首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
王玮 《金秋科苑》2011,(6):180-181
提出了基于量子进化算法的人体跟踪方法。量子进化算法借鉴了量子计算的思想,具有较强的寻优能力和较快的运算速度,在基于量子进化算法的人体跟踪中,将跟踪置于函数优化框架内,视跟踪为在模型可行域内求解与图像观测特征具有最优匹配的模型的函数优化问题,并对此目标函数使用量子进化算法寻优。模拟场景实验表明,与基于粒子滤波的人体跟踪算法相比,基于量子进化算法的人体跟踪具有较高的跟踪精度和较快的运算速度。  相似文献   

2.
柴继贵 《科技通报》2012,28(8):72-73,76
主要研究了视频图像目标跟踪准确性问题。在基于核的颜色特征统计描述及以此建立视觉目标观测概率方法的基础上,提出了一种改进的粒子滤波视频图像目标跟踪算法。首先,本文给出了基于标准粒子滤波的单特征、单目标跟踪算法,然后针对加权样本参数的选择不同,提出改进思路,最后通过与基于均值移位视觉目标跟踪算法的实验结果对比。提出的改进的粒子滤波跟踪算法在稳健性方面有显著地提高,而且若适当选择视觉跟踪参数,在实时性方面能得到有效地保证。  相似文献   

3.
在对人体运动的分析中,关节旋转是人体运动的关键组成部分,研究肢体关节旋转助力模型提高对运动关节扩展解析能力,提高运动辅助训练水平,传统方法采用基于随机采样运动规划方法,存在对肢体关节的路标点移动路径规划不准确等问题。通过求解运动模式下的肢体全部关节的驱动作用力矩,提出一种运动链位姿变换坐标系下的肢体关节旋转助力模型建立方法。构建一种分层子维空间运动规划概念模型,保持下肢的左右脚和左右腿关节不动,设由腰部和左右手臂构成的运动链位姿变换坐标系,进行运动链位姿变换运动学设计,在运动链位姿变换坐标系下实现对肢体关节旋转助力模型改进设计。仿真结果表明,采用该模型,能有效准确地仿真计算出关节的驱动力矩,对关节力矩控制识别准确率较高,控制精度较高,对肢体受力力矩的计算和跟踪性能较好,有效指导体育训练。  相似文献   

4.
骆勇 《科技通报》2015,(2):116-118
对人体体育运动训练过程中的受力行为进行分解建模,可以定量分析人体受力特征,为实现多传感器信息融合的运动受力行为识别奠定基础。传统方法中采用熵聚类泛函的人体运动神经元受力行为分析方法,无法实现对复杂运动状态下的人体受力缺失数据的模拟和分析。提出一种基于RFID缺失数据概率泛函的人体运动受力行为分解,将加速度传感器与RFID结合,采用缺失数据概率泛函算法对感知的运动关节节点进行受力行为分解,提取了不同传感器节点输出信号关联特征,实现对人体运动特征行为分解算法和模型的改进。实验结果表明,该模型能准确采集到人体的上体和下肢的运动受力数据,受力行为分解准确具体,定量刻画人体在各种运动模型下的受力特性,从而指导运动训练,应用价值较高。  相似文献   

5.
在复杂运动训练场背景下对运动员的肌体行为特征的准确检测是实现运动技术行为跟踪和识别的重要基础,在比赛监测和训练指导方法具有重要的应用价值。运动场景具有不确定性,图像背景具有跳变性,检测较为困难。提出一种基于灰色关联的运动训练场景背景下的运动员肌体行为特征检测算法,人体在进行复杂场景模式的训练和肌体作用下,特别是在如足球运动、跑步运动时,骨骼围绕着关节作为支撑进行矢状面内的运动,通过对人体肌体的驱动模式动力学进行建模分析,采用先分割再填充的方法,获得不重影、不抖动的图像,通过灰色关联分析准确识别运动训练背景下的人体肌体行为特征,编制运动员的肌体行为识别软件系统,通过运动录像解析系统准确及时地反馈运动信息,提高体育运动训练的科学化水平,促进训练和比赛质量的提高。实验结果表明,该算法能满足运动场景中的全方位多尺度信息采集的肌体动作识别的要求,误检率较传统算法低,性能较好。  相似文献   

6.
在网络安全预测监护模型设计中,需要对网络安全监护信息进行数据融合和特征优选,以提高对变异特征的识别能力。传统方法中,采用蚁群算法进行监护信息特征优化融合进化和链路模型设计,算法无法实现相邻簇头之间的信息素融合,特征优化效果不好。针对这一问题,提出蚁群链运动多层博弈的网络监护信息融合特征优选算法,构建多层博弈网络监护数据样本驱动空间权矩阵模型,引入粗糙集理论,对蚁群引导的粗糙集前馈补偿网络进行动态博弈,实现网络安全监护数据的预测控制目标函数最佳寻优。构建多层博弈网络监护系统模型,得到蚁群链运动的监护信息数据状态跟踪模型,实现网络安全监护信息的融合特征优选改进。仿真实验表明,该算法能有效提高对异常信息的监护和检测能力,有较高的特征优选品质,展示了本文算法在对网络安全监护中的优越性能。  相似文献   

7.
传统的运动角度规范性智能判断方法采用运动链位姿变换坐标系特征分解方法,对运动过程中静态属性和动态属性无法区别判断,纠正效果不好。提出一种基于行为视觉分析的运动角度规范性智能判断方法。采用灰色关联分析方法,在肌体特征运动模式下,估计当前时刻下的运动状态,进行技术型运动项目的运动链位姿分析和技术特征分析,通过Gamma校正法对输入行为视觉图像进行运动角度空间标准化处理,采用行为视觉分析方法实现运动角度规范性智能判断方法改进。仿真结果表明,采用该法进行技术型运动项目的运动角度规范性智能判断,能有效准确地反应出运动的行为视觉特征,对技术特征跟踪标定性能较好,实现对技术型运动的规范性智能评价和判断。  相似文献   

8.
蒋金伟 《科技广场》2009,(11):30-32
粒子滤波算法是一种基于传播样本集的递归贝叶斯滤波器.本文中对粒子滤波算法原理以及在目标跟踪中的应用作了详细讨论,设计了目标模板更新方法.实验证明,粒子滤波跟踪算法具有很好的鲁棒性和抗遮挡、抗干扰性,但是计算量却很大.  相似文献   

9.
人体上肢运动链模型的准确构建和仿真设计是进行虚拟人体运动和控制的关键技术,是实现虚拟人体运动控制和模式识别的理论前提。传统方法采用几何法、解析法等模拟人体上肢运动链模型,无法有效实现人体上肢运动链的高自由度控制模拟,产生后期搜索迟钝效应。提出一种基于分层子维空间运动规划的人体上肢运动链六自由度模型构建方法,构建人体上肢运动的各关节单元,得到上肢结构及运动学模型D-H表示方法,设计上肢运动链位姿变换,基于分层子维空间运动规划方案,得到人体上肢运动链动力学模型方程,采用六自由度全关节分析方法分析上肢运动链各关节单元,实验得出该模型构建能更好模拟人体上肢运动链模型,控制误差较传统方法减小,能有效实现人体上肢运动链的高自由度控制模拟。  相似文献   

10.
《科技风》2017,(4)
由于目标的姿态和大小不断发生变化,本文通过对SIFT特征点的跟踪实现对目标可靠、稳定跟踪,即采用SIFT算法与光流算法相结合的跟踪算法。由于SIFT特征点存在分布太密集的现象,增加了后续跟踪算法的耗时性。针对以上这类问题,本文加入距离约束机制对SIFT算法进行改进。光流只适合小运动,本文采用基于图像金字塔模型的光流跟踪以适应大尺度运动。利用基于多尺度分层的金字塔结构,实现小窗口捕获大运动。通过实验证明,本文所采用的算法相对于传统光流具有更好的鲁棒性和稳定性,能得到更加准确的目标位置。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

17.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号