In recent years, genetic programming-based evolutionary feature construction has shown great potential in various applications. However, a critical challenge in applying this technique is the need to select an appropr...
详细信息
JPEG pictures may now include complicated meta-data using the JPEG Universal Metadata Box Format (JUMBF), which requires tools to recognize different JUMBF kinds inside the image. We offer the JUMBF Type Checker, a so...
详细信息
People’s usage of smart wearable devices and sensors plays a crucial role in VLSI technology. The wearable devices are embedded in clothes, smartwatches, and accessories. The wear gadgets like smart rings, smartwatch...
详细信息
The population of earthquake-prone areas is growing, as is the number of people killed and injured by earthquakes. The problem of the increasing number of populated regions that are vulnerable to earthquakes is being ...
详细信息
Agriculture stands as a linchpin for national prosperity, especially in regions blessed with abundant water and fertile soil, capable of yielding a diverse range of food products crucial for human sustenance. However,...
详细信息
Voice is one of the most widely used media for information transmission in human society. While high-quality synthetic voices are extensively utilized in various applications, they pose significant risks to content se...
详细信息
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is *** sensitivity of the system to parameters...
详细信息
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is *** sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one *** various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical ***,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems.
Anomaly detection refers to recognition of events different from normal ones for example road accident, fight, robbery, arsenal etc. Anomaly identification in real world surveillance videos is an important application...
详细信息
Distributionally robust reinforcement learning (DRRL), often framed as a robust Markov decision process (RMDP), seeks to find a robust policy that achieves good performance under the worst-case scenario among all envi...
With the recent advent of technology, social networks are accessible 24/7 using mobile devices. During covid-19 pandemic the propagation of misinformation are mostly related to the disease, its cures and prevention. W...
详细信息
暂无评论