-
1401
Multiple People Tracking Using Camera Networks with Overlapping Views
Published 2015-01-01“…We present a novel framework for multiple pedestrian tracking using overlapping cameras in which the problems of object detection and data association are solved alternately. …”
Get full text
Article -
1402
High-precision Pupil Center Positioning Method Based on Near-eye Infrared Image
Published 2022-10-01“…Finally, an improved ellipse fitting algorithm is designed to locate the pupil center. Experimental results show that the algorithm can accurately locate the center of the pupil when the pupil is disturbed by the reflected light spot or partially occluded, with an overall accuracy of 98.2%. …”
Get full text
Article -
1403
A Bionic Social Learning Strategy Pigeon-Inspired Optimization for Multi-Unmanned Aerial Vehicle Cooperative Path Planning
Published 2025-01-01“…This paper proposes a bionic social learning strategy pigeon-inspired optimization (BSLSPIO) algorithm to tackle cooperative path planning for multiple unmanned aerial vehicles (UAVs) with cooperative detection. …”
Get full text
Article -
1404
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
1405
RECOGNITION OF PROPELLER-DRIVEN AIRCRAFT IN A PASSIVE BISTATIC RADAR
Published 2018-12-01“…Nowadays passive bistatic radars (PBR) allow for detection, determination of coordinates and tracking of moving objects. …”
Get full text
Article -
1406
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01“…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
Get full text
Article -
1407
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01“…To avoid monster community problem which suffered by distributed k-clique community detection, τ-window community detection was proposed. …”
Get full text
Article -
1408
A Velocity Dealiasing Scheme Based on Minimization of Velocity Differences between Regions
Published 2020-01-01“…The noise data, strong wind shear, and isolated echo region in the Doppler radar radial velocity data severely interfere with the velocity dealiasing algorithm. This paper proposes a two-step velocity dealiasing algorithm based on the minimization of velocity differences between regions to solve this problem. …”
Get full text
Article -
1409
Identification of line status changes using phasor measurements through deep learning networks
Published 2021-03-01“…THE PURPOSE. To consider the problem of detecting changes in a power grid topology that occurs as a result of the power line outage / turning on. …”
Get full text
Article -
1410
Application of the Variable Precision Rough Sets Model to Estimate the Outlier Probability of Each Element
Published 2018-01-01“…The experiments conducted demonstrate the feasibility of the proposed algorithm, whose usefulness is contextualised by comparison to different algorithms analysed in the literature.…”
Get full text
Article -
1411
Effective and fair cognitive terminal assignment scheme for cooperative spectrum sensing
Published 2024-06-01“…For the perceived fairness among different sub-bands, two allocation algorithms were proposed: the arcuate allocation algorithm and the class division allocation algorithm. …”
Get full text
Article -
1412
Closed-Loop Fault Diagnosis of SDR Using Gap Metric, PCA, and Kalman’s Principle
Published 2023-01-01“…Compared with the MWPCA algorithm, it was shown that our proposed algorithm was more accurate in fault diagnosis and could avoid the problem of missing alarm when two sensors had consistent faults, which would provide strong support for the safe operation of the SDR and could further promote its application in long-endurance aircrafts.…”
Get full text
Article -
1413
Computerized Interactive Gaming via Supporting Vector Machines
Published 2008-01-01“…This paper describes a supporting vector machine-based artificial intelligence algorithm as one of the possible solutions to the problem of random data processing and the provision of interactive indication for further actions. …”
Get full text
Article -
1414
Energy efficiency optimization study of sub-connected ARIS-assisted ISAC system over millimeter wave channels
Published 2025-06-01“…The system energy efficiency was maximized by optimizing the beamform for dual-function base station, the phase shift matrix of sub-connected ARIS and the vector of amplification factors for sub-connected ARIS under the user’s minimum signal to interference plus noise ratio and the constraint of radar detection power. An algorithm based on fractional programming (FP) theory, alternating optimization (AO) technique, and successive convex approximation (SCA) technique was proposed to deal with the non-convex problem. …”
Get full text
Article -
1415
Mechanism of situation element acquisition based on deep auto-encoder network in wireless sensor networks
Published 2017-03-01“…In hierarchical training of the auto-encoder, a training method based on cross-entropy loss function and back-propagation algorithm is proposed to overcome the problem of weights updating too slow by the traditional variance cost function, and the momentum factors are added to improve the convergence performance. …”
Get full text
Article -
1416
Rapid acquisition and surface defects recognition based on panoramic image of small-section hydraulic tunnel
Published 2025-04-01“…In addition, to improve the speed and accuracy of traditional algorithms for tunnel surface defects detection, this paper proposes an improved YOLOv5s-DECA model. …”
Get full text
Article -
1417
A Polarity Reversion Elimination Method for LTE-Advanced Frequency Offset Estimation
Published 2015-08-01“…Traditional fractional frequency offset(FFO)estimation algorithm pay less attention to FFO polarity estimation.Noise and channel fading induced FFO estimation polarity reversion degrades the frequency synchronization performance inevitably.An efficient FFO polarity detection method was proposed in LTE-Advanced system to solve the problem,which utilized the mirror symmetry property of time-domain primary synchronization signal(PSS).Numerical results show that the proposed method can depress FFO polarity reversion efficiently.…”
Get full text
Article -
1418
Real-time Diagnosis and Fault-tolerant Control of Grid-side Current Signal Anomaly in AC Traction System
Published 2023-04-01“…Secondly, based on the two redundant grid-side current signals of the traction drive system and the estimated value of the grid-side current, residual and detection statistics were designed, and the effective fault detection and decision-making of the two grid-side current signal anomalies are achieved by combining the CUSUM algorithm. …”
Get full text
Article -
1419
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01“…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
Get full text
Article -
1420
Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion
Published 2025-06-01“…By using Particle Swarm Optimization-Genetic Algorithm (PSO-GA) for optimal architecture search and combining the dynamic adaptability of Deep Q-Network (DQN) algorithm, this method can automatically identify the most suitable GNN architecture for power data monitoring, thereby improving the adaptive detection and defense efficiency of the system. …”
Get full text
Article