期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
3-Dimensional Bag of Visual Words Framework on Action Recognition 被引量:1
1
作者 Shiqi Wang Yimin Yang +1 位作者 ruizhong wei Qingming Jonathan Wu 《Computers, Materials & Continua》 SCIE EI 2020年第6期1081-1091,共11页
Human motion recognition plays a crucial role in the video analysis framework.However,a given video may contain a variety of noises,such as an unstable background and redundant actions,that are completely different fr... Human motion recognition plays a crucial role in the video analysis framework.However,a given video may contain a variety of noises,such as an unstable background and redundant actions,that are completely different from the key actions.These noises pose a great challenge to human motion recognition.To solve this problem,we propose a new method based on the 3-Dimensional(3D)Bag of Visual Words(BoVW)framework.Our method includes two parts:The first part is the video action feature extractor,which can identify key actions by analyzing action features.In the video action encoder,by analyzing the action characteristics of a given video,we use the deep 3D CNN pre-trained model to obtain expressive coding information.A classifier with subnetwork nodes is used for the final classification.The extensive experiments demonstrate that our method leads to an impressive effect on complex video analysis.Our approach achieves state-of-the-art performance on the datasets of UCF101(85.3%)and HMDB51(54.5%). 展开更多
关键词 Action recognition 3D CNNs recurrent neural networks residual networks subnetwork nodes
下载PDF
Scalable Trust-Based Secure WSNs
2
作者 Amar Agrawal ruizhong wei 《Journal of Computer and Communications》 2014年第7期17-22,共6页
In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic... In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic algorithms are not allowed. We focus on the scalability of the network and proposed new testing algorithms and evaluation algorithms to test new nodes added, which give them reasonable values of trust. Based on these algorithms, we proposed new components for trust management system of wireless sensor networks. 展开更多
关键词 Trust-Based Security Wireless Sensor Network TRUST Management
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部