While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K...
详细信息
3-SPS+RRS+PS is a new type of mechanism. There is good application prospect in the field of aerospace. Especially some key kinetic characteristic calculation algorithms are implemented, which makes its calculation mec...
详细信息
Many previous algorithms in data streams are about single stream, which can only process single items. The algorithms about data streams are always extended by sequential pattern algorithms about static database, they...
详细信息
General weighted sequential pattern mining algorithms ignore or do not make good use of the time and time-interval information of data elements. Besides some algorithms require to scan the database many times or build...
详细信息
In this letter, new methods of constructing quaternary sequence pairs are presented based on binary sequence pairs with two-level autocorrelation, almost perfect binary sequence pairs and cyclic shift sequences. The q...
详细信息
The most widely-used collaborative recommendation algorithms are vulnerable to shilling attacks. To this end, in this paper we propose a robust recommendation algorithm based on user rating matrix block and modified L...
详细信息
The existing grid-based uncertain data stream clustering algorithms are fast but low-accuracy, and sensitive to user-specified threshold. In order to solve the above problems, a density grid-based uncertain data strea...
详细信息
As regard to the case of extending the lifetime of zigbee network, the defination of node's boundary is proposed. First, all the information for node's boundary is stored when zigbee network is built. Then, th...
详细信息
The current clustering algorithms for evolving uncertain data stream are sensitive to user specified threshold, and unstable in noise processing. In this paper, DUStream is presented, a density-based algorithm for dis...
详细信息
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther...
详细信息
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and there is overlap classification phenomenon in vulnerability taxonomy. In order to solve the problem, we will propose an algorithm VUNClique, virtual Grid-based Clustering of Uncertain Data on vulnerability database. Firstly, this paper transforms the vulnerability database into uncertain dataset using the existing vulnerability database pretreatment model. Secondly, we define a virtual grid structure, the cells are divided into real cells and virtual cells, but only the real cells which contain data objects stored in memory. The probability attribute value similarity is defined to deal with the similarity of non-numeric attributes, which compares the number of non-numeric attributes with the same value between tuples to measure the similarity. We provide a secondary partition algorithm to improve the similarity between the tuples in the same cell, the algorithm merges a tuple into it's high-density neighbor cell which has the maximum value of probability attribute value similarity with it. Then, a novel identify cluster algorithm is provided to cluster the high-density real cells. It can identify clusters of arbitrary shapes by traversing real cells twice. Finally, performance experiments over the uncertain dataset transformed by NVD vulnerability database. The experiments results show that VUNClique can find clusters of arbitrary shapes, and greatly improve the efficiency of clustering.
暂无评论