
Recently, approaches utilizing spatial-temporal features to form Bag-of-Words (BoWs) models have achieved great success due to their simplicity and effectiveness. But they still have difficulties when distinguishing... Recently, approaches utilizing spatial-temporal features to form Bag-of-Words (BoWs) models have achieved great success due to their simplicity and effectiveness. But they still have difficulties when distinguishing between actions with high inter-ambiguity. The main reason is that they describe actions by orderless bag of features, and ignore the spatial and temporal structure information of visual words. In order to improve classification performance, we present a novel approach called sequential Bag-of-Words. It captures temporal sequential structure by segmenting the entire action into sub-actions. Meanwhile, we pay more attention to the distinguishing parts of an action by classifying sub- actions separately, which is then employed to vote for the final result. Extensive experiments are conducted on challenging datasets and real scenes to evaluate our method. Concretely, we compare our results to some state-of-the-art classification approaches and confirm the advantages of our approach to distinguish similar actions. Results show that our approach is robust and outperforms most existing BoWs based classification approaches, especially on complex datasets with interactive activities, cluttered backgrounds and inter-class action ambiguities. 展开更多
关键词 Action classification Sequential Bag-of-Words STIP Probalibity
在线阅读 下载PDF
A novel algorithm for establishing taxonomic relation of Chinese ontology
20
作者 裴炳镇 陈笑蓉 +1 位作者 胡熠 陆汝占 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第4期520-526,共7页
Both a general domain-independent bottom-up multi-level model and an algorithm for establishing the taxonomic relation of Chinese ontology are proposed.The model consists of extracting domain vocabularies and establis... Both a general domain-independent bottom-up multi-level model and an algorithm for establishing the taxonomic relation of Chinese ontology are proposed.The model consists of extracting domain vocabularies and establishing taxonomic relation,with the consideration of characteristics unique to Chinese natural language.By establishing the semantic forests of domain vocabularies and then using the existing semantic dictionary or machine-readable dictionary(MRD),the proposed algorithm can integrate these semantic forests together to establish the taxonomic relation.Experimental results show that the proposed algorithm is feasible and effective in establishing the integrated taxonomic relation among domain vocabularies and concepts. 展开更多
关键词 CONCEPT VOCABULARY ONTOLOGY taxonomic relation MRD
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部