As chaotic variants with chaotic atirador are close decentralization in attracted region, a novel chaos optimization algorithm is introduced. Optimized variants are searched in the whole universe and are steady and qu...
详细信息
In the speech acquisition process, a person starts by learning muscle activation patterns (motor commands) to control their speech organs. However, the learning process is still a brainteaser. This paper attempts to s...
详细信息
Accurate and timely prediction of crop growth is of great significance to ensure crop yields, and researchers have developed several crop models for the prediction of crop growth. However, there are large differences ...
详细信息
Predicting disease-related long non-coding RNAs (lncRNAs) can help reveal the genetic mechanisms of complex diseases. Accurately identifying disease-associated lncRNAs is crucial for human diagnosis and therapeutics o...
详细信息
This study addresses the risk of proxy test-taking in e-testing by developing a tablet-based written response system to prevent substitute answers. We examined how the method employs cluster search, which is equivalen...
详细信息
This paper aims to propose a novel Organic Computing concept to dealing with the overall issue of automated design of processing pipelines. It is outlined how several methods standing under the Artificial Intelligence...
详细信息
In this paper, we investigate software fault detection and fault correction processes based on infinite server queuing model which incorporate testing effort functions. Some researches proposed in the literature to st...
详细信息
In terms of visual presentation, this study studies a set of multi-camera collaborative technology, which can conduct three-dimensional registration of MR without dead Angle. We also study an accurate and real-Time vi...
详细信息
We propose a novel method for 3D hand shape estimation from a single RGB image. Most exiting methods leverage a deep network to extract a low-resolution representation to estimate 3D coordinates, which always leads to...
详细信息
According to the problem that existing accessing authentication and protocols of wireless mesh network, which may not guarantee to adapt different authentication agreement and the different underlying communicate infr...
详细信息
According to the problem that existing accessing authentication and protocols of wireless mesh network, which may not guarantee to adapt different authentication agreement and the different underlying communicate infrastructure. By using aspect oriented programming, dependency injection and soft plug-in technologies, we design a new access method of wireless mesh network which satisfy scalability. This method realize the scalability of authentication protocol and consultations of keys and various physical networks. Reflect attack counteraction and perfect forward privacy are provided in proposed authentication and key exchange protocols.
暂无评论