In this paper,we propose an Unsupervised Nonlinear Adaptive Manifold Learning method(UNAML)that considers both global and local *** this approach,we apply unlabeled training samples to study nonlinear manifold feature...
详细信息
In this paper,we propose an Unsupervised Nonlinear Adaptive Manifold Learning method(UNAML)that considers both global and local *** this approach,we apply unlabeled training samples to study nonlinear manifold features,while considering global pairwise distances and maintaining local topology *** method aims at minimizing global pairwise data distance errors as well as local structural *** order to enable our UNAML to be more efficient and to extract manifold features from the external source of new data,we add a feature approximate error that can be used to learn a linear ***,we add a feature approximate error that can be used to learn a linear *** addition,we use a method of adaptive neighbor selection to calculate local structural *** paper uses the kernel matrix method to optimize the original *** algorithm proves to be more effective when compared with the experimental results of other feature extraction methods on real face-data sets and object data sets.
The ambiguity and complexity of medical cerebrovascular image makes the skeleton gained by conventional skeleton algorithm discontinuous, which is sensitive at the weak edges, with poor robustness and too many burrs. ...
详细信息
Terrain LOD algorithm is a dynamic and local dough sheet subduction algorithm. On the basis of the research on traditional quadtree algorithm, this paper proposed a new terrain LOD algorithm using quadtree. On deviati...
详细信息
Recently masked autoencoder (MAE) has achieved great success in visual representation learning and delivered promising potential in many downstream vision tasks. However, due to the lack of saliency supervision signal...
详细信息
We do research on moving object classification in traffic video. Our aim is to classify the moving objects into pedestrians, bicycles and vehicles. Due to the advantage of self-organizing feature map (SOM), an unsuper...
详细信息
First,according to characteristics of mobile social environment,by using optimization models based on similarity degree and interaction degree respectively,the optimal correlated users can be selected for analyzing tw...
详细信息
ISBN:
(纸本)9781509036202
First,according to characteristics of mobile social environment,by using optimization models based on similarity degree and interaction degree respectively,the optimal correlated users can be selected for analyzing two main factors of a target user's behaviors(***-term habits and shortterm influences);furthermore,an adaptive update strategy based on fuzzy theory is proposed to describe the importance of two factors in real time and quantitative ***,an improved Apriori theory is introduced to predict user service behaviors accurately;particularly,a new update mechanism for Apriori sample database is built to effectively integrate the samples of optimal correlated ***,simulation results verify the effectiveness of proposed algorithm.
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achiev...
详细信息
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achieve good word-of-mouth effect,it is desired to maximize the spread of posi-
Holographic multiple-input and multiple-output (HMIMO) is a promising technology with the potential to achieve high energy and spectral efficiencies, enhance system capacity and diversity, etc. In this work, we addres...
详细信息
Differential-neural cryptanalysis poses critical security threats to internet of things-embedded lightweight block ciphers, outperforming traditional methods but requiring efficient input difference identification. Cu...
详细信息
Differential-neural cryptanalysis poses critical security threats to internet of things-embedded lightweight block ciphers, outperforming traditional methods but requiring efficient input difference identification. Current solutions are constrained by the opacity of neural networks and the prohibitive computational demands during search processes. Therefore, an input difference search model IDSGA is proposed in this paper. IDSGA model innovatively combines cryptographic theory with deep learning through two key processes. First, feature purification enhances differential characteristics by eliminating redundant patterns while preserving attack-relevant statistical properties through traditional differential probability integration. Second, multi-dimensional distribution mapping enables quantitative dataset evaluation by transforming purified data into interpretable statistical metrics. It enables our model to break through the reliance on neural network evaluation. Moreover, IDSGA model constructs a more optimal search path by integrating a genetic algorithm to deal with the problem of differential search of full inputs with high computational complexity. A quantum variant theoretically extends these capabilities. The experimental results show that the execution time of the IDSGA model is 93% less than that of Gohr. For the CARX cipher, the input differences found by IDSGA are more optimal. This work establishes a new paradigm for differential-neural cryptanalysis by decoupling dataset evaluation from neural network training dependencies.
Completely independent spanning trees(CISTs) are important construct which can be used in data center networks for multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribu...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Completely independent spanning trees(CISTs) are important construct which can be used in data center networks for multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribution, etc. As a recently proposed server-centric data center network, BCube has many good properties. By focusing on the connections between servers, we define the logic graph of BCube as LBCube. We study the construction of CISTs with small diameter on BCubek and show that there are n/2 [(n-1)/2 if n is odd] CISTs with the diameter 2 k + 3 on L-BCubek by presenting a recursive algorithm.
暂无评论