摘要:
Systems and methods are disclosed to search for a query image, by detecting local invariant features and local descriptors; retrieving best matching images by quantizing the local descriptors with a vocabulary tree; and reordering retrieved images with results from the vocabulary tree quantization.
摘要:
A Web browser or operating system of a computer maintains a historical URL list of Web sites and Web pages that have been accessed in the past. When a prescan module of antivirus software performs an initial prescan of a computer before the antivirus software is installed, it queries this historical URL list to obtain the URLs that have been accessed in the past. These URLs are sent to a URL online query service located remotely over the Internet in order to determine the status of any of these URLs. Each URL is attempted to be matched with a database of known malicious URLs including associated malicious files and associated cleanup patterns. The query service then informs the requesting computer of the status of a particular URL sent, sending back any related malicious files and any appropriate cleanup pattern. A time period associated with each URL in the database indicates when it is known that the URL was malicious.
摘要:
The present invention discloses an integrated analysis device for simultaneously detecting exhaled breath condensates (EBCs) and volatile organic compounds (VOCs) in human exhaled breath. The device comprises a module for sampling, separating and enriching a detected object, an EBCs detection module and a combined VOCs detection module. The module for sampling, separating and enriching a detected object is connected with the EBCs detection module via a syringe pump for sample injection. The module for sampling, separating and enriching a detected object is connected with the combined VOCs detection module by a capillary separation column. In the present invention, it is achieved that EBCs and VOCs in human exhaled breath are simultaneously sampled, separated and condensed; the heavy metal ions, cell factors, etc. in the collected EBCs are detected with a light addressable potentiometric sensor (LAPS); the condensed VOCs can be quantitatively detected by the combined VOCs detection module with a high sensitivity; and a heating rod and a platinum resistor can be conveniently replaced because a separated outlet heating piece is designed in the combined VOCs detection module.
摘要:
Systems and methods are disclosed to recognize clothing from videos by detecting and tracking a human; performing face alignment and occlusal detection; and performing age and gender estimation, skin area extraction, and clothing segmentation to a linear support vector machine (SVM) to recognize clothing worn by the human.
摘要:
Systems and methods are disclosed to classify an input image by determining a spatial-pyramid image representation based on sparse coding; determining a descriptor for each interest point in the input image; encoding the descriptor; and applying max pooling to form the spatial pyramid representation of images.
摘要:
Systems and methods are disclosed to recognize human action from one or more video frames by performing 3D convolutions to capture motion information encoded in multiple adjacent frames and extracting features from spatial and temporal dimensions therefrom; generating multiple channels of information from the video frames, combining information from all channels to obtain a feature representation for a 3D CNN model; and applying the 3D CNN model to recognize human actions.
摘要:
Systems and methods are disclosed to recognize clothing from videos by detecting and tracking a human; performing face alignment and occlusal detection; and performing age and gender estimation, skin area extraction, and clothing segmentation to a linear support vector machine (SVM) to recognize clothing worn by the human.
摘要:
The invention relates to a method for the computer-assisted identification of a class of VoIP calls of a first type (spam) in a communication network (internet). Said communication network has a plurality (N) of first subscribers (Tn1-1, . . . , Tn1-5) and a plurality (M) of second subscribers (Tn2-1, . . . , Tn2-7), the first and the second subscribers being allocated a definite characteristic (IP address, telephone number, e-mail address) wherein, at least some of the first subscribers (Tn1-1, . . . , Tn1-5) are allocated, respectively, with at least one list (white list, black list) which contains at least one definite characteristic of the second subscriber. During a call of one of the second subscribers to one of the first subscribers, a control screens to see whether the characteristic of the second subscriber is on the list of the first subscriber and in the event that the second subscriber is not on the list of the called first subscribers, the lists of the additional first subscriber are used to make a decision whether the call is classified as a call of the first type (spam or trusted caller).
摘要:
A compound of ferrous L-threonate with structure (I), its compostions and methods useful for iron supplementation for mammals, particularly for human body to improve and treat nutritional iron-deficiency anemia, blood loss anemia and hemolytic anemia.