Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, norm...
详细信息
Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, normal samples) to train detectors. This paper presents an improved negative selection algorithm (NSA) and its applications to anomaly detection. This approach can only use normal samples to train detectors;at the same time, in order to overcome the drawbacks of the current representation of the self-space in NSAs, a new scheme of the representation of the self-space is introduced with variable-sized self-radius. In our experiments, this approach is tested using the wellknown real world datasets;preliminary results show that the new approach improves the overall performance of detectors and without increase in complexity.
Direct touch technology is very attractive because of its glossy appearance, smooth touch and intuitive interface. However, previous studies show that the bare finger is not suitable for tasks requiring high accuracy ...
详细信息
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practic...
详细信息
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practical value. In the paper, we propose a method to calculate the pre-images using the kernel methods. And we specifically design an algorithm to obtain the pre-image based on the kernel PCA with Gaussian kernel. In the algorithm, the constructed optimal problem is solved by the iterative method. The method is available to all the learning problems with a large sample set. We use the method to detect the defects on the tickets' surface. The experiments results indicate that the method not only reduce the mistake rate but also cut down the detection time.
In this paper, the feasibility of co-channel coexistence of Time Division- Synchronous Code Division Multiple Access (TD-SCDMA) and Code Division Multiple Access 2000 (CDMA2000) systems operating in a macro cell envir...
详细信息
Traditional smart home system based on TCP/IP network applies TC35i cell phone module in smart home controller, and realizes function of short message service by GSM network. This realization model is complex, high-co...
详细信息
This paper presents an experimental investigation on the buckling failure of 304 stainless steel tubes with five different elliptical-notched depths subjected to cyclic bending. It can be observed from the experiment ...
详细信息
This paper presents an experimental investigation on the buckling failure of 304 stainless steel tubes with five different elliptical-notched depths subjected to cyclic bending. It can be observed from the experiment data that the steel tube with any notch depth exhibits a cyclic hardening phenomenon from the moment and curvature relationship, and a steady-state loop is found after a few loading cycles. From the relationship between the ovalization and curvature, an unsymmetric and ratcheting manner of the curve is found. Lower notch depth leads to further unsymmetry of the curve. It can also be observed from curvature-number of cycles to produce buckling curve that five almost parallel straight lines can be found for five different notch depths in a log-log scale. Finally, by using the theoretical equation introduced by Kyriakides and Shaw in 1987, a material parameter equation for the notch depth was proposed in this study to simulate the aforementioned relationship. By comparing the theoretical analysis with the experimental data, it is shown that the theoretical formulation can properly represent the experimental results.
The goal of this research is a proposal of a standard model for vehicle system simulations. Recently, the CO 2 reduction and efficiency improvement of the energy consumption are important subjects in development of t...
详细信息
The goal of this research is a proposal of a standard model for vehicle system simulations. Recently, the CO 2 reduction and efficiency improvement of the energy consumption are important subjects in development of the vehicle systems. The new technologies related to vehicle development have continued to increase in complexity. For these reasons, the energy management simulation by the coordinated design of an electric system and vehicle system is required. The electrical behavior of the batteries becomes important to improve the energy management in the vehicle systems. The battery modeling technologies and the application example for vehicle system simulation are reported.
Workflow is the technology of implementing automated process. It has a wide use in many fields. The study of workflow engine is a key problem of implement of workflow system. The traditional workflow engine has many l...
详细信息
Detecting unknown malicious executables is a challenging task. Traditional anti-virus systems use signatures to detect malicious executables. However, the method cannot detect unseen instances or variants. Inspired by...
详细信息
The present work focuses on the problem of aerothermodynamics of space vehicles with rounded edges on the hypersonic segment of the flight trajectory. Firstly, the in-house Navier-Stokes solver, UNIC-UNS code, with th...
详细信息
暂无评论