Functions and call relations are extracted into nodes and edges,respectively,by which a novel topological model is *** directional edges and the corresponding weight values express the call relations and tightness ***...
详细信息
Functions and call relations are extracted into nodes and edges,respectively,by which a novel topological model is *** directional edges and the corresponding weight values express the call relations and tightness *** introducing two concepts of function fault-tolerant capability and software fault intensity and by designing a allocation rule on fault-tolerant capability,a cascading fault model is built to explore fault propagation *** on practical software networks show that a weak fault intensity,a small number of initial faults,and a strong fault-tolerant capability can slow down the spreading *** functions with more call relations and more closer tightness contribute more to the stability of the whole system.
Feature selection is an effective technique to put the high dimension of data down, which is prevailing in many application domains, such as text categorization and bio-informatics, and can bring many advantages, such...
详细信息
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac...
详细信息
ISBN:
(纸本)9781601321916
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system;and use phase correlation method to obtain rotation angle, scaling size and position offset;and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copy-paste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.
In this paper, we propose PSOfold, a particle swarm optimization for RNA secondary structure prediction. PSOfold is based on the recently published IPSO. We present two strategies to improve the performance of IPSO. F...
详细信息
The core idea of clustering algorithm is the division of data into groups of similar objects. Some clustering algorithms are proven good performance on document clustering, such as k-means and UPGMA etc. However, few ...
详细信息
Max Restricted Path Consistency (maxRPC) is a promising domain filtering consistency for binary constraints. In existing algorithms, the process of searching for PC-witnesses requires most constraint checks. And the c...
详细信息
Aiming at the problem of multi-label classification, a multi-label classification algorithm based on label-specific features is proposed in this paper. In this algorithm, we compute feature density on the positive and...
详细信息
Aiming at the problem of multi-label classification, a multi-label classification algorithm based on label-specific features is proposed in this paper. In this algorithm, we compute feature density on the positive and negative instances set of each class firstly and then select mk features of high density from the positive and negative instances set of each class, respectively; the intersec- tion is taken as the label-specific features of the corresponding class. Finally, multi-label data are classified on the basis of la- bel-specific features. The algorithm can show the label-specific features of each class. Experiments show that our proposed method, the MLSF algorithm, performs significantly better than the other state-of-the-art multi-label learning approaches.
Topological relations between spatial objects have played important roles in spatial representing and reasoning. Various models for expressing topological relations have been put forward. The Region Connection Calculu...
详细信息
Visual speech-lip reading, making the computer understands what do speakers want to express through observing the lip direction of them. The most simply method of lip reading in early stage is to compare between chara...
详细信息
Visual voice lip-reading, so the computer can understand what the speakers want to express direction by looking at their lips. Lip reading is the easiest way to compare the early characters and templates from the froz...
详细信息
Visual voice lip-reading, so the computer can understand what the speakers want to express direction by looking at their lips. Lip reading is the easiest way to compare the early characters and templates from the frozen image is stored. It ignores the very nature and time changes. This method is very simple, but it's just simple elements can be classified, then it may not show significant speech recognition services. Behavior was characterized by more and more common. Because of the hidden Markov model is superior (HMM), which can be widely used in speech recognition. In recent years, is also used to lip reading identification. Classical HMM model, so that the two assumptions: hidden assumptions collected: in t+1 the state can only be in this country is not in the state before t; from the hidden visible state hypothesis: only by regulating the t hide the visible state, rather than the previous state. This hypothesis is not very useful in some applications (such as lip reading) is reasonable. Under certain conditions, in the t state not only limits the t-1, but also t-2. Therefore, this study modified the assumptions of the classical HMM to derive a new HMM model and algorithms, and applied to the lip-reading recognition is increasing discrimination.
暂无评论