Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Quantitative detection of face location in videos
WEI Wei, MA Rui, WANG Xiaofang
Journal of Computer Applications    2017, 37 (3): 801-805.   DOI: 10.11772/j.issn.1001-9081.2017.03.801
Abstract544)      PDF (869KB)(452)       Save
Available face detection and evaluation standards are usually only a qualitative detection of the face existing, and have no strict norms for the quantitative description of the face location in videos.In addition, some researches such as video face replacement have higher requirements for the continuity of the face position in the video sequences. To solve these two problems, compared with the previous face detection algorithms and the face tracking evaluation standards, a quantitative detection standard of the human face position in the video was proposed, and a modified method of video face position detection was put forward. The initial face location was firstly detected in the target area by the improved Haar-Like cascade classifier; then the pyramid optical flow method was used to predict the position of the face, at the same time the forward-backward error detection mechanism was introduced to the self-checking of results, and finally the location of human face was determined. The experimental results show that the detection standard can give the evaluation of the quantitative description of the detection algorithm in the video face detection, and the proposed detection algorithm has a great improvement in the time consistency of face position in the detection results.
Reference | Related Articles | Metrics
Database watermarking algorithm based on parity modulation in two-dimension space
MA Rui-min CHEN Ji-hong
Journal of Computer Applications    2012, 32 (08): 2268-2270.   DOI: 10.3724/SP.J.1087.2012.02268
Abstract734)      PDF (487KB)(334)       Save
To decrease the modification of original data during the process of database watermarking, and to make watermark information more secretly, an algorithm based on parity modulation in two-dimensional space was proposed. One dimension was made up of primary keys' Hash values, the other was made up of numeric attributes' redundant bits. Watermark information was embedded by modulating the parity of Hash values and redundant bits. After watermarking, the modification of data average was 0.5296×10^(-2)%, and the modification of data variance was 0.6509×10^(-4)%. The experimental results indicate that the modification amount of original data is reduced and this algorithm is efficient and robust.
Reference | Related Articles | Metrics
Modeling and analysis of multiple input multiple output MAC under link quality of service constraints
DENG Xue-bo WANG Xiao-qiang CHEN Xi MA Rui LIAO Yong LI Ping NIU Xiao-jun
Journal of Computer Applications    2012, 32 (07): 1844-1848.   DOI: 10.3724/SP.J.1087.2012.01844
Abstract843)      PDF (783KB)(583)       Save
To solve the insufficiency of Stream Control Multiple Access (SCMA) protocol that it fails to consider both the link Quality of Service (QoS) and the channel access scheduling policy of Multiple Input Multiple Output (MIMO) stream, this paper put forward a SCMA/QA protocol. This protocol fully considered the channel states of different streams in each link and built up a discrete Markov chain model based on channel state of stream. Moreover, it took the request of QoS in each link into consideration and adopted fixed Request to Send/Clear to Send (RTS/CTS) to exchange the information of link QoS and taking the link QoS weight as a primary case in link decision, made the link scheduling problem based on QoS of MIMO modeled as an optimization problem, which led to the result of optimal link and the number of communication streams under the Karush-Kuhn-Tucker (KKT) conditions. Finally, according to the numerical analysis which set throughput as the parameter of the QoS, the results show that under the same network environment the SCMA/QA improves the system throughput much better than SCMA and QoS-aware Cooperation SCMA (QCSCMA).
Reference | Related Articles | Metrics
Signal noise separation algorithm based on morphology gradient
YAN Tian-feng MA Rui
Journal of Computer Applications    2011, 31 (11): 2922-2925.   DOI: 10.3724/SP.J.1087.2011.02922
Abstract1167)      PDF (582KB)(450)       Save
In automatic measurement of the radio spectrum parameters, the traditional threshold-based method is difficult to obtain satisfactory result when the spectrum has undulating background noise. To solve this problem, this paper proposed a signal noise separation algorithm based on morphological gradient to separate signals from background noise by detecting edges of signals. The experimental results show that this algorithm can deal with the spectrum with undulating background noise, and get more accurate separation result than the traditional method.
Related Articles | Metrics
Design and implementation of the full wireless video alarm system
ZHONG Qian,MA Rui-fang,SONG Ya-nan, WANG Jian-yong
Journal of Computer Applications    2005, 25 (06): 1439-1441.   DOI: 10.3724/SP.J.1087.2005.01439
Abstract838)      PDF (163KB)(1000)       Save
This paper introduced a novel solution of a embedded alarm system based on the wireless video technology. This system integrated the advanced network technology, the wireless communication technology and the multimedia technology. It could send the real-time pictures collected by the video surveillance system to the user’s mobile telephone or email box,so the user could easily know the status of the locale.
Related Articles | Metrics