期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Robust Object Tracking via Information Theoretic Measures
1
作者 Wei-Ning Wang Qi Li Liang Wang 《International Journal of Automation and computing》 EI CSCD 2020年第5期652-666,共15页
Object tracking is a very important topic in the field of computer vision.Many sophisticated appearance models have been proposed.Among them,the trackers based on holistic appearance information provide a compact noti... Object tracking is a very important topic in the field of computer vision.Many sophisticated appearance models have been proposed.Among them,the trackers based on holistic appearance information provide a compact notion of the tracked object and thus are robust to appearance variations under a small amount of noise.However,in practice,the tracked objects are often corrupted by complex noises(e.g.,partial occlusions,illumination variations)so that the original appearance-based trackers become less effective.This paper presents a correntropy-based robust holistic tracking algorithm to deal with various noises.Then,a half-quadratic algorithm is carefully employed to minimize the correntropy-based objective function.Based on the proposed information theoretic algorithm,we design a simple and effective template update scheme for object tracking.Experimental results on publicly available videos demonstrate that the proposed tracker outperforms other popular tracking algorithms. 展开更多
关键词 Object tracking information theoretic measures correntropy template update robust to complex noises
原文传递
A K-means clustering based blind multiband spectrum sensing algorithm for cognitive radio 被引量:2
2
作者 LEI Ke-jun TAN Yang-hong +1 位作者 YANG Xi WANG Han-rui 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第10期2451-2461,共11页
In this paper,a blind multiband spectrum sensing(BMSS)method requiring no knowledge of noise power,primary signal and wireless channel is proposed based on the K-means clustering(KMC).In this approach,the KMC algorith... In this paper,a blind multiband spectrum sensing(BMSS)method requiring no knowledge of noise power,primary signal and wireless channel is proposed based on the K-means clustering(KMC).In this approach,the KMC algorithm is used to identify the occupied subband set(OSS)and the idle subband set(ISS),and then the location and number information of the occupied channels are obtained according to the elements in the OSS.Compared with the classical BMSS methods based on the information theoretic criteria(ITC),the new method shows more excellent performance especially in the low signal-to-noise ratio(SNR)and the small sampling number scenarios,and more robust detection performance in noise uncertainty or unequal noise variance applications.Meanwhile,the new method performs more stablely than the ITC-based methods when the occupied subband number increases or the primary signals suffer multi-path fading.Simulation result verifies the effectiveness of the proposed method. 展开更多
关键词 cognitive radio(CR) blind multiband spectrum sensing(BMSS) K-means clustering(KMC) occupied subband set(OSS) idle subband set(ISS) information theoretic criteria(ITC) noise uncertainty
下载PDF
对潜在信息资源的认识研究 被引量:8
3
作者 樊志伟 《情报理论与实践》 CSSCI 北大核心 2001年第1期24-26,共3页
Based on a description of the implication,character and type of information resources,this article analyzes the potential information resourecs which are seldom noticed by people.Emphases are put on their specific pro... Based on a description of the implication,character and type of information resources,this article analyzes the potential information resourecs which are seldom noticed by people.Emphases are put on their specific properties.The necessity and urgency of developing potential information resources are elaborated.The possibility of developing and utilizing potential information resources are predicted. 展开更多
关键词 information resources theoretical study/potential information resources
下载PDF
Seismic wavelet estimation via a system identification method
4
作者 Shaoshui Wang Yongshou Dai Fang Wang 《Earthquake Science》 CSCD 2009年第5期487-492,共6页
On the assumption that the wavelet is causal and nonminimum phase, an autoregressive moving average (ARMA) model is introduced to fit the seismic trace. Seismic wavelet extraction is converted to parameters estimati... On the assumption that the wavelet is causal and nonminimum phase, an autoregressive moving average (ARMA) model is introduced to fit the seismic trace. Seismic wavelet extraction is converted to parameters estimation of the ARMA model. Singular value decomposition (SVD) of an appropriate matrix formed by autocorrelation is exploited to determine the autoregressive (AR) order, and the cumulant-based SVD-TLS (total least squares) approach is proposed to obtain the AR parameters. The author proposes a new moving average (MA) model order determination method via combining the information theoretic criteria method and higher-order cumulant method. The cumulant approach is used to achieve the MA parameters. Theoretical analysis and numerical simulations demonstrate the feasibility of the wavelet extraction approach. 展开更多
关键词 seismic wavelet ARMA model SVD higher order cumulant information theoretic criteria
下载PDF
Method for determining number of coherent signals in the presence of colored noise
5
作者 Jiaqi Zhen, Xicai Si, and Lutao Liu College of Information & Communication Engineering, Harbin Engineering University, Harbin 150001, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期27-30,共4页
The approach of estimating the number of signals based on information theoretic criteria has good performance in the assumption of white noise, but it always leads to false estimation of the coherent sources in colore... The approach of estimating the number of signals based on information theoretic criteria has good performance in the assumption of white noise, but it always leads to false estimation of the coherent sources in colored noise. An approach combining the combined information theoretic criteria and eigen- value correction, is presented to determine number of signals. The method uses maximum likelihood (ML) and information theoretic criteria to estimate coherent signals alternately, then eliminate the inequality of the eigenvalues caused by colored noise by correcting the noise eigenvalues. The computer simulation results prove the effective performance of the method. 展开更多
关键词 determining the number of signals coherent signals colored noise information theoretic criteria.
下载PDF
On Construction of Optimal A^2-Codes 被引量:2
6
作者 胡磊 《Northeastern Mathematical Journal》 CSCD 2001年第1期27-33,共7页
Two authentication codes with arbitration (A 2 codes) are constructed from finite affine spaces to illustrate for the first time that the information theoretic lower bounds for A 2 codes can be strictly tighter t... Two authentication codes with arbitration (A 2 codes) are constructed from finite affine spaces to illustrate for the first time that the information theoretic lower bounds for A 2 codes can be strictly tighter than the combinatorial ones. The codes also illustrate that the conditional combinatorial lower bounds on numbers of encodingdecoding rules are not genuine ones. As an analogue of 3 dimensional case, an A 2 code from 4 dimensional finite projective spaces is constructed, which meets both the information theoretic and combinatorial lower bounds. 展开更多
关键词 A 2 code information theoretic lower bound combinatorial lower bound optimal A 2 code
下载PDF
Unconditionally Secure Oblivious Polynomial Evaluation:A Survey and New Results 被引量:1
7
作者 Louis Cianciullo Hossein Ghodosi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2022年第2期443-458,共16页
Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted ... Oblivious polynomial evaluation(OPE)is a two-party protocol that allows a receiver,R to learn an evaluation f(α),of a sender,S's polynomial(f(x)),whilst keeping both a and f(x)private.This protocol has attracted a lot of attention recently,as it has wide ranging applications in the field of cryptography.In this article we review some of these applications and,additionally,take an in-depth look at the special case of information theoretic OPE.Specifically,we provide a current and critical review of the existing information theoretic OPE protocols in the literature.We divide these protocols into two distinct cases(three-party and distributed OPE)allowing for the easy distinction and classification of future information theoretic OPE protocols.In addition to this work,we also develop several modifications and extensions to existing schemes,resulting in increased security,flexibility and efficiency.Lastly,we also identify a security flaw in a previously published OPE scheme. 展开更多
关键词 oblivious polynomial evaluation unconditionally secure information theoretic
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部