Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 230 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Monocular Mobile Cube SLAM Based on Fusion of IMU Initialization | |||
CUI Xiaoyang,WANG Jing | |||
Computer Science and Technology 28 December 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the continuous development of human-computer interaction, the challenging lip reading task has become a research hotspot. As a part of the whole lip reading model, feature extraction module determines the upper limit of the overall ability of the lip reading model from the source. The current lip reading feature extraction model is composed of 2D and 3D convolution layers, which can not meet the strong correlation of local features. In order to solve this problem, this paper first analyzes the shortcomings of existing models based on anatomical principles and basic models; then proposes global features to enhance local features through the interaction of global features and local features; finally, based on the above design ideas, designs a lip reading feature extraction model with local feature enhancement. Through the experimental verification on the data set, the lip reading feature extraction model constructed in this paper has stronger representation ability. | |||
TO cite this article:CUI Xiaoyang,WANG Jing. Monocular Mobile Cube SLAM Based on Fusion of IMU Initialization[OL].[28 December 2021] http://en.paper.edu.cn/en_releasepaper/content/4755986 |
2. A novel key frame selection method for aerial image stitching by integrating navigation information and trusted key points | |||
Zheng Yongji,Wang Guoyou | |||
Computer Science and Technology 01 April 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Fast and high-precision video based image stitching plays an important role in many machine vision applications, such as UAV mapping and reconnaissance. Due to the large number of frames and high redundancy of video sequence, image stitching is very time-consuming. Therefore, from the perspective of reducing the number of redundant frames, this paper proposes a novel video sequence key frame selection method based on rough camera external parameters and key point fusion, which selects the appropriate key frames by optimizing the overlap rate and the number of reliable key points between two adjacent key frames. The algorithm not only greatly reduces the number of key frames, but also ensures the reliable video mosaic. The experimental results on Bu S\' videos show that our method can reduce the number of key frames by 92%. In addition, compared with the key frame selection method based only on navigation information, this method also overcomes the problem of missing stitched images caused by insufficient key points in overlapping regions. | |||
TO cite this article:Zheng Yongji,Wang Guoyou. A novel key frame selection method for aerial image stitching by integrating navigation information and trusted key points[OL].[ 1 April 2021] http://en.paper.edu.cn/en_releasepaper/content/4754321 |
3. An extended model of group chase and escape based on refuges | |||
ZHANG Xinglei,LIU Shaohua | |||
Computer Science and Technology 24 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper,an extended model is proposed to describe the motion trajectory of group chase and escape based on refuges.The rich dynamic behaviors of chaser and escaper are demonstrated by using a cellular automata model and the protective effect of refuge on escaper is explored in both long-term and short-term modes. The protective effect of different refuge density and distribution is compared in this paper. A critical refuge density which provides 100% protection for escaper is founded as refuge density increases and the optimal refuge distribution for prey\'s survival is concluded. These findings can provide references for the establishment of endangered animal refuges and the modeling of crowd evacuation under attack, and have profound significance on the topic of group chase and escape. | |||
TO cite this article:ZHANG Xinglei,LIU Shaohua. An extended model of group chase and escape based on refuges[OL].[24 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754164 |
4. Research on power allocation in V2X network based on Reinforcement Learning | |||
Wang Yanlong,Liu Jun,Yang Jie | |||
Computer Science and Technology 23 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the rapid development of IoT (Internet of Things), the application scenarios of wireless devices accessing the network has been greatly enriched. Vehicle-to-Everything (V2X) is one of the most typical scenarios. This paper proposes a model of the V2X power distribution problem in a multi-base station scenario for the power allocation problem, and designs three types of reinforcement learning algorithms. The specific optimization problems are publicized and deduced and the elements of the reinforcement learning algorithm are sorted out. The results show that the performance of the DDPG algorithm is the best, which verifies the feasibility of the reinforcement learning algorithm in the V2X scenarios. | |||
TO cite this article:Wang Yanlong,Liu Jun,Yang Jie. Research on power allocation in V2X network based on Reinforcement Learning[OL].[23 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754266 |
5. Design and Experiment of Reconstructing NANO Grid System by Java | |||
Huang Mengyan,Zhang Yuyan | |||
Computer Science and Technology 18 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In recent years, blockchain technology has developed rapidly. Not only Bitcoin is widely known, but also Ethereum and Hyperledger technology are gradually being applied to life. However, the current technology has problems with high time delay and low throughput. The Nano block grid structure solves the above problems by virtue of its concurrent transactions and account transactions. However, the Nano blockchain project is too redundant and large, and it is not easy to learn. In order to make the project easier to support the development of application and test its performance in lab environment, we choose Java to reconstruct the Nano block grid system, using Socket communication technology, JDBC Database and other technologies. The system includes start-up block chain, construction block, socket communication, system transaction, account information display, and block content display. The experiment results show that the reconstructing system works well. | |||
TO cite this article:Huang Mengyan,Zhang Yuyan. Design and Experiment of Reconstructing NANO Grid System by Java[OL].[18 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754061 |
6. Multi-dimensional social relationship analysis model based on LDA | |||
Ming Xuyang,Zhang Siyang | |||
Computer Science and Technology 18 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The development of location service technology provides the premise for the emergence of location-based social network (LBSN).At present, the research on community discovery and social relations in LBSN still has some problems, such as insufficient model dimension, difficulty in parameter estimation and low accuracy of model results, which are still challenges for researchers.In order to solve the problem of poor model fitting effect, this paper designs a multi-dimensional social relationship analysis model (MSRAM) from two aspects of social relationship and user check-in behavior by introducing dynamic interaction relationship between nodes.Then, according to the hidden variable sampling rules and parameter iteration rules, a new Gibbs sampling algorithm based on model is proposed, and the experimental parameters are estimated according to the cross-entropy reality.By comparing with the spectral clustering algorithm and the TGSC-PMF algorithm based on the topic model, it is verified that the cross-entropy of the proposed model is increased by about 7.93%, the modularity is increased by 5.6%-8.8%, and the similarity within the community is increased by 12%-23%.The results show that this model can achieve more accurate community division for the whole experimental data network. | |||
TO cite this article:Ming Xuyang,Zhang Siyang. Multi-dimensional social relationship analysis model based on LDA[OL].[18 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4754200 |
7. Multidimensional Features Based Model for Social Network User Classification | |||
MO Qin-Chu,DENG Xiao-Long1,SONG Lin-Ming | |||
Computer Science and Technology 12 March 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In recent years, social network users have been the focus of research, but existing research often divides users into normal and malicious users, lacking a more detailed analysis. To address the absence of a precise user classification model, this paper builds a three-dimensional classification model including Anti-bot Analysis, Publicity, and Hashtag Manipulation for measuring user behaviors and classifying users into four categories: harmless users, publicizing users, hashtag hijacking users, and malicious publicizing users. Based on the classification model, this paper has built a set of user classification features, and introduces four new features. We also create two new Weibo user datasets with new features, and re-processes an existing Weibo user dataset. The experimental results show that the model and features proposed in this paper have good classification efficiency for precise Weibo user classification and bot behavior recognition, and have obvious classification improvement for decision trees and BP neural networks. | |||
TO cite this article:MO Qin-Chu,DENG Xiao-Long1,SONG Lin-Ming. Multidimensional Features Based Model for Social Network User Classification[OL].[12 March 2021] http://en.paper.edu.cn/en_releasepaper/content/4753963 |
8. A Topic Detection Algorithm Based on Multiple Strategies for Group Chat | |||
Wu Xu,Chen Chunxu | |||
Computer Science and Technology 22 February 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:There are a large number of group chat messages on the Internet, and public opinion analysis requires topic detection to aggregate messages with similar discussions. Group chat topics are easy to be crossing and parallel, and group chat messages also have the characteristics of sparse text features. In order to solve these two problems, this paper proposes a multi-strategy group chat topic detection technology. On the one hand, the topic sequence is constructed to solve the problem of topic crossing and parallel, on the other hand, the user, time, type and other attributes of the message are used to make up for the shortcomings of clustering that rely solely on short text features. The results of experiments conducted on three datasets derived from real group chat logs show that this method has better performance than traditional algorithms. In addition, the types of group chat messages it can process are much more than traditional methods. | |||
TO cite this article:Wu Xu,Chen Chunxu. A Topic Detection Algorithm Based on Multiple Strategies for Group Chat[OL].[22 February 2021] http://en.paper.edu.cn/en_releasepaper/content/4753717 |
9. Head Pose Estimation Based on Dlib and Savitzky-Golay Smoothing Algorithm | |||
LU Xiaoning,LIU Wen | |||
Computer Science and Technology 18 January 2021 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, We apply the Savitsky-Golay filter algorithm to head pose estimation. Firstly, the Dlib algorithm is to detect key points of the corresponding face in the video. Then, the function solvepnp built in opencv is to estimate the pose. Finally, through MATLAB simulation, we can find that the Savitsky-Golay filter algorithm can filter the noisiness in the observed data to obtain a smoother and more accurate change trajectory of head pose. | |||
TO cite this article:LU Xiaoning,LIU Wen. Head Pose Estimation Based on Dlib and Savitzky-Golay Smoothing Algorithm[OL].[18 January 2021] http://en.paper.edu.cn/en_releasepaper/content/4753447 |
10. Risk Quantification Contributes To Service Stability | |||
Liu Funiu | |||
Computer Science and Technology 07 August 2020 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This article shows the design and implementation of a system called risk quantification platform. On the whole, the risk quantification platform is designed to standardize the changes in the product line from the perspective of prevention. We use the quantified data to conduct a risk assessment and combine the case improvement module to drive the business side to optimize the stability of online services, achieving the goal of reducing the occurrence of the online cases. By automatically collecting user platform operation and maintenance data, and automatically calculating and quantifying the operation and maintenance risks, each bussiness line gets risk scores of various dimentions. Finally, a ranking and competition mechanism is formed to achieve the purpose of promoting long-term implementation of standards and assisting in the construction of service stability. | |||
TO cite this article:Liu Funiu. Risk Quantification Contributes To Service Stability[OL].[ 7 August 2020] http://en.paper.edu.cn/en_releasepaper/content/4752636 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated