Learn More
—Clustering is one of the most popular methods for exploratory data analysis, which is prevalent in many disciplines such as image segmentation, bioinformatics, pattern recognition and statistics etc. The most famous clustering algorithm is K-means because of its easy implementation, simplicity, efficiency and empirical success. However, the real-world(More)
Clustering is one of the most popular methods for data analysis, which is prevalent in many disciplines such as image segmentation, bioinformatics, pattern recognition and statistics etc. The most popular and simplest clustering algorithm is K-means because of its easy implementation, simplicity, efficiency and empirical success. However, the real-world(More)
Recently, State of energy (SOE) has become one of the most fundamental parameters for battery management systems in electric vehicles. However, current information is critical in SOE estimation and current sensor is usually utilized to obtain the latest current information. However, if the current sensor fails, the SOE estimation may be confronted with(More)
A nested model with multiple features is represented to accurately detect moving objects and their shadows in outdoor and indoor scenes, even when the moving objects and their shadows have similar color to the background or when there is background motion. Bag of features (color, texture and movement patterns) is first extracted in each frame of an image(More)
Computer network collaborative defense is used to protect networks from collaborative attacks. To ensure the credible of defense entities, trust relationships are necessary to be established. When there are not enough history records for reputation evaluation, the reputation bootstrapping technique to establish an initial reputation value for newcomers(More)
User interest modeling is the core of personalized services. It is applied in the fields of information retrieval, data mining, e-commerce and personalized recommendation to improve the quality of information services. Most of traditional user interest models are built on VSM using keywords as the user interest. However, these models not only ignore the(More)
We present a two-stage method to accurately segment single or multiple moving objects and their shadows, especially when the moving objects have similar chromaticity and intensity to their shadows or when they are immersed in the shadows of other moving objects. Our algorithm first detects potential shadows via brightness ratios at each motion region, which(More)
Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a(More)