scholarly journals Committee-Voting mechanism based on Graph for Semisupervised Person Re-identification

2021 ◽  
Vol 2024 (1) ◽  
pp. 012035
Author(s):  
Lin Zhang ◽  
Xiuyang Zhao
Author(s):  
Ian Ayres ◽  
Colin Rowat ◽  
Nasser Zakariya

2021 ◽  
Author(s):  
Ye Jin ◽  
Qinying Chen ◽  
Jie Qian ◽  
Jialing Liu ◽  
Jianhua Zhang

Author(s):  
Guohua Wu ◽  
Xupeng Wen ◽  
Ling Wang ◽  
Witold Pedrycz ◽  
P. N. Suganthan

2009 ◽  
Vol 56 (1) ◽  
pp. 95-110 ◽  
Author(s):  
Irena Radovic

The eastward enlargement of the Euro area entails significant implications for the accession candidates in Central and Eastern Europe (CEE), the existing Euro system and the monetary policy of the European Central Bank (ECB). The present analysis assesses the challenges and critical aspects in monetary policy modeling with special emphasis to enlargement. The focus is on the difficulty of implementing a unique currency policy in view or growing heterogeneity within the enlarged monetary union, and secondly - the issue of the voting mechanism within the ECB. When analyzing those two issues, it is conclusive that the difficulties for the ECB and the current Euro zone members will increase. For the enlarged Euro zone, which is becoming more divergent, it will be very hard to find adequate recipes to meet the needs and requirements of all. The big question is: whether centralization of monetary policy is a sustainable and superior solution?.


2021 ◽  
Vol 10 (8) ◽  
pp. 559
Author(s):  
Qifei Zhou ◽  
Changqing Zhu ◽  
Na Ren

How to keep the fidelity of the digital elevation model (DEM) data is a crucial problem in the current watermarking research, as the watermarked DEM data need to preserve their accuracy. We proposed a zero watermarking method for the triangulated irregular network (TIN) DEM data. It takes full advantage of the characteristics of the edge length in the TIN DEM data. First, the radio of the edge lengths is quantified to the watermark index, and then the comparison of the edge lengths is quantified to the watermark bit. Finally, the watermark is constructed by combing the watermark bits according to the watermark indices with the help of the majority voting mechanism. In the method, the TIN DEM data are only used to construct the watermark, not to be embedded by the watermark. Therefore, the data quality is preserved to the greatest extent. Experiments verify the theoretical achievements of this method and demonstrate the method is lossless to the TIN DEM data. Simulation results also show that the method has good robustness on translation, rotation, scaling, and cropping attacks.


Author(s):  
Lei Guo ◽  
Hongzhi Yin ◽  
Qinyong Wang ◽  
Bin Cui ◽  
Zi Huang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document