Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Yun-Fu | en_US |
dc.contributor.author | Guo, Jing-Ming | en_US |
dc.contributor.author | Hsia, Chih-Hsien | en_US |
dc.contributor.author | Su, Sheng-Yao | en_US |
dc.contributor.author | Lee, Hua | en_US |
dc.date.accessioned | 2015-07-21T11:20:46Z | - |
dc.date.available | 2015-07-21T11:20:46Z | - |
dc.date.issued | 2014-11-01 | en_US |
dc.identifier.issn | 1556-6013 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TIFS.2014.2355495 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/123945 | - |
dc.description.abstract | Formerly, dimensionality reduction techniques are effective ways for extracting statistical significance of features from their original dimensions. However, the dimensionality reduction also induces an additional complexity burden which may encumber the real efficiency. In this paper, a technique is proposed for the reduction of the dimension of samples rather than the features in the former schemes, and it is able to additionally reduce the computational complexity of the applied systems during the reduction process. This method effectively reduces the redundancies of a sample, in particular for those objects which possess partially symmetric property, such as human face, pedestrian, and license plate. As demonstrated in the experiments, based upon the premises of faster speeds in training and detection by a factor of 4.06 and 1.24, respectively, similar accuracies to the ones without considering the proposed method are achieved. The performance verifies that the proposed technique can offer competitive practical values in pattern recognition related fields. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Sample refinement | en_US |
dc.subject | dimension reduction | en_US |
dc.subject | data reduction | en_US |
dc.subject | face detection | en_US |
dc.subject | pedestrian detection | en_US |
dc.title | Sample Space Dimensionality Refinement for Symmetrical Object Detection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TIFS.2014.2355495 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | en_US |
dc.citation.issue | 11 | en_US |
dc.citation.spage | 1953 | en_US |
dc.citation.epage | 1961 | en_US |
dc.contributor.department | 電控工程研究所 | zh_TW |
dc.contributor.department | Institute of Electrical and Control Engineering | en_US |
dc.identifier.wosnumber | WOS:000344541100001 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.