Intelligent Data Processing of Marine Target Tracking Process Based on Fuzzy clustering

Author(s):  
Zheng Zhang ◽  
Yanwei Du
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Haibo Pang ◽  
Qi Xuan ◽  
Meiqin Xie ◽  
Chengming Liu ◽  
Zhanbo Li

Target tracking is a significant topic in the field of computer vision. In this paper, the target tracking algorithm based on deep Siamese network is studied. Aiming at the situation that the tracking process is not robust, such as drift or miss the target, the tracking accuracy and robustness of the algorithm are improved by improving the feature extraction part and online update part. This paper adds SE-block and temporal attention mechanism (TAM) to the framework of Siamese neural network. SE-block can refine and extract features; different channels are given different weights according to their importance which can improve the discrimination of the network and the recognition ability of the tracker. Temporal attention mechanism can update the target state by adjusting the weights of samples at current frame and historical frame to solve the model drift caused by the existence of similar background. We use cross-entropy loss to distinguish the targets in different sequences so that their distance in the feature domains is longer and the features are easier to identify. We train and test the network on three benchmarks and compare with several state-of-the-art tracking methods. The experimental results demonstrate that the algorithm proposed is superior to other methods in tracking effect diagram and evaluation criteria. The proposed algorithm can solve the occlusion problem effectively while ensuring the real-time performance in the process of tracking.


2014 ◽  
Vol 998-999 ◽  
pp. 1227-1230
Author(s):  
Jing Wang ◽  
Dong Ming Wang

The disaster-carrying bodies’ comprehensive vulnerability is a key to the risk research of urban disaster. Vulnerability is a comprehensive attribute of the hazard-carrying bodies and is affected deeply by society, economic and environment. The index system of the vulnerability assessment is worked out with the method of variable fuzzy clustering. The comprehensive vulnerability index model is structured, and the comprehensive vulnerability is calculated in the following example. Comparative to the existing research, variable fuzzy clustering and comprehensive vulnerability index model are more objective in data processing and the influence of the clustering categories is reduced.


Author(s):  
Л.Д. Егорова ◽  
Л.А. Казаковцев

В статье обсуждается применение методов фрактального анализа для решения задачи автоматической фильтрации сигнала ЭЭГ от артефактов различной природы. Изучается возможность использования показателя Херста в качестве информативного признака для алгоритмов интеллектуальной обработки данных. The article discusses the possibility of using fractal analysis to solve the problem of automatic filtering of the EEG signal from artifacts of various nature. The possibility of using the Hurst exponent as an informative feature for intelligent data processing algorithms is investigated


Sign in / Sign up

Export Citation Format

Share Document