Results 11 to 20 of about 780,767 (299)

End-to-End Network for Pedestrian Detection, Tracking and Re-Identification in Real-Time Surveillance System

open access: yesSensors, 2022
Surveillance video has been widely used in business, security, search, and other fields. Identifying and locating specific pedestrians in surveillance video has an important application value in criminal investigation, search and rescue, etc.
Mingwei Lei   +6 more
doaj   +1 more source

Quantifying Privacy Risks for Continuous Trait Data

open access: yesApplied Sciences, 2022
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing.
Muqing He   +5 more
doaj   +1 more source

Faster Person Re-identification [PDF]

open access: yes, 2020
Fast person re-identification (ReID) aims to search person images quickly and accurately. The main idea of recent fast ReID methods is the hashing algorithm, which learns compact binary codes and performs fast Hamming distance and counting sort. However, a very long code is needed for high accuracy (e.g. 2048), which compromises search speed.
Wang, G, Gong, S, Cheng, J, Hou, Z
openaire   +3 more sources

A General Framework for Reconstructing Full-Sample Continuous Vehicle Trajectories Using Roadside Sensing Data

open access: yesApplied Sciences, 2023
Vehicle trajectory data play an important role in autonomous driving and intelligent traffic control. With the widespread deployment of roadside sensors, such as cameras and millimeter-wave radar, it is possible to obtain full-sample vehicle trajectories
Guimin Su   +6 more
doaj   +1 more source

Re-Identification in Differentially Private Incomplete Datasets

open access: yesIEEE Open Journal of the Computer Society, 2022
Efforts to counter COVID-19 reaffirmed the importance of rich medical, behavioral, and sociological data. To make data available to many researchers who can conduct statistical analyses and machine learning, personally identifiable information must be ...
Yuichi Sei   +2 more
doaj   +1 more source

New Cyclopiane Diterpenes and Polyketide Derivatives from Marine Sediment-Derived Fungus Penicillium antarcticum KMM 4670 and Their Biological Activities

open access: yesMarine Drugs, 2023
Two new cyclopiane diterpenes and a new cladosporin precursor, together with four known related compounds, were isolated from the marine sediment-derived fungus Penicillium antarcticum KMM 4670, which was re-identified based on phylogenetic inference ...
Anton N. Yurchenko   +14 more
doaj   +1 more source

Illumination-Adaptive Person Re-Identification [PDF]

open access: yesIEEE Transactions on Multimedia, 2020
Accepted by ...
Zelong Zeng   +5 more
openaire   +2 more sources

Person Re-Identification via Attention Pyramid [PDF]

open access: yesIEEE Transactions on Image Processing, 2021
In this paper, we propose an attention pyramid method for person re-identification. Unlike conventional attention-based methods which only learn a global attention map, our attention pyramid exploits the attention regions in a multi-scale manner because human attention varies with different scales.
Guangyi Chen   +4 more
openaire   +3 more sources

Unsupervised Tracklet Person Re-Identification [PDF]

open access: yesIEEE Transactions on Pattern Analysis and Machine Intelligence, 2020
Accepted to appear in IEEE Transactions on Pattern Analysis and Machine Intelligence.
Minxian Li, Xiatian Zhu, Shaogang Gong
openaire   +4 more sources

Speaker Re-identification with Speaker Dependent Speech Enhancement [PDF]

open access: yes, 2020
While the use of deep neural networks has significantly boosted speaker recognition performance, it is still challenging to separate speakers in poor acoustic environments.
Hain, Thomas, Huang, Qiang, Shi, Yanpei
core   +2 more sources

Home - About - Disclaimer - Privacy