In Three Gorges reservoir area of China, 3D visualization and analysis functions are widely needed in many works of geological hazard survey, inspection, pre-warning and treatment of local landslides and collapses, an...
详细信息
In view of the limitations that k-means clustering algorithm is sensitive to the initial points and liable to fall into local minimum point, a clustering algorithm based on multi-sampling max-min distance and dynamic ...
详细信息
With the development of Grid technology and the extension of Grid application areas, it needs to provide core infrastructure platform and the necessary functional components for large-scale resources sharing and colla...
详细信息
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag...
详细信息
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider...
详细信息
Biomedical magnetic induction measurement is a promising method for the detection of intracerebral hemorrhage (ICH), especially in China. Aiming at overcoming the problem of low sensitivity, a magnetic induction senso...
详细信息
Recently, cluster synchronization has attracted an increasing interest in various disciplines, includingmathematics, physics, and engineering sciences. This paper further investigates the cluster synchronization of a ...
详细信息
The series of Where-What Networks (WWNs) is a brain-inspired developmental model that simulates the dorsal (where) stream and the ventral (what) stream that converge to the motor area in the frontal cortex. Since deve...
详细信息
Generic object recognition is one of the most important fields in the artificial intelligence. Some cortex-like networks for generic object recognition are proposed these years. But most of them concentrated on the di...
详细信息
Information flow security has been an important security requirement of existing operating systems, especially for distributed applications. We are interested in protecting information flow security with an eye to inf...
详细信息
暂无评论