Object tracking is a very important topic in the field of computer vision.Many sophisticated appearance models have been proposed.Among them,the trackers based on holistic appearance information provide a compact noti...Object tracking is a very important topic in the field of computer vision.Many sophisticated appearance models have been proposed.Among them,the trackers based on holistic appearance information provide a compact notion of the tracked object and thus are robust to appearance variations under a small amount of noise.However,in practice,the tracked objects are often corrupted by complex noises(e.g.,partial occlusions,illumination variations)so that the original appearance-based trackers become less effective.This paper presents a correntropy-based robust holistic tracking algorithm to deal with various noises.Then,a half-quadratic algorithm is carefully employed to minimize the correntropy-based objective function.Based on the proposed information theoretic algorithm,we design a simple and effective template update scheme for object tracking.Experimental results on publicly available videos demonstrate that the proposed tracker outperforms other popular tracking algorithms.展开更多
In this paper,a blind multiband spectrum sensing(BMSS)method requiring no knowledge of noise power,primary signal and wireless channel is proposed based on the K-means clustering(KMC).In this approach,the KMC algorith...In this paper,a blind multiband spectrum sensing(BMSS)method requiring no knowledge of noise power,primary signal and wireless channel is proposed based on the K-means clustering(KMC).In this approach,the KMC algorithm is used to identify the occupied subband set(OSS)and the idle subband set(ISS),and then the location and number information of the occupied channels are obtained according to the elements in the OSS.Compared with the classical BMSS methods based on the information theoretic criteria(ITC),the new method shows more excellent performance especially in the low signal-to-noise ratio(SNR)and the small sampling number scenarios,and more robust detection performance in noise uncertainty or unequal noise variance applications.Meanwhile,the new method performs more stablely than the ITC-based methods when the occupied subband number increases or the primary signals suffer multi-path fading.Simulation result verifies the effectiveness of the proposed method.展开更多
Based on a description of the implication,character and type of information resources,this article analyzes the potential information resourecs which are seldom noticed by people.Emphases are put on their specific pro...Based on a description of the implication,character and type of information resources,this article analyzes the potential information resourecs which are seldom noticed by people.Emphases are put on their specific properties.The necessity and urgency of developing potential information resources are elaborated.The possibility of developing and utilizing potential information resources are predicted.展开更多
On the assumption that the wavelet is causal and nonminimum phase, an autoregressive moving average (ARMA) model is introduced to fit the seismic trace. Seismic wavelet extraction is converted to parameters estimati...On the assumption that the wavelet is causal and nonminimum phase, an autoregressive moving average (ARMA) model is introduced to fit the seismic trace. Seismic wavelet extraction is converted to parameters estimation of the ARMA model. Singular value decomposition (SVD) of an appropriate matrix formed by autocorrelation is exploited to determine the autoregressive (AR) order, and the cumulant-based SVD-TLS (total least squares) approach is proposed to obtain the AR parameters. The author proposes a new moving average (MA) model order determination method via combining the information theoretic criteria method and higher-order cumulant method. The cumulant approach is used to achieve the MA parameters. Theoretical analysis and numerical simulations demonstrate the feasibility of the wavelet extraction approach.展开更多
The approach of estimating the number of signals based on information theoretic criteria has good performance in the assumption of white noise, but it always leads to false estimation of the coherent sources in colore...The approach of estimating the number of signals based on information theoretic criteria has good performance in the assumption of white noise, but it always leads to false estimation of the coherent sources in colored noise. An approach combining the combined information theoretic criteria and eigen- value correction, is presented to determine number of signals. The method uses maximum likelihood (ML) and information theoretic criteria to estimate coherent signals alternately, then eliminate the inequality of the eigenvalues caused by colored noise by correcting the noise eigenvalues. The computer simulation results prove the effective performance of the method.展开更多
Two authentication codes with arbitration (A 2 codes) are constructed from finite affine spaces to illustrate for the first time that the information theoretic lower bounds for A 2 codes can be strictly tighter t...Two authentication codes with arbitration (A 2 codes) are constructed from finite affine spaces to illustrate for the first time that the information theoretic lower bounds for A 2 codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encodingdecoding rules are not genuine ones. As an analogue of 3 dimensional case, an A 2 code from 4 dimensional finite projective spaces is constructed, which meets both the information theoretic and combinatorial lower bounds.展开更多
Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted ...Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted a lot of attention recently,as it has wide ranging applications in the field of cryptography.In this article we review some of these applications and,additionally,take an in-depth look at the special case of information theoretic OPE.Specifically,we provide a current and critical review of the existing information theoretic OPE protocols in the literature.We divide these protocols into two distinct cases(three-party and distributed OPE)allowing for the easy distinction and classification of future information theoretic OPE protocols.In addition to this work,we also develop several modifications and extensions to existing schemes,resulting in increased security,flexibility and efficiency.Lastly,we also identify a security flaw in a previously published OPE scheme.展开更多
基金This work was supported by National Natural Science Foundation of China(Nos.61702513,61525306,61633021)National Key Research and Development Program of China(No.2016YFB1001000)+1 种基金Capital Science and Technology Leading Talent Training Project(No.Z181100006318030)CAS-AIR and Shandong Provincial Key Research and Development Program(Major Scientific and Technological Innovation Project)(No.2019JZZY010119)。
文摘Object tracking is a very important topic in the field of computer vision.Many sophisticated appearance models have been proposed.Among them,the trackers based on holistic appearance information provide a compact notion of the tracked object and thus are robust to appearance variations under a small amount of noise.However,in practice,the tracked objects are often corrupted by complex noises(e.g.,partial occlusions,illumination variations)so that the original appearance-based trackers become less effective.This paper presents a correntropy-based robust holistic tracking algorithm to deal with various noises.Then,a half-quadratic algorithm is carefully employed to minimize the correntropy-based objective function.Based on the proposed information theoretic algorithm,we design a simple and effective template update scheme for object tracking.Experimental results on publicly available videos demonstrate that the proposed tracker outperforms other popular tracking algorithms.
基金Projects(61362018,61861019)supported by the National Natural Science Foundation of ChinaProject(1402041B)supported by the Jiangsu Province Postdoctoral Scientific Research Project,China+1 种基金Project(16A174)supported by the Scientific Research Fund of Hunan Provincial Education Department,ChinaProject([2016]283)supported by the Research Study and Innovative Experiment Project of College Students,China
文摘In this paper,a blind multiband spectrum sensing(BMSS)method requiring no knowledge of noise power,primary signal and wireless channel is proposed based on the K-means clustering(KMC).In this approach,the KMC algorithm is used to identify the occupied subband set(OSS)and the idle subband set(ISS),and then the location and number information of the occupied channels are obtained according to the elements in the OSS.Compared with the classical BMSS methods based on the information theoretic criteria(ITC),the new method shows more excellent performance especially in the low signal-to-noise ratio(SNR)and the small sampling number scenarios,and more robust detection performance in noise uncertainty or unequal noise variance applications.Meanwhile,the new method performs more stablely than the ITC-based methods when the occupied subband number increases or the primary signals suffer multi-path fading.Simulation result verifies the effectiveness of the proposed method.
文摘Based on a description of the implication,character and type of information resources,this article analyzes the potential information resourecs which are seldom noticed by people.Emphases are put on their specific properties.The necessity and urgency of developing potential information resources are elaborated.The possibility of developing and utilizing potential information resources are predicted.
基金supported by the National High Technology Research and Development Program of China (863 Program, No.2007AA09Z301)the Graduate Innovation Fund of China University of Petroleum and National Natural Science Foundation of China (40974072)
文摘On the assumption that the wavelet is causal and nonminimum phase, an autoregressive moving average (ARMA) model is introduced to fit the seismic trace. Seismic wavelet extraction is converted to parameters estimation of the ARMA model. Singular value decomposition (SVD) of an appropriate matrix formed by autocorrelation is exploited to determine the autoregressive (AR) order, and the cumulant-based SVD-TLS (total least squares) approach is proposed to obtain the AR parameters. The author proposes a new moving average (MA) model order determination method via combining the information theoretic criteria method and higher-order cumulant method. The cumulant approach is used to achieve the MA parameters. Theoretical analysis and numerical simulations demonstrate the feasibility of the wavelet extraction approach.
文摘The approach of estimating the number of signals based on information theoretic criteria has good performance in the assumption of white noise, but it always leads to false estimation of the coherent sources in colored noise. An approach combining the combined information theoretic criteria and eigen- value correction, is presented to determine number of signals. The method uses maximum likelihood (ML) and information theoretic criteria to estimate coherent signals alternately, then eliminate the inequality of the eigenvalues caused by colored noise by correcting the noise eigenvalues. The computer simulation results prove the effective performance of the method.
文摘Two authentication codes with arbitration (A 2 codes) are constructed from finite affine spaces to illustrate for the first time that the information theoretic lower bounds for A 2 codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encodingdecoding rules are not genuine ones. As an analogue of 3 dimensional case, an A 2 code from 4 dimensional finite projective spaces is constructed, which meets both the information theoretic and combinatorial lower bounds.
文摘Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted a lot of attention recently,as it has wide ranging applications in the field of cryptography.In this article we review some of these applications and,additionally,take an in-depth look at the special case of information theoretic OPE.Specifically,we provide a current and critical review of the existing information theoretic OPE protocols in the literature.We divide these protocols into two distinct cases(three-party and distributed OPE)allowing for the easy distinction and classification of future information theoretic OPE protocols.In addition to this work,we also develop several modifications and extensions to existing schemes,resulting in increased security,flexibility and efficiency.Lastly,we also identify a security flaw in a previously published OPE scheme.