In this paper, we present a simplified parsimonious higher-order multivariate Markov chain model with new convergence condition. (TPHOMMCM-NCC). Moreover, estimation method of the parameters in TPHOMMCM-NCC is give. N...
In this paper, we present a simplified parsimonious higher-order multivariate Markov chain model with new convergence condition. (TPHOMMCM-NCC). Moreover, estimation method of the parameters in TPHOMMCM-NCC is give. Numerical experiments illustrate the effectiveness of TPHOMMCM-NCC.
In neighborhood rough set model, the majority rule based neighborhood classifier (NC) is easy to be misjudged with the increasing of the size of information granules. To remedy this deficiency, we propose a neighborho...
详细信息
For composite fault is difficult to diagnose, the characteristics of the large amount of data. This paper presents a method of The Prediction method of Composite Fault Based on data driven to establish intelligence un...
详细信息
In this paper,a 420 GHz GaAs monolithic integrated sub-harmonic mixer based on planar Schottky diode is *** combine the diode 3D model,nonlinear model and passive circuit by field-circuit method,then optimize the circ...
详细信息
In this paper,a 420 GHz GaAs monolithic integrated sub-harmonic mixer based on planar Schottky diode is *** combine the diode 3D model,nonlinear model and passive circuit by field-circuit method,then optimize the circuit through harmonic balanced method,finally study the GaAs monolithic integrated 420 GHz sub-harmonic *** results for the mixer achieved DSB conversion loss of 7.161 dB at420.4GHz when the LO pumped power was 6dBm at210 *** conversion loss was less than 9dB from384 GHz to 451 GHz.
Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such as code-morphis...
详细信息
ISBN:
(纸本)9781509053827
Malware detection becomes mission critical as its threats spread from personal computers to industrial control systems. Modern malware generally equips with sophisticated anti-detection mechanisms such as code-morphism, which allows the malware to evolve into many variants and bypass traditional code feature based detection systems. In this paper, we propose to disassemble binary executables into opcodes sequences, and then convert the opcodes into images. By using convolutional neural network to compare the opcode images generated from binary targets with the opcode images generated from known malware sample codes, we can detect if the target binary executables is malicious. Theoretical analysis and real-life experiments results show that malware detection using visualized analysis is comparable in terms of accuracy, our approach can significantly improve 15% of detection accuracy when the detection set contains a large quantity of binaries and the training set is much smaller.
The photoluminescence(PL) properties of a green and blue light-emitting InGaN/GaN multiple quantum well structure with a strong phase separated into quasi-quantum dots(QDs) and an InGaN matrix in the InGaN epilaye...
详细信息
The photoluminescence(PL) properties of a green and blue light-emitting InGaN/GaN multiple quantum well structure with a strong phase separated into quasi-quantum dots(QDs) and an InGaN matrix in the InGaN epilayer are *** excitation power dependences of QD-related green emissions(PD〉) and matrix-related blue emissions(PM) in the low excitation power range of the PL peak energy and line-width indicate that at 6 K both Pm and PD are dominated by the combined action of Coulomb screening and localized state filling ***,at 300 K,Pm is dominated by the non-radiative recombination of the carriers in the InGaN matrix,while PD is influenced by the carriers transferred from the shallower QDs to deeper QDs by *** is consistent with the excitation power dependence of the PL efficiency for the emission.
Through the analysis of the existing theory and method of three-way decision, model of three-way decision based on the space of set pair information granule was proposed, which was to explain the intension and extensi...
详细信息
In this experiment, white seed pumpkin 'Shengzhen No. 1' was used as rootstock for the oriental sweet melon (Cucumis melo L.) 'Yumeiren'. The fruits of own-rooted melons were used as control. The objec...
In this experiment, white seed pumpkin 'Shengzhen No. 1' was used as rootstock for the oriental sweet melon (Cucumis melo L.) 'Yumeiren'. The fruits of own-rooted melons were used as control. The objective of this experiment was to study the effects of grafting on the following parameters: content of free fatty acids and activities of synthetic enzymes (LOX, ADH, and AAT). These parameters were measured in the peel and flesh tissues of oriental sweet melon at different time-points. Due to grafting, the content of oleic acid and linolenic acid decreased in peel tissues of melons at early stages of maturity. Therefore, total contents of free fatty acids were lower than those of control. However, there was no significant difference in the content of three free fatty acids in flesh tissue; this content was lower than that in peel tissue. Due to grafting, enzymatic activities of ADH and AAT decreased in peel tissue of melons; however, these enzymes showed different activities in flesh tissues of melons subjected to grafting. Nevertheless, there was no significant difference in enzymatic activities of flesh tissues; however, these activities were lower than that of peel tissue. These results indicate that free fatty acid content and related synthetic enzyme activities decreased when grafting was included in the cultivation of oriental sweet melons. Consequently, the aroma of these melons decreased due to grafting.
Complex equipment is mainly used in important areas of national defense, health care, banking, etc. Consequences of failure are relatively severe, while the hidden failures are contained in the most complex devices as...
详细信息
With the development of Internet industry, equipment data is increasing. The traditional method is not suitable for processing large data. Aiming at inefficient problem of Apriori algorithm when mining very large data...
详细信息
暂无评论