Even in an intrusion tolerant system, the resources will be fatigued if the intrusion is long lasting because of compromising iteratively or incrementally. In due course, the system will not provide even the minimum c...
详细信息
In emotion recognition, the requirement for authenticity and real-time of the medium under study has always been a primary consideration. Thus electroencephalogram (EEG) is most suitable as the primary medium for emot...
详细信息
In this paper, we describe an algorithm to decompose multi-lead ECG data simultaneously into different linear expansions of the same atoms that are selected from a redundant dictionary. These waveforms are chosen in o...
详细信息
Recently, delivery by quadcopter has become an increasingly popular application. Nevertheless, there are some problems and constraints. The Last Mile Problem (LMP), which involves several challenges, represents a seri...
详细信息
For the weakness of conventional POCS algorithms, a novel spatio-temporal adaptive super-resolution reconstruction algorithm of video is proposed in this paper. The spatio-temporal adaptive mechanism, which is based o...
详细信息
Denial of service attacks (DoS) don't necessarily damage data directly, or permanently but intentionally compromise the functionality. Even in an intrusion tolerant system, the resources will be fatigued if the in...
详细信息
In response to the increasingly complex fault location problem caused by more and more access of distributed power sources to distribution networks, this paper proposes a fault location method based on the distributio...
详细信息
A comprehensive algorithm for the reconstruction of three dimensional model from a pair of two dimendional images is presented in this paper. The dynamic programming matching based on "bridging method" are g...
详细信息
Images of roads captured in bad weather suffer from poor contrasts and colors. It is known that the degradation of an image due to scattering of light is exponential in the dept.s of the scene points. Therefore, to es...
详细信息
暂无评论