Xia Daoxun

Xia Daoxun
Guizhou Normal University · Mathematics and Computer Science

About

24
Publications
3,317
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
117
Citations
Citations since 2017
16 Research Items
95 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
Introduction
Skills and Expertise

Publications

Publications (24)
Article
Visible-infrared person re-identification (VI-ReID) is a challenging and essential task that aims to retrieve a set of person images over visible and infrared camera views. In order to mitigate the impact of large modality discrepancy existing in heterogeneous images, previous methods attempt to apply generative adversarial network (GAN) to generat...
Preprint
Visible-infrared person re-identification (VI-ReID) is a challenging and essential task, which aims to retrieve a set of person images over visible and infrared camera views. In order to mitigate the impact of large modality discrepancy existing in heterogeneous images, previous methods attempt to apply generative adversarial network (GAN) to gener...
Article
Visible-thermal person re-identification (VT-ReID) is an emerging cross-modality matching problem, which aims to identify the same person across the daytime visible modality and nighttime thermal modality in the Internet of Things. Existing cutting-edge approaches consistently attempts to exploit image generation technique to generate cross-modalit...
Article
Visible-Infrared person reidentification (VI-ReID) is a challenging matching problem due to large modality variations between visible and infrared images. Existing approaches usually bridge the modality gap with only feature-level constraints, ignoring pixel-level variations. Some methods employ a generative adversarial network (GAN) to generate st...
Article
Full-text available
Recently, supervised person re-identification (Re-ID) algorithms have achieved great performance on benchmarks. However, it highly depends on labeled training samples and may not generalize well to new domains, limiting the applicability of person Re-ID in practical. To this end, we propose a novel unsupervised domain adaptive approach to transfer...
Article
Person re‐identification (Re‐ID) aims at identifying the same person across multiple non‐overlapping camera views. A number of existing methods have been presented for this task in a fully‐supervised manner that requires a large amount of training annotations. However, obtaining high quality labels is extremely time consuming and expensive. In this...
Article
Visible-infrared person re-identification (VI-ReID) aims to search the same pedestrian images across different modalities, which is a challenging task for video surveillance. Compared to RGB-based re-identification (Re-ID) with sufficient single-modality training samples, VI-ReID suffers from imbalanced dual-modality data which affects the accuracy...
Preprint
Visible-Infrared person re-identification (VI-ReID) is a challenging matching problem due to large modality varitions between visible and infrared images. Existing approaches usually bridge the modality gap with only feature-level constraints, ignoring pixel-level variations. Some methods employ GAN to generate style-consistent images, but it destr...
Article
The recent successful methods of person re-identification (person Re-ID) involving deep learning have mostly adopted supervised learning algorithms, which require large amounts of manually labelled data to achieve good performance. However, there are two important unresolved problems, dataset annotation is an expensive and time-consuming process, a...
Article
Full-text available
One of challenging tasks in the field of artificial intelligence is the human action recognition. In this paper, we propose a novel long-term temporal feature learning architecture for recognizing human action in video, named Pseudo Recurrent Residual Neural Networks (P-RRNNs), which exploits the recurrent architecture and composes each in differen...
Article
Full-text available
In this study, we developed a framework to localize human lying poses by a camera positioned above. Our framework is motivated by the fact that detecting lying poses is fundamentally more difficult than detecting pedestrians or localizing nondeformable objects such as cars, roads, and buildings due to the large number of poses, orientations, and sc...
Article
Full-text available
Lying-pose human detection is an active research field of computer vision in recent years. It has a good theoretical significance and furthermore many applications, such as victim detection or home service robot. But the study on lying-pose human detection in low-altitude overlooking images have many unsolved problems owing to multiple poses, arbit...
Article
Full-text available
Occlusion is one of the most challenging problems in visual object tracking. Recently, a lot of discriminative methods have been proposed to deal with this problem. For the discriminative methods, it is difficult to select the representative samples for the target template updating. In general, the holistic bounding boxes that contain tracked resul...
Article
Full-text available
A method for rotation-invariant lying-pose human body detection in overlooking images is proposed. The rotation-invariant histogram of oriented gradient using Fourier analysis in polar coordinate is exploited as descriptor for lying-pose human body. And then the authors used the exhaustive sliding window search strategy with multiple scale scan to...
Article
We propose a rotation and scale invariant method to locate people lying on the ground. Unlike conventional human-shape detection methods which assume that all human shapes are in upright position, a person lying on the ground can have arbitrary orientation and pose. Accounting for every possible body configuration would thus require a huge training...
Conference Paper
Web GIS has become an indispensable tool for managing, analyzing and decision making by seamlessly combining both spatial and non-spatial data. Open-source software has the advantages of low cost, high stability and security. So it has been chosen by the small and medium-sized Web GIS project. A complete stack for building Web GIS solutions can inc...
Conference Paper
As IT systems proliferate to support business processes, users and system administrators are faced with an increasingly complicated interface to accomplish their job functions, some uniform identity authentication systems are developed to integrate different application systems in recent years. However, most of them only can integrate C/S systems....
Conference Paper
An optimized streamline online score system is the key to score efficiently and effectively. In this paper, an approach of modeling and optimizing the online score process was proposed using the Hierarchical Colored Petri Nets (HCP-nets). Founded on the HCP-net based online score process model, CPN Tools, a Colored Petri Nets simulation tool, was a...
Conference Paper
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business process logic. Traditional workflow management models have obvious shortcomings in describing complex workflows. Such complexity is due not...
Article
With the explosive growth of the network, the workload on the servers is increasing rapidly so that servers will be easily overloaded for a short time. Linux virtual server (LVS) project which is an open source project overcomes the overloading problem of the servers. The three implemented ways of the virtual server is introduced. A LVS cluster of...
Conference Paper
At present, the non-linear equations have become a very important subject. For solving non-linear equations, we mostly use mechanical algorithms or other non-open source tools such as Matlab, Maple and so on. In this paper, according to the actual needs, by using numerical analysis and computer-related knowledge, the author designs and implements s...

Network

Cited By

Projects