共查询到20条相似文献,搜索用时 78 毫秒
1.
张建 《信息技术与信息化》2021,(2):16-17
行人重识别(ReID)是视频监控中的一项重要任务,由于复杂的背景杂波,变化的照明条件以及无法控制的相机设置,使其成为一项具有挑战性的任务.提出一种结合全局特征和局部特征的深度学习网络作为解决方案.该深度学习网络具有各种粒度的区分性信息,是一种多分支深度网络体系结构.其中一个分支用于全局特征表示,负责整张图片的全局信息提... 相似文献
2.
3.
为提高智能语音情感识别系统的准确性,提出了一种基于卷积神经网络CNN(Convolution Neural Network)特征表征的语音情感识别模型,该卷积模型以 Lenet-5模型为基础,增加了一层卷积层和池化层,并将二维卷积核改为一维卷积核,将一维特征预处理后,输送进该模型中,对特征变换表征。最后利用SoftMax分类器实现情感分类,CASIA与 EMO-DB开数据库上的识别结果显示:与Lenet-5网络相比,所设计网络模型的准确率分别提升了1.3%与2%,与SoftMax分类器相比,准确率分别提升了3.8%与6.1%,仿真结果验证了网络模型的有效性。 相似文献
4.
为了提升无人驾驶汽车对于外界环境感知的能力, 本文提出了一种级联式神经网络框架对虚拟环境中的路标进行检测与分类。该框架将添加了 辅助结构的全卷积神经网络与改进后的经典LeNet-5网络进行 组合,在处理所提取出的路标区域边缘不平整以及产生杂项问题上使用传统的腐蚀膨胀开运 算图像处理算 子进行优化和解决,实现虚拟道路图像中雨雪等多种情况下的多类路标进行定位与识别。通 过与经典的不 变矩特征、ORB全局特征提取方法,以及YOLO,SSD人工智能方法对比试验表明,本文所提出 方法具备检测准确度高,运算速度快的优势。 相似文献
5.
6.
7.
网络流量识别方法研究 总被引:5,自引:0,他引:5
随着P2P和多媒体流量的发展,原有的流量识别方法越来越显现出其不足.为识别这些流量,需要识别效率更高的识别方法.文中提出了一种混合流量识别方法,此方法将特征识别和会话行为映射方法相结合,进行精确的流量识别.接着给出了这种识别过程的流程图,对识别过程进行了说明.对包的识别是基于优先级的特征识别,以提高识别效率.通过实验,选取四种应用Monkey3,eDonkey2000,MSN messenger,BitTorrent流量,将这些单个流量和混合流量的识别结果进行了比较.由实验结果可得出该方法对混合流量识别率比单个流量识别率高. 相似文献
8.
9.
一种新的雷达辐射源识别方法 总被引:3,自引:2,他引:1
提出一种用于雷达辐射源识别的新方法。根据小波包特征(WPT)和脉冲重复间隔(PRI)的特点,将八维WPT中的第六、七个分量(Wpt6、Wpt7)以及PRI的均值和方差(mpRI、σ^2PRI)四个特征参数作为雷达辐射源的识别依据,设计了径向基概率神经网络(RBPNN)分类器。通过计算机仿真验证了新方法的可行性,与常规方法相比,不仅提高了识别准确率,识别速度也有所提高。 相似文献
10.
11.
1IntroductionTraficdispersion[1],whichmeansthetraficisdistributedovermultiplepathsandtransmitedinparalel,isusedtoimprovethene... 相似文献
12.
基于确定性抽样数据分组序列的位置、方向、分组长度和连续性、有序性等流统计特征和典型的分组长度统计签名,并结合带数据分组位置、方向约束和半流关联动作的提升型DPI,提出了一种基于假设检验的加密流量应用识别统计决策模型,包括分组长度统计签名决策模型和DFI决策模型,并给出了相应的分组长度统计签名匹配算法以及基于DPI和DFI混合方法的加密流量应用识别算法。实验结果表明,该方法能够成功捕获加密应用在流坐标空间中独特的统计流量行为,并同时具有极高的加密识别精确率、召回率、总体准确率和极低的加密识别误报率、总体误报率。 相似文献
13.
综合考虑结构化协议和非结构化协议的优点,提出了一种基于蚁群的对等网路由协议.分析对等网路由协议的研究现状,对结构化路由协议和非结构化路由协议进行了介绍.对等网路由协议进行了总体设计,给出了对等网路由协议的描述和总体结构图.提出了对等网路由协议算法的数据结构,并对等网路由协议算法进行了详细设计.利用仿真实验对等网路由协议进行了验证,实验结果表明该对等网路由协议是有效的. 相似文献
14.
15.
In the areas of traffic classification, the payload signature-based classification method–deep packet inspection (DPI) shows the highest performance in terms of preciseness, reliability and practicality. The usual way, however, obtaining signatures for DPI is analyzing network traffic payload and find signatures by hand, which means inefficient and a heavy burden for researchers. Therefore, the research on network traffic automatic signatures generation (NTASG), which helps administrators and researcher find network signatures, becomes important. In this paper, a software framework on NTASG is proposed which uses the K-means cluster algorithm to purity the traffic flow and contains a systematic signatures management algorithm, sig-tree. Also, the feasibility of our design choices was proved via experimental evaluation on the campus traffic trace. 相似文献
16.
17.
1 IntroductionAlthoughthemobileIP protocol[1~3] workswellinthemacromobilitysituation ,someproblemsoccurinthemicromobilitysituation .Therearetwomainconcerns.First,theregistrationdelaycon tributestothehandoffdelay .Thedelayissignifi cantwhenanMNisfarawayfromhomeandcausessignificantpacketdropanddrasticreductionincom municationthroughput.Second ,frequentlocationupdatesincurextensiveoverheadforlocationcachemanagementinrouteoptimizationthatrequiresac curatelocationinformationinordertotunnelIPda… 相似文献
18.
Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential function for establishing a communication path from sink node to a region of sensor nodes. However, flooding operation consumes power and bandwidth resources and raises the packet collision and contention problems, which reduce the success rate of packet transmissions and consume energy. This article proposes an efficient broadcasting protocol to reduce the number of sensor nodes that forward the query request, hence improves the packet delivery rate and saves bandwidth and power consumptions. Sensor node that received the query request will dynamically transfers the coordinate system according to the zone-ID of source node and determines whether it would forward the request or not in a distributed manner. Compared with the CBM and traditional flooding operation, experimental results show that the proposed zone-based broadcasting protocol decreases the bandwidth and power consumptions, reduces the packet collisions, and achieves high success rate of packet broadcasting.Chih-Yung Chang received the Ph.D. degree in Computer Science and Information Engineering from National Central University, Taiwan, in 1995. He joined the faculty of the Department of Computer and Information Science at Aletheia University, Taiwan, as an Assistant Professor in 1997. He was the Chair of the Department of Computer and Information Science, Aletheia University, from August 2000 to July 2002. He is currently an Associate Professor of Department of Computer Science and Information Engineering at Tamkang University, Taiwan. Dr. Chang served as an Associate Guest Editor of Journal of Internet Technology (JIT), Special Issue on “Wireless Ad Hoc and Sensor Networks” (2004) and a member of Editorial Board of Tamsui Oxford Journal of Mathematical Sciences (2001–2005). He was an Area Chair of IEEE AINA′2005, Vice Chair of IEEE WisCom2005, Track Chair (Learning Technology in Education Track) of IEEE ITRE′2005, Program Co-Chair of MNSA′2005, Workshop Co-Chair of INA′2005, MSEAT′2003, MSEAT′2004, Publication Chair of MSEAT′2005, and the Program Committee Member of ICPP′2004, USW′2005, WASN′2005, and the 11th Mobile Computing Workshop. Dr. Chang is a member of the IEEE Computer Society and IEICE society. His current research interests include wireless sensor networks, mobile learning, Bluetooth radio systems, Ad Hoc wireless networks, and mobile computing.Kuei-Ping Shih received the B.S. degree in Mathematics from Fu-Jen Catholic University, Taiwan, Republic of China, in June 1991 and the Ph.D. degree in Computer Science and Information Engineering from National Central University, Taiwan, Republic of China, in June 1998. After two years of military obligation, he joined the faculty of the Department of Computer Science and Information Engineering, Tamkang University, Taiwan, Republic of China, as an assistant professor in 2000. Dr. Shih served as a Program Area Chair in the IEEE International Conference on Advanced Information Networking and Applications (AINA), 2005, and as a Technical Track Chair in the IEEE International Conference on Information Technology: Research and Education (ITRE), 2005. Dr. Shih’s current research interests include wireless networks, sensor networks, mobile computing, and network protocols design.Dr. Shih is a member of the IEEE Computer and Communication Societies and Phi Tau Phi Scholastic Honor Society.Shih-Chieh Lee received the B.S. degree in Computer Science and Information Engineering from Tamkang University, Taiwan, in 1997. Since 2003 he has been a Ph.D. Students in Department of Computer Science and Information Engineering, Tamkang University. His research interests are wireless sensor networks, Ad Hoc wireless networks, and mobile/wireless computing. 相似文献
19.
针对多用户使用UDP协议实现大数据量的可靠传输需求,采用事件与多线程技术,提出了一种简单实用的分包与重组方法。根据UDP协议通信的性能和特点,分析了传输数据的分包与重组原理,对分包与重组的程序设计进行了研究。利用在应用层对报文进行重新封装技术,讨论了传输数据合理分包的原则,以及接收方对一系列无序到达的报文正确重组的方法。 相似文献
20.
A. Di Pietro D. Ficara S. Giordano F. Oppedisano G. Procissi F. Vitucci 《International Journal of Communication Systems》2009,22(11):1403-1425
The wide availability of cheap and effective commodity PC hardware has driven the development of versatile traffic monitoring software such as protocol analyzers, traffic characterizers and intrusion detection systems. Most of them are designed to run on general purpose architectures and are based on the well‐known libpcap API, which has rapidly become a de facto standard. Although many improvements have been applied to packet capturing software, it still suffers from several performance flaws, mainly due to the underlying hardware bottlenecks. To overcome these issues, this paper proposes a system architecture, which combines the high performance of a Network Processor card with the flexibility of software‐based solutions. It allows for removing most part of the hardware limitations exhibited by a purely PC‐based architecture, while preserving the full compliance to any software applications based on libpcap. In addition, the proposed system enables the use of monitoring applications at the wire speed, with the possibility of on‐the‐fly data processing. The system performance has been thoroughly assessed: the results show that it clearly outperforms the previous PC‐based solutions in terms of packet capturing power, while the timestamping accuracy is as good as that achieved by DAG cards. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献