A model based method of pedestrian abnormal behavior detection in traffic scene
|
|
- Leo Owens
- 7 years ago
- Views:
Transcription
1 A model based method of pedestran abnormal behavor detecton n traffc scene Jang Qanyn 1,2,3, L Guomng 1,2,3, Yu Jnwe 1,2, L Xyng 1,2,3 1. esearch Center of Intellgent Transportaton System, School of Engneerng, Sun Yat-sen Unversty, Guangzhou, Chna 2. Guangdong Provncal Key Laboratory of Intellgent Transportaton System Guangzhou, Chna 3. Key Laboratory of Vdeo and Image Intellgent Analyss and Applcaton Technology of MPS, P.. Chna, Guangzhou, Chna qyjang19@163.com, @qq.com, stslxy@mal.sysu.edu.cn Abstract In order to reduce traffc accdents caused by the pedestran, fve nds of dangerous pedestran abnormal behavors are studed n the paper. A behavor model between the pedestran trajectory and the road s bult to descrbe the fve nds of dangerous pedestran abnormal behavors: crossng road border, llegal stay, crossng the road, movng along the curb, enterng road area. The method contans pedestran detecton, shadow elmnaton, pedestran recognton, pedestran tracng and abnormal behavor detecton. Bacground subtracton method s used to detect movng targets. After shadow elmnaton, pedestrans are dstngushed from vehcles accordng to the rato. Then, pedestran trajectores are gotten by pedestran tracng. Fnally, based on the relaton between trajectory and road, the model of fve nds of pedestran abnormal behavors s establshed, and abnormal behavors are detected accordng ths model. Experments show that the method can dstngush and detect the pedestran abnormal behavorseffectvelynshorttme,andtssutabletousenreal tme traffc montorng. Keywords traffc survellance vdeo; pedestran detecton; pedestran tracng; pedestran abnormal behavor model; pedestran abnormal behavor detecton I. INTODUCTION Traffc accdent problem need to be pad great attenton to n the transport system. The pedestran abnormal behavor s the man cause of the frequent traffc accdents. Therefore, pedestran abnormal behavor detecton attracts wdespread concerns n scholars who launch specal dscussons and researches on ths ssue. In the pedestran behavor detecton researches, the current methods are mostly focused on the followng two categores: the method based on template matchng and the method based on state space transfer. In the researches about the method based on template, movng target moton sequences are analyzed, many moton feature, such as velocty and drecton of movement, are calculated to match the events model. Masoud [1] used nfnte mpulse response flters to descrbe the behavors of pedestrans' goals and projected them onto a feature space, and then measured the smlarty n the vdeo mages between pedestrans and reference templates wth the Hausdorff dstance. Yn Yong [2] used approxmate motons perodc characterstc of human actons to realze the recognton of human behavors. Specfcally, frstly, the bacground dfference method based on Gaussan mxture model was used to detect human targets; then the approxmate perod of human moton was gotten by the changes of the human body shape, the whole body movement sequences were decomposed nto a seres of approxmate moton cycle unts, and the transformaton characterstcs of all movement cycle unts were extracted; fnally, the dynamc tme warpng method was used to determne the dfferent human acton categores. Dong-Gyu Lee [3] proposed a crowd behavor representaton method usng adaptve optcal flow flterng for abnormal behavor detecton and localzaton. Zhcheng Wang and Jun Zhang [4] desgned a fuzzy functon based on body s contour angle movement and proposed Fuzzy Assocatve Memory (FAM) to nfer abnormal behavor. The centrod and fuzzy feature were used to recognze abnormal behavor. The method based on template matchng s easly affected by nose, and more dffcult to buld a unfed template. In the researches about the method based on state space transfer, complex human behavor are decompose to seres smple acton or movement and recognzed wthout model preset. Bregler [5] put forward a comprehensve networ based on the human body dynamcs to recognze the movements of the body. Zhou Ybo and He Xaoha [6] detect human body usng the contour nformaton and extract the posture features by the contour fttng. A behavor classfer based on the normal behavor template s establshed to determne whether a human behavor s normal or not. Zhang Ljun and Wu Xaojuan [7] selected several specal meanng landmar ponts n the montorng mages, used these ponts to decompose complex human behavors nto a seres of smple combnatons of human actons, and created the HMMS model for smple human actons. And then, they used Level - Buldng algorthm wth an approprate threshold model and behavor grammar to dentfy the complex human behavors. Besdes, Bouttefroy [8] ntroduced a method for abnormal behavor detecton by usng contextual nformaton n Marov random felds. Modelng the local densty of object feature vector, they used a Gaussan Marov random feld mxture for abnormal behavor detecton. Shen-Bn Hsu [9] pad attenton to fallng and slppng detecton for pedestrans. They used the detecton algorthm n multple vew-angles, and then constructed the manfold walng models from the tranng samples and fallng or slppng behavor could be detected. The complexty of the method based on the state space transfer s relatvely hgh, and the calculaton process s tme consumng /15/$ IEEE
2 After analyzng the dangerous pedestran behavor n traffc, ths paper manly studes the detecton of fve nds of pedestran abnormal behavors whch are easy to cause traffc accdent n traffc survellance vdeo: pedestran crossng road border, llegal stay, crossng the road, movng along the curb and enterng road area. The aspect rato characterstc s used to dstngush between pedestrans and vehcles n pedestran recognton. The tradtonal tracng method based on features s used n pedestran tracng. In the pedestran behavors' understandng and descrpton, a new pedestran behavor detecton method s proposed based on the behavor model. The model descrbes dfferent characterstcs of the relatons between fve nds of pedestran behavors and road structures were analyzed, ncludng trajectory, dstance of trajectory ponts, angle, and dstance between trajectory and road. II. PEDESTIAN ECOGNITION AND TACKING A. Pedestran Detecton and ecognton Bacground subtracton method s an effectve method for movng target detecton whle the camera s statc. The flowchart of pedestran detecton and recognton s shown n Fg. 1. Where B-1(,j)s the gray value of the old bacground mage n the coordnates (,j), and W(,j) s the gray value of the bacground subtracton bnary mage n the coordnates (,j). The movng targets gotten by bacground subtracton method usually contans shadow whch mpacts on detecton of targets characterstcs such as shapes, contours, edges, thus pedestran detecton processng wll be nfluenced negatvely. It s necessary to elmnate the shadow. Generally, bacground regon covered by shadow causes brghtness change but not hue. Dvdng the bacground subtracton mage by bacground mage shows that the rato of the gray value of shadow regon to the gray value of bacground regon s approxmately fxed but the rato of the gray value of target regon to the gray value of bacground regon changes relatvely larger. Thus, t can be easly dstngushed between shadow regon and target regon. The shadow elmnaton procedures are shown below: 1) Dvde the bacground subtracton mage by bacground mage so that a resultng mage can be obtaned. 2) By usng three pars of gradent operators shown n Fg. 2, calculate the gradent value of each pxel n the resultng mage: g = G1 + G2 (3) Consequently, horzontal gradent value, vertcal gradent value and dagonal gradent value are obtaned. If one of the three drecton gradent value s less than a gven threshold, the pxel belongs to the shadow regon. (a) the frst par (b) the second par (c) the thrd par Fg. 2. Three pars of gradent operators Fg. 1. Pedestran detecton and dentfcaton flowchart The ntal bacground can be gotten by usng medan flterng method: B(,j) =Medan (I(,j)) (150) (1) Where,I(,j) s the gray value of the frstframe mage n the coordnates (,j). In vew of the slow change of the bacground caused by llumnaton, the Surendra method s used to update the bacground [10] n real tme. The core dea of Surendra algorthm s the non-movng areas' bacgrounds of each frame s updated n real tme but not the movng areas' bacgrounds. The prncple can be represented by (2): B (, j)! B 1(, j) ( W (, j) 1) #(1 ) I (, j) B 1(, j) ( W (, j) 0) (2) (a)orgnal target Fg. 3. Shadow elmnaton results (b)orgnal detecton (c) shadow removal (d)rght detecton The results of shadow elmnaton are shown n Fg. 3. Fg. 3(c) shows the result of shadow elmnatng of Fg. 3(a) and t can be seen that the shadow s elmnated effectvely. Fg. 3(b) s the pedestran detecton mage wthout shadow elmnatng. Fg. 3(d) s the pedestran detecton mage performed shadow elmnatng on. The shadow s elmnated n the mage, whch can mprove the pedestran detecton effect. In normal traffc stuatons, the movng targets gotten by bacground subtracton method nclude pedestrans and vehcles, whch accounts for the vast majorty are vehcles. In order to facltate subsequent processng, the movng targets are recognzed to dstngush between pedestrans and vehcles.
3 By comparng pedestrans and vehcles, the aspect rato of them can be seen as a sgnfcant dfference n the shape features, whch are shown n Fg. 4. Target s aspect rato s the rato of ts external rectangle s heght to weght. (a)walng pedestran (b) runnng pedestran (c) car Fg. 4. Targets and ther external rectangle (d) bus In vew of the dfferent expermental vdeos n whch walng pedestrans, runnng pedestrans, cars(small vehcles) and buses(bg vehcles) are respectvely calculated the sequence values of aspect rato, whch are represented as and 4. What TABLE I shows s the numercal dstrbuton of the aspect rato of walng pedestrans and runnng pedestrans. What TABLE shows s the numercal dstrbuton of the aspect rato of small vehcles and large vehcles. TABLE I. Frame Number THE ASPECT ATIO OF WALKING PEDESTIANS AND UNNING PEDESTIANS TABLE II. Frame Number THE ASPECT ATIO OF SMALL VEHICLES AND LAGE VEHICLES Showng the numercal dstrbuton of the aspect rato of walng pedestrans and runnng pedestrans, TABLE I llustrates the aspect rato of walng pedestrans 1 ranges from 2.13 to 3.57, and the rato of runnng pedestrans 2 ranges from 1.93 to Showng the numercal dstrbuton of the aspect rato of small vehcles and large vehcles, TABLE llustrates the aspect rato of small vehcles 3 from 0.74 to 0.88, the rato of large vehcles 4 ranges from 1.08 to So, pedestran and vehcle can be dstngushed by a threshold of aspect rato. B. Pedestran Tracng In order to get the pedestran trajectory, pedestran tracng s requred. Pedestran tracng s manly dvded nto four steps: Frst, loo for pedestran and determne whether the target has been traced. Due to there s no rule where pedestran target wll appear, the detecton area s set as all vdeo mage area. As far as possble to fnd all pedestrans, and to determne whether the appearance of new, all connected doman are scanned from the upper left to the lower rght, and recognzed usng pedestran recognton method. Then the centrod dstance between new target and traced targets s calculated to determne whether a new pedestran s appeared, and record the poston. Second, predct pedestran poston n next frame usng lnear predcton model. Accordng to the pedestran trajectory s contnuty of tme and space and the others characterstcs, for example, slow movement n mage area, a three-pont lnear predcton method s used to estmate the poston of the pedestran n next frame. The lnear predcton model can be descrbed by the followng equaton: ' f 2 f f ( 2,3,, N) (4) 1 1 Where, f +1 represents the target's predctve poston n the +1 th frame, f'-1 represents the target's real poston n the-1 th frame, and f' represents the target's real poston n the th frame; represents predctve model s error parameter, t can be obtaned as:! 0 ( 2) % & d (5) % 3 ( 3, 4,, N) %# 2 d f f ( 3, 4,, N) (6) ' Where, d represents the subtracton between predctve poston and real poston n the th frame target mage. Thrd, match targets usng the cost functon and record trajectory. After the target s poston s obtaned, the cost functon [11] s ntroduced to complete the target matchng. Consderng the targetn the th frame, calculate cost functon value between all canddate targets n the +1 th frame. Cost functon can be represented by the followng equaton: V (, j) D (, j)! H (, j) A (, j) (7) D (, j) ( X X ) ( Y Y ) (8) j j 1 1 j H (, j) G G 1 (9) A (, j) S S (10) j 1 Where, X Y G and S respectvely represent centrod abscssa, centrod ordnate, the average gray value and the area of target n the th frame; D(,j), H(,j) and A(,j) represent the centrod dstance, average gray subtracton and area subtracton between the targetn the th frame and the target j n the +1 th frame;! are emprcal value.
4 Choose target j whch maes cost functon value mnmum from all canddate targets n the +1 th frame predctve area as subsequent target of target n+1 th frame mage, and record the poston of the target j, whch s the coordnate of the center of target j s external rectangle. At last, clear the target nformaton of the pedestran who s left or lost to avod tracng nformaton redundancy. III. PEDESTIAN ABNOMAL BEHAVIO DETECTION A. Pedestran abnormal behavor analyss Ths paper manly dscusses fve nds of abnormal behavors of pedestran, ncludng pedestran crossng road border, llegal stay, crossng the road, movng along the curb, enterng road area. Fg. 5 s a schematc dagram of these fve abnormal behavors where the area wthn the two blac straghts represents the road area. Lne A shows the trajectory of the pedestran crossng the road border. Pont a1 s the startng pont for trajectory of pedestran, and a2 s the current pont for trajectory of pedestran. Lne B shows the trajectory of the pedestrans stayng llegally. Pont b1 s the startng pont for trajectory of pedestran, and b2 s the stop pont for trajectory of pedestran. Lne C shows the trajectory of the pedestran across the road. Pont c1 s the startng pont for trajectory of pedestran, and c2 s the current pont for trajectory of pedestran. Lne D shows the trajectory of pedestran who moves along the curb. Pont d1 s the startng pont for trajectory of pedestran, and the d2 s the current pont for trajectory of pedestran. Lne E shows the trajectory of the pedestran gong nto the road area. Ponte1 s the startng pont for trajectory of pedestran, and the e2 s the current pont for trajectory of pedestran. Fg. 5. Fve nds of abnormal behavor movement dagram (a) ntersecton relaton (b) wthn relaton Fg. 6. Poston relatonshp of pedestran trajectory and road structure Accordng to Fg. 5, there are dfferent characterstcs and relatonshp between the trajectory and road structure of each abnormal behavor, aand they are reflected manly from angle and poston. Thus we can now that the poston and angle relatonshp of pedestran trajectoryy and road structure (border of road), as shown n Fg. 6 and Fg. 7. In the Fg. 6,represents road andprepresents pedestran trajectory. Fg. 6(a) shows that pedestran trajectory ntersects road structure, for example, pedestran crossng road border. Fg. 6(b) shows the poston relatonshp that pedestran trajectory s wthn road structure, such as llegal stay, crossng the road, movng along the curb and enterng road area. Fg. 7. Angle relatonshp of pedestran trajectory and road structure In the Fg. 7, "1" means pedestran trajectory does not form angle wth road structure, for example the trajectory of llegal stay, because of ts statc pedestran trajectory. "2" means pedestran trajectory forms the nearly vertcal angle wth road structure, for example the trajectory of crossng the road. "3" means pedestran trajectory s nearly parallel to road structure, for example the trajectory of movng along curb. "4" means pedestran trajectory forms the others angle relatonshp wth road structure, such as the trajectory of crossng road border and enterng road area, whose angle relatonshp between pedestran trajectory and road structure s not regular. Accordng to the poston and angle relatonshp between pedestran trajectory and road structure, fve nds of pedestran abnormal behavors can be dstngushed. B. Pedestran abnormal behavor modelng There s much nose or some lost on pedestran trajectory obtaned by pedestran tracng because of shelter, error tracng and other reasons. So t s necessary to process the orgnal trajectory [12]. In ths paper, the average flterng method s used to smooth the orgnal pedestran trajectory, as shown n (11), and ts prncple s that an average value s obtaned every 15 frames as pedestran trajectory pont coordnate after average flterng. 15n 14 pn [ ] (& p [ ]) / 15 ( n 0,1 N) (11) 15n 1: No angle value 2: Nearly vertcal 3: Nearly parallel 4: Other angle values Where, p[] represents the orgnal pedestran trajectory pont whch s the center coordnate value of the th pedestran s external rectangle; p[ n] represents the smoothed trajectory pont; n s the number of the pedestran trajectory ponts after average flterng, and there are total N+1 numbers; N s zero or postve nteger. Four pedestran behavor model parameters are defned to descrbe the relatonshp between pedestran trajectory and road structure:
5 1) Trajectory coordnates chan: P ( p[0], p[1],, pn [ ],, p[ N ]) ; 2) Trajectory path chan: D dstance( P) ( d, d,, d,, d ) ; 1 2 Where d represents the dstance of the adjacent two trajectory ponts after average flterng, and the unt s pxel d (( p [ ]. xp[ j]. x) ( p [ ]. yp[ j]. y) ) ( 1, N; j 1) ld 2 3) Angle chan between trajectory and road structure: A angle( P, ) ( a, a,, a,, a ) ; 1 2 N M (12) Where, P represents trajectory coordnate chan and represents the border of road structure. Use lnear fttng method to ft the curve paths nto multple lne segments, and a represents the angle between the th lne segment and road structure, whose value ranges from 0 to ( n radan. a arctan ( ) / (1 ) ( 1,2, M) (13) Where represents the slope of the th lne segment; represents the slope of road structure; M s the number of lne segments by lnear fttng. 4) Dstance chan between trajectory and road structure: LD dstance( P, ) ( ld, ld,, ld,, ld ) 0 1 Where, P represents trajectory coordnate chan and represents the border of road structure; ld represents the dstance between the trajectory pont and the border of road, the unt s pxel; A B C are the parameters for the lnear equaton of road structure border whose lnear equaton expresson s y Ax By C. 2 2 ld ( Ap [ ]. x Bp [ ]. y C) / A B ( 0,1, N) (14) The relatonshp between the trajectory of fve nds of pedestran abnormal behavors and road structure can be quantfed by usng the mathematcal model of fve nds of pedestran abnormal behavors, as shown n TABLE. TABLE III. THE MATHEMATICAL MODEL OF PEDESTIAN ABNOMAL BEHAVIO Pedestrans Abnormal Behavor crossng road border llegal stay crossng the road movng along the curb enterng road area The Mathematcal Model of Pedestran Abnormal Behavor d, 1 ld, 1 Pɳ d, d 2, 0&&P) N a (/2 &&P) ld, ld 2, < Td* &&P) P) * Td s an emprcal dstance parameter. C. Abnormal behavor detecton algorthms TABLE shows that there are obvous dfferences between dfferent nds of pedestran abnormal behavors. Accordng to the mathematcal model of pedestran behavor, Fg. 8 s flow chart of abnormal behavor detecton. Fg. 8. Detecton flow chart of fve nds of pedestran abnormal behavor IV. ESULTS AND ANALYSIS Several survellance vdeos gotten from real Guangzhou traffc montorng system and test vdeos shot n test road are used to detecton pedestran abnormal behavor. All vdeos are 25 fps and frame resoluton s 704*576 pxel and. The program developed by Vsual C++ and OpenCV Beta 4.0. Detecton results are shown n Fg. 9, where border of road are mared by a par of red lnes, and pedestrans are mared by ther external rectangle. Fg. 9(a) shows the detecton result of pedestrans crossng the road border, and ts alarm type s "crossng the road border". Fg. 9(b) shows the detecton result of llegal stay, and ts alarm type s "llegal stay". Fg. 9(c) shows the detecton result of crossng the road, and ts alarm type s "crossng the road". Fg. 9(d) shows the detecton result of movng along the curb, and ts alarm type s "movng along the curb". Fg. 9(e) shows the detecton result of enterng road area, and ts alarm type s "enterng road area". All pedestran tracng are real-tme and the alarm wll ssue after pedestran tracng successful. Correct rate of abnormal behavor detecton # s defned by the rato of the number of alarm(wn) and the number of abnormal behavor (AN) n expermental vdeo: # WN / AN (15) The expermental results are dsplay n TABLE IV. The detecton accuracy of fve nds of pedestran abnormal behavor are more than 85%, and can be detected effectvely. The man reasons affectng the expermental results are: (1) when few pedestrans wal together, t s dffcult to detect each one; (2) If the dstance threshold s set large, t s easy to confuse the llegal stay wth crossng the road whose speed s slow; (3) t s easy to lost tracng for suddenly acceleraton
6 runnng pedestrans; (4) the bnary threshold s vary n dfferent vdeos. abnormal behavors n the traffc scenes, other pedestran abnormal behavors' mathematcal models can be establshed by the method also. (a)pedestran crossng the road border (No. 1) (b)illegal stay (No. 2) V. CONCLUSION In the paper, a behavor mathematcal model s establshed for the common fve nds of pedestran abnormal behavors n the traffc scenes, and behavor detecton s also realzed. The expermental detecton results ndcate the effectveness of the proposed method. There are some problems need to be dealt wth n future research, such as adheson and occluson among multple pedestrans, tracng problem when pedestran s covered by vehcle and detecton of pedestran abnormal behavor at nght. VI. ACKNOWLEDGEMENT Ths research was supported by Guangdong Provncal Department of Scence and Technology (Project No.: 2013B ). (c) Crossng the road (No.5) (e) Enterng road area(no.1 and No.2) (d) Movng along the curb (No.3) Fg. 9. Some detecton results of fve nds of pedestran abnormal behavors TABLE IV. THE DETECTION ACCUACY OF PEDESTIAN ABNOMAL BEHAVIO IN EXPEIMENTAL VIDEOS Pedestrans Abnormal Behavor Number of alarm Number of abnormal behavor n vdeos Detecton accuracy crossng road border % llegal stay % crossng the road % movng along the curb % enterng road area % Indcated by the experment, the model of pedestran abnormal behavor dscussed n ths paper s smple and tme savng, and provdes a unfed representaton method and detecton standard for each nd of abnormal behavor. Although ths paper only consders the common fve nds of EFEENCES [1] MASOUD O, PAPANIKOLOPOULOS N. A method for human acton recognton. Image and Vson Computng, 2003, 21(8): [2] Yn Yong, Wang Jandong, and Jn Xangang. Human Abnormal actvty recognton for approxmate perod moton. Computer Engneerng and Applcatons, 2010, 46(26): [3] Dong-Gyu Lee, Heung-Il Su and Seong-Whan Lee. Modelng crowd motons for abnormal actvty detecton. 11th IEEE Internatonal Conference on Advanced Vdeo and Sgnal Based Survellance (AVSS), pp , [4] Zhcheng Wang, and Jun Zhang. Detectng Pedestran abnormal behavor based on fuzzy assocatve memory. Fourth Internatonal Conference on Natural Computaton, vol. 6, pp , [5] BEGLE C. Learnng and recognzng human dynamcs n vdeo sequences. Proc of IEEE Conference on Computer Vson and Pattern ecognton. 1997: [6] Zhou Ybo, He Xaoha, Zhang Shengjun, and Qng Lnbo. A new detecton algorthm of abnormal behavor.computer Engneerng and Applcaton, 2012,48(3): [7] Zhang Ljun, Wu Xaojuan, Sheng Zan, and Q Le. Behabor recognton method n complex envronment usng HMM. Computer Engneerng, 2008, 34(7): [8] P. L. M. Bouttefroy, A. Beghdad, A. Bouzerdoum, ands. L. Phung. Marov random felds for abnormal behavor detecton on hghways. Vsual Informaton Processng(EUVIP), nd European Worshop on, pp , July, [9] Shen-Bn Hsu, Chn-Chuan Han, Cheng-Ta Hseh, and Kuo-Chn Fan. Fallng and slppng detecton for pedestrans usng a manfold learnng approach. Proceedngs of the 2013 Internatonal Conference on Machne Learnng and Cyberntcs, July, [10] Wang Zhengqn, and Lu Fuqang. Comparson of adaptve bacground extracton algorthm of Object Scene. Computer Engneerng, 2008, 34(23): [11] L X, Cao Guangy, and Fu Xaowe. The pedestran tracng countng method based on real-tme mage sequence. Computer Smulaton, 2005,22(2): [12] Zhao Youtng, L Xyng, and Luo Donghua. Based on vdeo vehcle trajectory model of traffc ncdent automatc detecton method research. Journal of Sun Yansen Unversty, 2011,50(4):56-60.
Vehicle Detection and Tracking in Video from Moving Airborne Platform
Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn interactive system for structure-based ASCII art creation
An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am
More informationA Suspect Vehicle Tracking System Based on Video
3rd Internatonal Conference on Multmeda Technology ICMT 2013) A Suspect Vehcle Trackng System Based on Vdeo Yad Chen 1, Tuo Wang Abstract. Vdeo survellance systems are wdely used n securty feld. The large
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationA Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn
More informationCONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM
Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationA machine vision approach for detecting and inspecting circular parts
A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw
More informationEye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns
Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationVEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM
IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationwhere the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationA Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationDetecting Global Motion Patterns in Complex Videos
Detectng Global Moton Patterns n Complex Vdeos Mn Hu, Saad Al, Mubarak Shah Computer Vson Lab, Unversty of Central Florda {mhu,sal,shah}@eecs.ucf.edu Abstract Learnng domnant moton patterns or actvtes
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationDistributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationMACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION
MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationTexture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs
Texture Analyss and Modfed Level Set Method for Automatc Detecton of Bone Boundares n Hand Radographs Syaful Anam Graduate School of Scence and Engneerng Yamaguch Unversty Yamaguch, Japan Department of
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationWho are you with and Where are you going?
Who are you wth and Where are you gong? Kota Yamaguch Alexander C. Berg Lus E. Ortz Tamara L. Berg Stony Brook Unversty Stony Brook Unversty, NY 11794, USA {kyamagu, aberg, leortz, tlberg}@cs.stonybrook.edu
More information21 Vectors: The Cross Product & Torque
21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationVehicle Detection, Classification and Position Estimation based on Monocular Video Data during Night-time
Vehcle Detecton, Classfcaton and Poston Estmaton based on Monocular Vdeo Data durng Nght-tme Jonas Frl, Marko H. Hoerter, Martn Lauer and Chrstoph Stller Keywords: Automotve Lghtng, Lght-based Drver Assstance,
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationUsing Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
More informationCHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES
CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES In ths chapter, we wll learn how to descrbe the relatonshp between two quanttatve varables. Remember (from Chapter 2) that the terms quanttatve varable
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More information2. RELATED WORKS AND PROBLEM STATEMENT
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1245-1260 (2014) Short Paper Traffc Congeston Evaluaton and Sgnal Tmng Optmzaton Based on Wreless Sensor Networks: Issues, Approaches and Smulaton * School
More informationLogistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
More informationA COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION
A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,
More informationParallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion
212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationForensic Handwritten Document Retrieval System
Forensc Handwrtten Document Retreval System Sargur N SRIHARI and Zhxn SHI + Center of Excellence for Document Analyss and Recognton (CEDAR), Unversty at Buffalo, State Unversty of New York, Buffalo, USA
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationGender Classification for Real-Time Audience Analysis System
Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationAutomated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
More informationProduct Quality and Safety Incident Information Tracking Based on Web
Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationRisk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationA Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics
Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationRealistic Image Synthesis
Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random
More informationTesting CAB-IDS through Mutations: on the Identification of Network Scans
Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es
More informationVehicle Tracking Using Particle Filter for Parking Management System
2014 4th Internatonal Conference on Artfcal Intellgence wth Applcatons n Engneerng and Technology Vehcle Trackng Usng Partcle Flter for Parkng Management System Kenneth Tze Kn Teo, Renee Ka Yn Chn, N.S.V.
More informationHow To Predct On The Web For Hfmd
Proceedngs of the Twenty-Second Internatonal Jont Conference on Artfcal Intellgence Predctng Epdemc Tendency through Search Behavor Analyss Danqng Xu, Yqun Lu, Mn Zhang, Shaopng Ma, Anq Cu, Lyun Ru State
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationHuman Tracking by Fast Mean Shift Mode Seeking
JOURAL OF MULTIMEDIA, VOL. 1, O. 1, APRIL 2006 1 Human Trackng by Fast Mean Shft Mode Seekng [10 font sze blank 1] [10 font sze blank 2] C. Belezna Advanced Computer Vson GmbH - ACV, Venna, Austra Emal:
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationWildfire Smoke Detection Using SpatioTemporal Bag-of-Features of Smoke
Wldfre Smoke Detecton Usng SpatoTemporal Bag-of-Features of Smoke JunOh Park, ByoungChul Ko, Jae-Yeal Nam Dept. of Computer Engneerng Kemyung Unversty Daegu, Korea wnsdhd, nceko, jynam@kmu.ac.kr Abstract
More informationDocument Clustering Analysis Based on Hybrid PSO+K-means Algorithm
Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,
More informationDesign and Implementation of a Fall Monitor System by Using a 3-Axis Accelerometer in a Smart Phone
01 IEEE 16th Internatonal Symposum 01 ISCE 1569570475 Desgn and Implementaton of a Fall Montor System by Usng a 3-Axs Accelerometer n a Smart Phone Yng-Wen Ba, Sao-Can Wu and Cheng-Lung Tsa Abstract--
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationLearning from Multiple Outlooks
Learnng from Multple Outlooks Maayan Harel Department of Electrcal Engneerng, Technon, Hafa, Israel She Mannor Department of Electrcal Engneerng, Technon, Hafa, Israel maayanga@tx.technon.ac.l she@ee.technon.ac.l
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationThe Network flow Motoring System based on Particle Swarm Optimized
The Network flow Motorng System based on Partcle Swarm Optmzed Neural Network Adult Educaton College, Hebe Unversty of Archtecture, Zhangjakou Hebe 075000, Chna Abstract The compatblty of the commercal
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationWeb Object Indexing Using Domain Knowledge *
Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationInvestigation of Normalization Techniques and Their Impact on a Recognition Rate in Handwritten Numeral Recognition
S C H E D A E I N F O R M A T I C A E VOLUME 19 010 Investgaton of Normalzaton Technques and Ther Impact on a Recognton Rate n Handwrtten Numeral Recognton WIESŁAW CHMIELNICKI 1, KATARZYNA STĄPOR 1 Faculty
More informationHallucinating Multiple Occluded CCTV Face Images of Different Resolutions
In Proc. IEEE Internatonal Conference on Advanced Vdeo and Sgnal based Survellance (AVSS 05), September 2005 Hallucnatng Multple Occluded CCTV Face Images of Dfferent Resolutons Ku Ja Shaogang Gong Computer
More informationFaraday's Law of Induction
Introducton Faraday's Law o Inducton In ths lab, you wll study Faraday's Law o nducton usng a wand wth col whch swngs through a magnetc eld. You wll also examne converson o mechanc energy nto electrc energy
More information3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION
3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION L. Jang, B. Zhu, X. Cheng, Y. Luo, Y. Tao ABSTRACT. Machne vson methods are wdely used n apple defect detecton and
More informationComparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions
Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda
More informationA spam filtering model based on immune mechanism
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationResearch on Engineering Software Data Formats Conversion Network
2606 JOURNAL OF SOFTWARE, VOL. 7, NO. 11, NOVEMBER 2012 Research on Engneerng Software Data Formats Converson Network Wenbn Zhao School of Instrument Scence and Engneerng, Southeast Unversty, Nanng, Jangsu,
More informationThe Effects of Geodetic Configuration of the Network in Deformation Analysis
The Effects of Geodetc Confguraton of the Network n Deformaton Analyss M. Onur KAPLAN, Tevfk AYAN and Serdar EROL Turkey Key words: Network confguraton, deformaton analyss, optmzaton, confdence ellpses
More information) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance
Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More information