Showing 4,921 - 4,940 results of 67,915 for search 'DASB~', query time: 2.51s Refine Results
  1. 4921

    Effect of time delay on a detritus-based ecosystem by Nurul Huda Gazi, Malay Bandyopadhyay

    Published 2006-01-01
    “…Models of detritus-based ecosystems with delay have received a great deal of attention for the last few decades. …”
    Get full text
    Article
  2. 4922
  3. 4923

    Novel reversible data hiding based on difference expansion by Jian-gao LUO, Guo-qiang HAN, Yan WO

    Published 2016-02-01
    Subjects: “…reversible data hiding…”
    Get full text
    Article
  4. 4924
  5. 4925
  6. 4926

    Image denoising algorithm based on multi-channel GAN by Hongyan WANG, Xiao YANG, Yanchao JIANG, Zumin WANG

    Published 2021-03-01
    “…Aiming at the issue that the noise generated during image acquisition and transmission would degrade the ability of subsequent image processing, a generative adversarial network (GAN) based multi-channel image denoising algorithm was developed.The noisy color image could be separated into red-green-blue (RGB) three channels via the proposed approach, and then the denoising could be implemented in each channel on the basis of an end-to-end trainable GAN with the same architecture.The generator module of GAN was constructed based on the U-net derivative network and residual blocks such that the high-level feature information could be extracted effectively via referring to the low-level feature information to avoid the loss of the detail information.In the meantime, the discriminator module could be demonstrated on the basis of fully convolutional neural network such that the pixel-level classification could be achieved to improve the discrimination accuracy.Besides, in order to improve the denoising ability and retain the image detail as much as possible, the composite loss function could be depicted by the illustrated denoising network based on the following three loss measures, adversarial loss, visual perception loss, and mean square error (MSE).Finally, the resultant three-channel output information could be fused by exploiting the arithmetic mean method to obtain the final denoised image.Compared with the state-of-the-art algorithms, experimental results show that the proposed algorithm can remove the image noise effectively and restore the original image details considerably.…”
    Get full text
    Article
  7. 4927

    Dynamic scheduling algorithm for streaming media based on CDN by YANG Ge1, FAN Xiu-mei3

    Published 2009-01-01
    “…The scheme that the patch bytes were segmented and cached was employed.The cache window size was up-dated periodically according to the popularity of streaming media object.The principle was obeyed that the data cached for each streaming media object were in proportion to their popularity at the proxy server.Simulation results show that the strategy is more adaptive than MBP(multicast batched patching) algorithm and OBP(optimized batch patch-ing)+prefix & patch caching algorithm.It can significantly reduce patching data through patching channel under the cir-cumstance of the same maximum cache space.It can effectively reduce the server load and network bandwidth usage on backbone link.It can also save the transmission cost.…”
    Get full text
    Article
  8. 4928

    Neuroplasticity of Acupuncture for Stroke: An Evidence-Based Review of MRI by Jinhuan Zhang, Chunjian Lu, Xiaoxiong Wu, Dehui Nie, Haibo Yu

    Published 2021-01-01
    “…Magnetic resonance imaging (MRI), as a noninvasive, high anatomical resolution technique, has been employed to investigate neuroplasticity on acupuncture in stroke patients from a system level. …”
    Get full text
    Article
  9. 4929

    Application audit technology based on the combination of cloud and terminal by Yongjun HUANG, Dongxin LIU, Huamin JIN, Guorong LIU, Laifu WANG, Jun SHEN

    Published 2018-02-01
    “…The flourish and popularity of Android terminals have greatly changed the peoples’ daily life and also brought new conditions to the internet Dark Industry Chain.The features of advanced malicious programs on intelligent terminals,and the reasons why an audit method of network activities was needed were discussed.At last,a solution was proposed,including the data collecting,the process of auditing and the management of audit policies.…”
    Get full text
    Article
  10. 4930
  11. 4931
  12. 4932

    Gamma norm minimization based image denoising algorithm by Hongyan WANG, Tuo WANG, Mian PAN, Zumin WANG

    Published 2020-10-01
    “…Focusing on the issue of rather poor denoising performance of the traditional kernel norm minimization based method caused by the biased approximation of kernel norm to rank function,based on the low-rank theory,a gamma norm minimization based image denoising algorithm was developed.The noisy image was firstly divided into some overlapping patches via the proposed algorithm,and then several non-local image patches most similar to the current image patch were sought adaptively based on the structural similarity index to form the similar image patch matrix.Subsequently,the non-convex gamma norm could be exploited to obtain unbiased approximation of the matrix rank function such that the low-rank denoising model could be constructed.Finally,the obtained low-rank denoising optimization issue could be tackled on the basis of singular value decomposition,and therefore the denoised image patches could be re-constructed as a denoised image.Simulation results demonstrate that,compared to the existing state-of-the-art PID,NLM,BM3D,NNM,WNNM,DnCNN and FFDNet algorithms,the developed method can eliminate Gaussian noise more considerably and retrieve the original image details rather precisely.…”
    Get full text
    Article
  13. 4933

    Wireless sensor node localization based on IPSO-MC by Yongyan LI, Jianping WU

    Published 2020-03-01
    “…To solve the problem of insufficient node positioning accuracy in wireless sensor networks,an algorithm based on improved particle swarm optimization by membrane computing (IPSO-MC) was proposed.Kent mapping was used to initialize the population and domain particles were introduced to improve the global optimization of the particle swarm.The weight factor and nonlinear extreme value perturbation were used to improve the local optimization ability of the particle swarm,and the Levy flight mechanism was used to optimize the individual position.Finally,the optimal solution of the particle swarm algorithm was obtained by the evolutionary rules of the membrane computing.Simulation experiments show that compared with the chicken flock algorithm,the improved particle swarm algorithm and the membrane computing,the proposed algorithm improves 3.24%,5.12% and 8.15% in the comparison of reference node ratio indicators,and the increase in the number of nodes indicators by 2.26%,7.82% and 9.81%,and the comparison of communication radius indicators increased by 2.15%,5.5% and 7.5%,respectively.This indicates that the algorithm has a good effect in node localization.…”
    Get full text
    Article
  14. 4934
  15. 4935

    ROBUST OPTIMIZATION DESIGN OF SUSPENSION BASED ON 6σ by FENG JinZhi, YANG ZhiFeng, YANG ZhenYi, LIN Yang, ZHENG SongLin

    Published 2020-01-01
    “…The results show that the 6σ-based robustness optimization design not only optimizes the performance of the suspension but also has an advantage in terms of reliability.…”
    Get full text
    Article
  16. 4936
  17. 4937

    Intelligent interactive system architecture based on artificial intelligence by Di YANG, Shaomin WANG, Hua REN

    Published 2018-12-01
    “…Networking and intelligentization are the future development directions of interactive service systems.Internet popularization and rich social channels have realistic needs for intelligent interactive services.High-quality and low-cost intelligent interactive solutions have become the main issues that need to be addressed in various industries.Relying on artificial intelligence technology,intelligent means such as intent recognition,semantic understanding,dialogue and judgment were introduced,the integration of scene design and knowledge fragmentation processing technology has brought new means and opportunities for the realization of interactive service intelligence.The problems faced by the existing interactive system were analyzed.On this basis,the key functional elements and system architecture of the intelligent interactive system were designed.…”
    Get full text
    Article
  18. 4938

    Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG

    Published 2013-08-01
    “…In order to solve the identify information exposure problem and the decryption unfairness problem in Lal et al’s identity-based multi-receiver signcryption scheme,a novel identity-based multi-receiver signcryption scheme,using the Lagrange interpolation method,was proposed to meet the requirements of the identity anonymity and the decryption fairness.Based on the Bilinear Diffie-Hellman and computational Diffie-Hellman assumptions,the security of IND-sMIBSC-CCA2 and EUF-sMIBSC-CMA was proved formally under the random oracle model,which shows that the proposed scheme can achieve the confidentiality and the unforgeablity required.…”
    Get full text
    Article
  19. 4939

    Research status of community detection based on local expansion by Yancui SHI, Yuan WANG, Qing ZHAO, Xiankun ZHANG

    Published 2019-01-01
    “…Community detection can effectively mine the characteristics of the network as well as the hidden information.Local expansion is a commonly used method of community detection,and it can be divided into two steps:the selection of seeds and the local expansion.Therefore,in order to analyze the advantages and disadvantages of the existing methods and their application,these methods about the selection of seeds,local expansion and evaluation were summarized,compared and analyzed.Then,the application and the research difficulties of community detection based on local extension were summarized.Finally,the research directions of community detection based on local expansion were given.…”
    Get full text
    Article
  20. 4940

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    “…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
    Get full text
    Article