Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single...Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single classifier learn much of occluding background information which results in the decrease of tracking performance, and eventually lead to the failure of the tracking algorithm. This paper presents a new correlative classifiers approach to address the above problem. Our idea is to derive a group of correlative classifiers based on sample set method. Then we propose strategy to establish the classifiers and to query the suitable classifiers for the next frame tracking. In order to deal with nonlinear problem, particle filter is adopted and integrated with sample set method. For choosing the target from candidate particles, we define a similarity measurement between particles and sample set. The proposed sample set method includes the following steps. First, we cropped positive samples set around the target and negative samples set far away from the target. Second, we extracted average Haar-like feature from these samples and calculate their statistical characteristic which represents the target model. Third, we define the similarity measurement based on the statistical characteristic of these two sets to judge the similarity between candidate particles and target model. Finally, we choose the largest similarity score particle as the target in the new frame. A number of experiments show the robustness and efficiency of the proposed approach when compared with other state-of-the-art trackers.展开更多
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security.It proposes a new mechanism based on similar clouds watermark and gives the concep...This paper studies the digit watermark technology of numeric attributes in relational database for database's information security.It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds.The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described.The mechanism can effectively and broadly scatter the watermark in the database;therefore the watermark is very robust.展开更多
We introduced the work on parallel problem solvers from physics and biology being developed by the research team at the State Key Laboratory of Software Engineering,Wuhan University.Results on parallel solvers include...We introduced the work on parallel problem solvers from physics and biology being developed by the research team at the State Key Laboratory of Software Engineering,Wuhan University.Results on parallel solvers include the following areas:Evolutionary algorithms based on imitating the evolution processes of nature for parallel problem solving,especially for parallel optimization and model-building;Asynchronous parallel algorithms based on domain decomposition which are inspired by physical analogies such as elastic relaxation process and annealing process,for scientific computations,especially for solving nonlinear mathematical physics problems.All these algorithms have the following common characteristics:inherent parallelism,self-adaptation and self-organization,because the basic ideas of these solvers are from imitating the natural evolutionary processes.展开更多
Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture fo...Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs.展开更多
We combine the web usage mining and fuzzy clustering and give the concept of web fuzzy clustering,and then put forward the web fuzzy clustering processing model which is discussed in detail.Web fuzzy clustering can be...We combine the web usage mining and fuzzy clustering and give the concept of web fuzzy clustering,and then put forward the web fuzzy clustering processing model which is discussed in detail.Web fuzzy clustering can be used in the web users clustering and web pages clustering.In the end,a case study is given and the result has proved the feasibility of using web fuzzy clustering in web pages clustering.展开更多
An accurate and broad-band method for hetero-junction bipolar transistors(HBT)small-signal model parameters-extraction is presented in this paper.An equivalent circuit forthe HBT under a forward-bias condition is prop...An accurate and broad-band method for hetero-junction bipolar transistors(HBT)small-signal model parameters-extraction is presented in this paper.An equivalent circuit forthe HBT under a forward-bias condition is proposed for extraction of accessresistance and parasiticinductance.This method differs from previous ones by extracting the c-quivalent circuit parameterswithout using special test structure or global numerical optimization techniques.The mainadvantage of this method is that a unique and physically meaningful set of intrinsic parameters isextracted from impedance and admittance representation of the measured S-pa-rameters in thefrequency range of 1-12 GHz under different bias conditions.The method yields a deviation of lessthan 5%between measured and modeled S-parameters.展开更多
基金supported by the National Science Foundation of China(61472289)National Key Research and Development Project(2016YFC0106305)The Key Technology R&D Program of Hubei Provence(2014BAA153)
文摘Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single classifier learn much of occluding background information which results in the decrease of tracking performance, and eventually lead to the failure of the tracking algorithm. This paper presents a new correlative classifiers approach to address the above problem. Our idea is to derive a group of correlative classifiers based on sample set method. Then we propose strategy to establish the classifiers and to query the suitable classifiers for the next frame tracking. In order to deal with nonlinear problem, particle filter is adopted and integrated with sample set method. For choosing the target from candidate particles, we define a similarity measurement between particles and sample set. The proposed sample set method includes the following steps. First, we cropped positive samples set around the target and negative samples set far away from the target. Second, we extracted average Haar-like feature from these samples and calculate their statistical characteristic which represents the target model. Third, we define the similarity measurement based on the statistical characteristic of these two sets to judge the similarity between candidate particles and target model. Finally, we choose the largest similarity score particle as the target in the new frame. A number of experiments show the robustness and efficiency of the proposed approach when compared with other state-of-the-art trackers.
基金Supported by the National Natural Science Foun dation of China(60273072)863 Hi-technique Research(2002A A4Z3450)
文摘This paper studies the digit watermark technology of numeric attributes in relational database for database's information security.It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds.The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described.The mechanism can effectively and broadly scatter the watermark in the database;therefore the watermark is very robust.
基金Supported by the National Natural Science Foundation of China(No.60133010,No.70071042,No.60073043)National Laboratory for Parallel and Distributed Processing
文摘We introduced the work on parallel problem solvers from physics and biology being developed by the research team at the State Key Laboratory of Software Engineering,Wuhan University.Results on parallel solvers include the following areas:Evolutionary algorithms based on imitating the evolution processes of nature for parallel problem solving,especially for parallel optimization and model-building;Asynchronous parallel algorithms based on domain decomposition which are inspired by physical analogies such as elastic relaxation process and annealing process,for scientific computations,especially for solving nonlinear mathematical physics problems.All these algorithms have the following common characteristics:inherent parallelism,self-adaptation and self-organization,because the basic ideas of these solvers are from imitating the natural evolutionary processes.
基金Supported by the National Natural Science Foundation of China(61170026)
文摘Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs.
基金Supported by the National Natural Science Foundation of China(90104005)
文摘We combine the web usage mining and fuzzy clustering and give the concept of web fuzzy clustering,and then put forward the web fuzzy clustering processing model which is discussed in detail.Web fuzzy clustering can be used in the web users clustering and web pages clustering.In the end,a case study is given and the result has proved the feasibility of using web fuzzy clustering in web pages clustering.
基金Supported by the National Natural Science Foun dation of China(60444004)the AM Foundation of Shanghai Mu nicipal Science and Technology Commission of China(0109)
文摘An accurate and broad-band method for hetero-junction bipolar transistors(HBT)small-signal model parameters-extraction is presented in this paper.An equivalent circuit forthe HBT under a forward-bias condition is proposed for extraction of accessresistance and parasiticinductance.This method differs from previous ones by extracting the c-quivalent circuit parameterswithout using special test structure or global numerical optimization techniques.The mainadvantage of this method is that a unique and physically meaningful set of intrinsic parameters isextracted from impedance and admittance representation of the measured S-pa-rameters in thefrequency range of 1-12 GHz under different bias conditions.The method yields a deviation of lessthan 5%between measured and modeled S-parameters.