New image encryption based on DNA encoding combined with chaotic system is proposed. The algorithm uses chaotic system to disturb the pixel locations and pixel values and then DNA encodings according to quaternary cod...
详细信息
New image encryption based on DNA encoding combined with chaotic system is proposed. The algorithm uses chaotic system to disturb the pixel locations and pixel values and then DNA encodings according to quaternary code rules are carried out. The pseudo DNA operations are controlled by the quaternary chaotic sequences. At last the image encryption through DNA decoding is achieved. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, it is able to resist the statistical and exhaustive attacks.
Plant growth simulation algorithm (PGSA) is a kind of bionic intelligent optimization algorithm. Based on the plant phototropism as heuristic criterion, this algorithm takes the feasible region of different optimizati...
详细信息
Face recognition is an important research hotspot. More and more new methods have been proposed in recent years. In this paper, we propose a novel face recognition method which is based on PCA and logistic regression....
详细信息
Face recognition is an important research hotspot. More and more new methods have been proposed in recent years. In this paper, we propose a novel face recognition method which is based on PCA and logistic regression. PCA is one of the most important methods in pattern recognition. Therefore, in our method, PCA is used to extract feature and reduce the dimensions of process data. Afterwards, we present a novel classification algorithm and use logistic regression as the classifier for face recognition. The experimental results on two different face databases are presented to illustrate the efficacy of our proposed method.
Independent Component Analysis (ICA) and Linear Discriminant Analysis (LDA) are two conventional methods in feature extraction. In this paper, we propose a novel face recognition method which is based on ICA image rec...
详细信息
This paper proposes an approach about obstacle collision-free motion planning of space manipulator by utilizing a Configuration-Oriented Artificial Potential Field method in 3-D space environment. Firstly, the artific...
This paper proposes an approach about obstacle collision-free motion planning of space manipulator by utilizing a Configuration-Oriented Artificial Potential Field method in 3-D space environment. Firstly, the artificial potential field method, which is usually used in 2-D space, is extended to 3-D space. Secondly, improving the artificial potential field method enables to carry out obstacle avoidance planning for the configuration of entire space manipulator (including the end-effector and links). Finally, the approach is combined with the inverse kinematics calculation which is based on the Generalized Jacobian Matrix for planning a collision-free motion of space manipulator. At the end of the article, by simulating the method mentioned above, the validity of the proposed method is verified.
We herein present a satisfaction differential evolution algorithm to deal with machine layout in assembly plant. This paper firstly provide the assumption for detailed machine layout problem, build a mathematical mode...
详细信息
In this paper, we present an effective algorithm based on the Oriented Bounding Box (OBB). Particularly, the article focus on how to reduce the amount of the time that the intersection of bounding boxes are detected f...
详细信息
In this paper, we present an effective algorithm based on the Oriented Bounding Box (OBB). Particularly, the article focus on how to reduce the amount of the time that the intersection of bounding boxes are detected for increasing the efficiency of collision detection algorithm through the following three steps. Firstly, the detection time of bounding box intersection is decreased by a pre-treatment method. Secondly, we optimize the traversal approach of the bounding box tree and reduce the depth of the two fork tree under take into account the temporal and spatial correlation of motion of virtual environment. Then, we reduce the breadth of tree result from this algorithm compares the distance between the bounding boxes and traverse the node of distance that near the tree. At last, the validity of the algorithm is verified by programming simulations.
Quickly recovering and securing the advanced vehicle performance by changing structures, upgrading equipment become a key point to win the modern war. The armored vehicle is a complicated coupling system and the struc...
详细信息
Multi-depot vehicle routing problem (MDVRP for short) is complex and a typical NP-Hard problem in manufactories, especially in assembly plant. We herein present an ant colony algorithm with memory grouping list (ACMGL...
详细信息
We herein simulate the scheduling process of automatic guided vehicle (AGV for short) with Plant Simulation, and try to obtain an optimal configuration for meeting practical engineering requirement in one assembly pla...
详细信息
暂无评论