Xinqi Lin

Learn More
Affective content analysis is an unsolved technical problem in sophisticated video retrieval and high-level applications. In order to recognize emotion types of video scenes, a new algorithm, which composes of two sub-models, is proposed. Firstly, the sub-models of two low-level features extraction are built up based on the film grammars. Secondly, a(More)
In this paper, research for the cell search of the LTE TDD system and the initialization of carrier frequency offset estimation algorithm, theoretical derivation is given from timing synchronization and sector ID detection algorithm. In this work, simulated and researched the performance of cell search algorithm in the spread of multi-path environment.(More)
One important but often overlooked aspect of human interpretation of multimedia data is the affective information. Affective labels of video content can be extracted automatically from multimedia data streams. These can then be used for content-based retrieval and browsing. In this paper we propose an approach to retrieve the video clips which are similar(More)
In this paper, we propose a practical, efficient and real-time technique to estimate the end-to-end available bandwidth in the condition of probe packets losing. One of main ideas of the proposed technology is compensation mechanism, which uses a least square method to approximately compensate the losing packets based on polynomial-mimesis technology in the(More)
In this paper, a new method for detecting shot boundaries in video sequences using Box-Counting to extract texture feature and judging the shot boundaries by an improve method to get a dynamic threshold is proposed. Many techniques have been developed to detect the video shot boundaries. But automatic shot boundary detection is difficult. In particular,(More)
Image spam is a recent variant of spam, which can easily circumvent widely text spam filters. In this paper, we propose a new method of filtering image spam, which is called FH (file properties and histogram) algorithm. FH algorithm utilizes file properties and histogram (gray histogram or color histogram), and is a fast method because of not extracting(More)
CONTEXT Polymorphisms of the interferon lambda 3 (IFNL3) gene have been proposed to be associated with drug-induced clearance of the hepatitis C virus (HCV). However, the role of IFNL3 polymorphisms in the prediction of treatment on chronic hepatitis B (CHB) patients have yielded controversial results. The aim of this study was to clarify the role of IFNL3(More)
A fair non-repudiation security protocol can provide non-repudiation proof for two parts of the exchange at the same time, or both get nothing. But many protocols performed weak in logical analysis. In this paper, a group of new protocols(with 3 sub-protocols) with off-line The Third Party(TTP) are presented. We analysis them with a new Kailar logic(More)
A fair e-commence protocol can help the Value-Added Service Provider(VASP) and users deal with the exchange safely and efficiently. In this paper, we firstly analyze a PPV(Pay-Per-View) protocol, and find some potential shortcomings and limitations. By multiplying the HASH chains technology, we employ a couple of HASH chains as billing cell, and improve the(More)