Abstract—In video surveillance, detection of moving objects from an image sequence is very important for target tracking, activity recognition, and behavior understanding. Background subtraction is a very popular approach for foreground segmentation
In this study we propose a method for feature selection and iterative classifier training based on Support Vector Machines (SVM) with linear kernels. We explore how this and other feature selection methods can be used to make tradeoffs between the a
abstract: We consider the problem of broadcasting in an ad hoc wireless network, where all nodes of the network are sources that want to transmit information to all other nodes. Our figure of merit is energy efficiency, a critical design parameter f
介绍Topographic ICA原理 In ordinary independent component analysis, the components are assumed to be completely independent, and they do not necessarily have any meaningful order relationships. In practice, however, the estimated “independent” component
Computer users with visual impairment cannot access the rich graphical contents in print or digital media unless relying on visual-to-tactile conversion, which is done primarily by human specialists. Automated approaches to this conversion are an em
Stanford iPhone Application Development Course 史丹福iPhone開發教程資料彙整分享. First Assignment • First assignment handed out today, 2 parts • Intended to get you situated with tools and start off with Obj-C • Includes a comprehensive walkthrough • We suggest
In this paper, we propose a DWT-based video watermarking algorithm applying DS-CDMA (Direct Sequence Code Division Multiple Access). We use improved Gold sequences to encode the watermark. The CDMA encoded watermark is embedded into the lowest frequ
In this paper, we investigate and propose efficient methods for transcoding H.263 video to H.264/AVC standard by exploiting the new coding features. Specifically, the proposed methods aim to reduce the computational complexity while maintaining acce
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The worksho
The main goal of vehicle navigation systems is to determine the optimal routing path for achieving the least travel time and exhausted gasoline. Most navigation systems use the static shortest path routing algorithm or use optional traffic informati
This book offers a relatively large overview of modeling families which exist in spatial analysis and of the different mindsets that went into them. Models presented are related to space organization principles, localization logic, the form of spati
一篇关于蛋白质组的综述! Bioinformatics tools for proteomics, also called proteome informatics tools, span today a large panel of very diverse applications ranging from simple tools to compare protein amino acid compositions to sophisticated software for large-
If we desire to understand games and game design, we must first clearly establish our fundamental orientation. We must define what we mean by the word “game.” We must also determine the fundamental characteristics of all games. After discussing some
Global System for Mobile communication (GSM) is a widely accepted standard for digital cellular communication. It has become the mobile communication standard in more than 160 countries all over the globe. In this paper, we are interested in modelin
In this paper, we propose a novel simple but empirically very consistent stochastic model for stock price dynamics and option pricing, which not only has the same ana- lyticity as log-normal and Black-Scholes model, but can also capture and explain
As multi-core architectures flourish in the marketplace, multi-application workload scenarios (such as server consolidation) are growing rapidly. When running multiple applications simultaneously on a platform, it has been shown that contention for
In recent years, the technology of cloud computing has been widely applied in e-business, e-education and etc.. Cloud computing platform is a set of Scalable large-scale data server clusters, it provide computing and storage services to customers. T
The topology of wireless sensor networks (WSNs) can be controlled through changing the transmission power of each node. We propose an adaptive energy efficient topology (AEET) algorithm where each node adaptively adjusts its transmission radius by l
Abstract—It is very necessary and meaningful to carry out research aiming at fatigue driving detection method. However, the accuracy and robustness of detecting driver fatigue still can not meet the need of practice. First, this paper researches the
Logon on HN1/Q2U using SALESPRO role, Sales Cycle -> Sales Order Search -> Edit List in Items AB -> More -> Propose Items from Listings (please see CRM_PT_SALES_Product_Proposal.xls for detail steps)
After clicked Propose Items from List