In this paper, we not only extend the temporal hierarchical alternating least squares (HALS) to spatial domain, but also incorporate two necessary characteristics of material abundances, full additivity and sparsity, ...
详细信息
In this paper, we not only extend the temporal hierarchical alternating least squares (HALS) to spatial domain, but also incorporate two necessary characteristics of material abundances, full additivity and sparsity, to unmix hyperspectral data. The new algorithm is abbreviated as HALSSC (HALS with Sparsity Constraint). Different from the other endmember extraction approaches, the proposed algorithm does not need the existence assumption of pure pixel of each endmember in the scene. Experimental results on highly mixed synthetic data and real hyperspectral data from Washington DC mall confirm the accuracy of the developed algorithm.
The rich information available in hyperspectral imagery has posed significant opportunities for material classification and identification. The main problem encountered with the classification process is the high dime...
详细信息
The rich information available in hyperspectral imagery has posed significant opportunities for material classification and identification. The main problem encountered with the classification process is the high dimensionality of hyperspectral data and the low-sized training dataset. Hence, dimensionality reduction is often adopted to avoid the "curse of dimensionality" phenomenon. However, noise generated by various sources (primarily the sensor and the atmosphere) inevitably decrease the precision of the classifier. In this paper, two wavelet-based methods, wavelet shrinkage and discrete wavelet transform, are applied to preprocess the hyperspectral imagery in sequence, denoising the spatial images and spectral signatures, respectively. After that, affinity propagation, which is a recently proposed feature selection approach, is used to choose representative features from the noise-reduced data. Experimental results demonstrate that the features acquired by the new scheme make the classification results more accurate than those without noise reduction preprocessing.
Due to the enormous amounts of data contained in hyperspectral imagery, the main challenge for hyperspectral image classification is to improve the accuracy with less computation complexity. Hence, dimensionality redu...
详细信息
Due to the enormous amounts of data contained in hyperspectral imagery, the main challenge for hyperspectral image classification is to improve the accuracy with less computation complexity. Hence, dimensionality reduction (DR) is often adopted, which includes two different kinds of methods, feature extraction and feature selection. In this paper, discrete wavelet transform (DWT) and affinity propagation (AP), which belong to feature extraction and feature selection respectively, are combined together to accomplish the DR task. Firstly, DWT-based features are extracted from the original hyperspectral data; secondly, AP is applied to select representative features from the obtained ones. Experimental results demonstrate that, compared with some other DR methods which only make use of feature extraction or feature selection, the features acquired by the hybrid technique make the classification results more accurate.
In order to effectively deal with large-scale attacks on computer networks, computer Network Defense (CND) policy refinement based on descriptive language is wildly used. However, it's very difficult to figure out...
详细信息
ISBN:
(纸本)9781424480333
In order to effectively deal with large-scale attacks on computer networks, computer Network Defense (CND) policy refinement based on descriptive language is wildly used. However, it's very difficult to figure out the semantic discrepancies between the measures and the predefined policy after the calculation with symbols by computers. A new method is presented to solve the discordance of semantic between the measures and the predefined policy automatically. Based on the establishment of the ontology of CND policy and measure (CNDPM), the CND policy and measure semantic similarity analysis model (CNDPMSSAM) is established, and then the termination of the two main components of CNDPMSSAM are proofed by the putdown automaton, and the prototype system of CNDPMSSAM is implemented. At last, we validate the validity of this method on analyzing semantic similarity of transferring from computer Network Defense Policy Specification Language (CNDPSL) to Defense Measure Description Language (DMDL) with experiments.
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop ...
详细信息
ISBN:
(纸本)9781424480333
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop detection and mitigation methods. Most of existing work is case study of typical P2P botnets. In this paper, we focus on systematically analyzing structures of P2P botnets. We propose a descriptive model of P2P botnet structures, which consists of features of P2P bot, definitions of structures, and structural properties. Firstly, we detail two key functionalities of P2P bot, command-and-control (C&C) functionality and peer-to-peer (P2P) functionality, and give several features of P2P bot. And then, we define two structures of P2P botnets: C&C structure and P2P structure. To characterize these structures, we propose several properties and corresponding quantitative methods. Finally, we conduct experiments to verify our results.
Using neural networks, a highly reliable and precise system to display low power dynamic circuit performance statistical characterization is proposed in this paper. The proposed model successfully estimates the nonlin...
详细信息
Using neural networks, a highly reliable and precise system to display low power dynamic circuit performance statistical characterization is proposed in this paper. The proposed model successfully estimates the nonlinear changing of the leakage power, the active power and the delay of the different fan-in low power dynamic gates with the dual threshold voltage technique, the multiple-supply technique and the sleep transistor technique. At last, the precision priority of estimating system is obtained.
Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strat...
详细信息
Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one bit of this block is invalid. Although data reconstruction techniques have been widely employed in disk arrays, the reconstruction techniques has not been studied in the context of solid-state disks. In this paper, we present a new fine-grained data-reconstruction algorithm for solid-state disks. The algorithm aims to provide a simple yet efficient wear-leveling strategy that improves both I/O performance and reliability of solid-state disks. Simulation experiments show that all data blocks have very similar in terms of erasure times. The number of extra erasures incurred by our algorithm is very marginal.
This paper investigates gene function annotation of Yeast by using semi-supervised multi-label learning. Multi-label learning has been a hot topic in the bioinformatics field, but there are many samples unlabeled. Sem...
详细信息
With the popularity of mobile devices, people are now able to access mobile services like website surfing, e-banking, e-shopping and voice-mail etc. anywhere anytime. Most of the services require secure biometric base...
详细信息
With the popularity of mobile devices, people are now able to access mobile services like website surfing, e-banking, e-shopping and voice-mail etc. anywhere anytime. Most of the services require secure biometric based personal authentication. This paper aims to improve the accuracy of personal authentication in mobile environment by integrating multiple modal biometrics, i.e. face and speech. A specially designed Mobile Biometry (MOBIO) database was used to test the performances. While facial biometrics achieved an average EER of 27.3%, speech biometrics achieved an average EER of 33.4%. The multiple modals biometric system reduces the average error rate to 21.0%, which clearly proves the usefulness of fusing face and speech information.
We report here, the results of molecular dynamics simulation of p-doped (Ga-face)GaN over n-doped (Siface)(0001)4H-SiC hetero-epitaxial material system with one-layer each of Ga-flux and (Al-face)AlN, as the interface...
详细信息
We report here, the results of molecular dynamics simulation of p-doped (Ga-face)GaN over n-doped (Siface)(0001)4H-SiC hetero-epitaxial material system with one-layer each of Ga-flux and (Al-face)AlN, as the interface materials, in the form of, the total Density of States (DOS). It is found that the total DOS at the Fermi-level for the heavily p-doped (Ga-face)GaN and ndoped (Si-face)4H-SiC hetero-epitaxial system, with one layer of (Al-face)AlN as the interface material, is comparatively higher than that of the various cases studied, indicating that there could be good vertical conduction across the (Ga-face)GaN over (Si-face)(0001)4HSiC hetero-epitaxial material system.
暂无评论