نتایج جستجو برای: kde method
تعداد نتایج: 1630870 فیلتر نتایج به سال:
Kernel density estimation (KDE) is a commonly used method for spatial point pattern analysis, but it computationally demanding when analyzing large datasets. GPU-based parallel computing has been adopted to address such computational challenges. The existing GPU-parallel KDE method, however, utilizes only one GPU computing. Additionally, assumes that the input data can be held in memory all at ...
5 Nonparametric estimation 12 5.1 A one-dimensional example . . . . . . . . . . . . . . . . . . . . . 13 5.2 Problems with the histogram approximation of p.d.f. . . . . . . . 15 5.3 Make your examples far-reaching . . . . . . . . . . . . . . . . . . 16 5.4 Kernel density estimation . . . . . . . . . . . . . . . . . . . . . . 16 5.5 Bandwidth selection . . . . . . . . . . . . . . . . . . . . . ....
In real scenes, dynamic background and moving cast shadow always make accurate moving object detection difficult. In this paper, a probabilistic framework for moving object segmentation in dynamic scenes is proposed. Under this framework, we deal with foreground detection and shadow removal simultaneously by constructing probability density functions (PDFs) of moving objects and non-moving obje...
We have studied the genomic structure and evolutionary pattern of immunoglobulin kappa deleting element (KDE) and three kappa enhancers (KE5', KE3'P, and KE3'D) in eleven mammalian genomic sequences. Our results show that the relative positions and the genomic organization of the KDE and the kappa enhancers are conserved in all mammals studied and have not been affected by the local rearrangeme...
We participated in the Learning Task of the TREC 2010 Legal Track, focusing solely on estimating probabilities of relevance. We submitted three automated runs based on the same tf.idf ranking, produced by the topic narratives and positive-only feedback of the training data in equal contributions. The runs differ in the way the probabilities of relevance are estimated: (1) DUTHsdtA employed the ...
Recently, surveillance, security, patrol, search, and rescue applications increasingly require algorithms and methods that can work automatically in real time. This paper reports a new real-time approach based on three novel techniques for automatic detection, object identification, and tracking in video streams, respectively. The novelty detection and object identification are based on the new...
Proponents of Free Software have argued that some of the most established software engineering principles do not fully apply when considered in an open, distributed approach. Among these principles, “Brooks’ Law” has been questioned in the Free Software context: large teams of developers, contrary to the law, will not need an increasingly growing number of communication channels. As advocates c...
The melting of perennial ice patches globally is uncovering a fragile record of alpine activity, especially hunting and the use of mountain passes. When rescued by systematic fieldwork (glacial archaeology), this evidence opens an unprecedented window on the chronology of high-elevation activity. Recent research in Jotunheimen and surrounding mountain areas of Norway has recovered over 2000 fin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید