-
14441
Design of Sports Image Contour Feature Acquisition System Based on the Background Subtraction Method
Published 2022-01-01“…We propose two methods are improved and fused, respectively, and the fusion algorithm is applied to the complex scene for MTD, so as to improve the accuracy of MTD in complex and hybrid scenes. …”
Get full text
Article -
14442
SVM classifier for telecom user arrears based on boundary samples-based under-sampling approaches
Published 2017-09-01“…Telecom users’ arrears forecasting is a classification problem of unbalanced data set.To deal with the problem that the traditional SVM on the unbalanced date set had a low detection accuracy of minority class,a novel method was proposed.Based on the fact that the position of classification plane was determined by the boundary samples,the proposed method was implemented via removing some of samples closed to the classification plane to avoid the deficiency of the traditional SVM algorithm.Finally,the proposed method was compared with other approaches on unbalanced data sets.The simulation results show that the proposed method can not only increase the detection accuracy of minority but also improve the overall classification performance.…”
Get full text
Article -
14443
Fuzzy reasoning model for analysis of program maliciousness
Published 2010-01-01“…Finally, whether the program is malicious was determined approximately using a fuzzy reasoning algorithm. Experimental results show that the prototype based on this model is good at detecting unknown malicious programs and malware variants.…”
Get full text
Article -
14444
Analysis on the degree of freedom of interference alignment in cognitive radio
Published 2016-02-01“…An improved minimum interference leakage algorithm was proposed, with which the conclu-sion was verified.…”
Get full text
Article -
14445
Research progress of blockchain network covert channel
Published 2022-09-01“…Characterized by decentration, anonymity, strong robustness and tamper resistance, blockchain accompanied by digital currency is a natural carrier for building the covert communication channel.First, the definition and development history of the network covert channel, the framework of blockchain technology and the traditional network covert channel were introduced and the advantages of the channel in the blockchain were given.Thus, the channel in blockchain was classified on the basis of transaction address, signature algorithm, smart contract and P2P broadcast mechanism.The merits and demerits were analyzed in terms of crypticity, transmission efficiency, and communication costs.Lastly, problems and the future research direction of the network covert channel in blockchain were presented.…”
Get full text
Article -
14446
Selection scheme of mobile sinks in wireless sensor networks
Published 2008-01-01“…By taking the ubiquitous nature of mo- bile devices into consideration, different selection schemes of mobile sinks in M2S2N were compared, and an opportunis- tic transmission scheduling algorithm (OTSA) for M2S2N was further proposed. Simulation results indicate that the pro- posed sink selection scheme in OTSA-M2S2N is effective and can significantly improve the performance such as energy efficiency and successful transmission ratio.…”
Get full text
Article -
14447
Separation method of predistortion for Wiener PA
Published 2005-01-01“…The method first separated memory subsystem and nonlinear subsystem from Wiener PA, and then got their corresponding predistortion subsystems by identification algorithm. At last, it combined the two subsystems to a Hammerstein system and then linearized Wiener PA. …”
Get full text
Article -
14448
A video encryption in HEVC entropy coding based on magic square
Published 2018-03-01“…In view of the multimedia information security,based on the entropy module on high efficiency video coding (HEVC/H.265),combined with the magic square,a real time and high efficiency encryption technique for high-definition video streaming was proposed.The algorithm which had an effective use of transform coefficient sparsity enabled coefficient group (CG) of transform block (TB) scrambling,and used a selective encryption on syntax elements in CG's entropy.The experiments prove that the investigated scheme has high security,which can guarantee the standard compliance and the demand of video encryption while having a low impact on encoding-rate performance.…”
Get full text
Article -
14449
A study of the stored energy in titanium under deformation and failure using infrared data
Published 2013-03-01“…The original mathematical algorithm for experimental data processing has been applied to obtain the rate of heat dissipation generated by plastic deformation and stored energy. …”
Get full text
Article -
14450
Research on intelligent scheme of telecommunication network
Published 2023-03-01“…The network of telecom operators needs to be promoted urgently in agility, efficiency and intelligence to realize its self-configuration, self-management and self-optimization.However, due to the inconsistent development route and technical characteristics between AI and communication network, how to deeply integrate AI and communication network is necessary to be considered systematically.Based on the development of the telecommunication network intelligence industry, and on the basis of the analysis of the needs of telecom operators for intelligence and the assessment of the status quo, the goal and technical scheme of telecommunication network intelligence were proposed, which covered the intelligent framework, intelligent functional modules and processes, data processing, algorithm model construction and integration.The scheme was helpful to promote the large-scale intellectualization of telecom operators and improve operational efficiency.…”
Get full text
Article -
14451
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01“…Currently,the research focuses on the routing strategies of lightweight network. The routing algorithm has the large overhead and small applications,which is mainly based on IPv4. …”
Get full text
Article -
14452
-
14453
Repairbads: An automatic and adaptive method to repair bad channels and segments for OPM-MEG
Published 2025-02-01“…Repairbads employs Riemannian Potato combined with joint decorrelation to project out artifact components, achieving automatic bad segment repair. Then, an adaptive algorithm is used to segment the signal into relatively stable noise data chunks, and the source-estimate-utilizing noise-discarding algorithm is applied to each chunk to achieve automatic bad channel repair. …”
Get full text
Article -
14454
Upper Elevational Limit of Vegetation in the Himalayas Identified from Landsat Images
Published 2024-12-01“…Subsequently, the Canny edge detection algorithm was applied to identify vegetation edge pixels, and elevation differences were utilized to determine the upper edges of the vegetation. …”
Get full text
Article -
14455
CCD Standard Curve Fitting for Microarray Detection Base on Multi-Layer Perceptron
Published 2024-01-01“…In view of the poor curve fitting performance of LSA, Weighted Least Squares (WLS), and Penalized Least Squares (PLS), as well as the small dataset, this paper proposes the Multi-Layer Perceptron (MLP) neural network algorithm with the minimization of relative error as the constraint, which is applied to the standard curve fitting of the scanner. …”
Get full text
Article -
14456
Late-onset first epileptic seizure and cerebral small vessel disease: role of juxtacortical white matter lesions
Published 2025-01-01“…WML segmentation was performed on FLAIR images using the SPM based automated lesion prediction algorithm of the LST toolbox and careful manual adjustment. …”
Get full text
Article -
14457
Machine learning model and nomogram to predict the risk of heart failure hospitalization in peritoneal dialysis patients
Published 2024-12-01“…The performance was validated using fivefold cross-validation. The optimal ML algorithm was used to construct the models to predictive the risk of the HF and all-cause mortality. …”
Get full text
Article -
14458
Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform
Published 2014-01-01“…The phase key for decryption is obtained by an iterative phase retrieval algorithm. The proposed scheme has been validated for grayscale secret target images, by numerical simulation. …”
Get full text
Article -
14459
Cardinality-constrained structured data-fitting problems
Published 2024-05-01“…Dual-based atom-identification rules reveal the structure of the optimal primal solution from near-optimal dual solutions, which allows for a simple and computationally efficient algorithm that translates any feasible dual solution into a primal solution satisfying the cardinality constraint. …”
Get full text
Article -
14460
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01“…A class of neighborhood-relation signatures(NRS) was proposed based on neighborhood relationship between worm bytes.Because NRS embodies common characteristics of different morph of some polymorphic worms,Different patterns of polymorphic worms efficiently were detected.NRS generating algorithm(NRSGA) was designed to generate three types of signatures: 1-NRS,2-NRS and(1,2)-NRS.Some experiments were performed to demonstrate the correct-ness of the process of signatures generation and the effectiveness of NRS.Experiment results show that our approach has lower false negative ratio in detecting worms,and is effective to prevent polymorphic worms from propagating.…”
Get full text
Article