![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Deep cascaded action attention network for weakly-supervised temporal action localization
Weakly-supervised temporal action localization (W-TAL) is to locate the boundaries of action instances and classify them in an untrimmed video, which is a challenging task due to only video-level labels during...
-
Article
Robust deflated canonical correlation analysis via feature factoring for multi-view image classification
Canonical Correlation Analysis (CCA) and its kernel versions (KCCA) are well-known techniques adopted in feature representation and classification for images. However, their performances are significantly affe...
-
Article
Improved combined invariant moment for moving targets classification
Invariant moment is a highly concentrated and distortion invariant image features. The goal of multi-moving object characterization and classification methods is to find a suitable description of different kin...
-
Article
A cloud computing architecture for characterization and classification of moving object
Video surveillance big data contains a great deal of information about moving objects. Multi moving object characterization and classification methods is the main characteristics to find a suitable description...
-
Article
Complex video event detection via pairwise fusion of trajectory and multi-label hypergraphs
The video data is rich in motion event information. Detecting complex events and analyzing the inherent high-level semantics information have been a hot topic in video analysis and understanding. Detecting com...
-
Article
Using Kinect for real-time emotion recognition via facial expressions
Emotion recognition via facial expressions (ERFE) has attracted a great deal of interest with recent advances in artificial intelligence and pattern recognition. Most studies are based on 2D images, and their ...
-
Article
A blind watermarking algorithm for 3D mesh models based on vertex curvature
We propose a robust blind watermarking algorithm for three-dimensional (3D) mesh models based on vertex curvature to maintain good robustness and improve visual masking in 3D mesh models. In the embedding proc...
-
Article
Speaker-independent speech emotion recognition by fusion of functional and accompanying paralanguage features
Functional paralanguage includes considerable emotion information, and it is insensitive to speaker changes. To improve the emotion recognition accuracy under the condition of speaker-independence, a fusion me...
-
Article
A New Classifier for Facial Expression Recognition: Fuzzy Buried Markov Model
To overcome the disadvantage of classical recognition model that cannot perform well enough when there are some noises or lost frames in expression image sequences, a novel model called fuzzy buried Markov mod...
-
Article
Open AccessSecurity Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion, and the battery exhaustion. Node-failure tolerance is an acceptable method to ...
-
Article
DRMR: Dynamic-ring-based multicast routing protocol for Ad hoc networks
Recently a number of multicast routing protocols for ad hoc networks have been proposed, however, most of them do not provide proper tradeoffs between effectiveness, efficiency and scalability. In this paper, ...
-
Chapter and Conference Paper
Enhancing the Content of the Intrusion Alerts Using Logic Correlation
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...