In mobile data collector (MDC)-based wireless sensor networks, we need to design paths for MDCs for better data collection. In this paper, we use predictable mobility pattern and apply a heuristic algorithm to design ...
详细信息
In social image search, most existing hypergraph methods use the visual and textual features in isolation by treating each feature term as a hyperedge. Nevertheless, they neglect the correlations of visual and textual...
详细信息
ISBN:
(纸本)9781479961405
In social image search, most existing hypergraph methods use the visual and textual features in isolation by treating each feature term as a hyperedge. Nevertheless, they neglect the correlations of visual and textual hyperedges, which are more robust to represent the high-order relationship among vertices. In this paper, we propose a hypergraph with correlated hyperedges (CHH), which introduces high-order relationship of hyperedges into hypergraph learning. Based on CHH, a pairwise visual-textual correlation hypergraph (VTCH) model is used for tag-based social image search. To overcome the large number of newly generated hybrid hyperedges, a bagging-based method is adopted to balance the accuracy and speed. Finally, adaptive hyperedges learning method is used to obtain the relevance score for social image search. The experiments conducted on MIR Flickr show the effectiveness of our proposed method.
For the purpose of enhancing discriminability of convolutional neural networks (CNNs) and facilitating optimization, a multilayer structured variant of the maxout unit (named Multilayer Maxout network, MMN) is propose...
详细信息
ISBN:
(纸本)9781479961405
For the purpose of enhancing discriminability of convolutional neural networks (CNNs) and facilitating optimization, a multilayer structured variant of the maxout unit (named Multilayer Maxout network, MMN) is proposed in this paper. CNNs with maxout units employ linear convolution filters followed by maxout units to abstract representations from less abstract ones. Our model instead applies MMNs as activation functions of CNNs to abstract representations, which inherits advantages of both maxout units and deep neural networks, and is a more general nonlinear function approximator as well. Experimental results show that our proposed model yields better performance on three image classification benchmark datasets (CIFAR-10, CIFAR-100 and MNIST) than some state-of-the-art methods. Furthermore, the influence of MMN in different hidden layers is analyzed, and a trade-off scheme between the accuracy and computing resources is given.
Community detection is a long-standing yet very difficult task in social network analysis. It becomes more challenging as many online social networking sites are evolving into super-large scales. Numerous methods have...
详细信息
The body sensor network (BSN) possess enormous potential for changing people's daily lives. The data of BSN's is associated with the physiological health of the user information and privacy, therefore require ...
详细信息
ISBN:
(纸本)9781479974351
The body sensor network (BSN) possess enormous potential for changing people's daily lives. The data of BSN's is associated with the physiological health of the user information and privacy, therefore require higher security protection. Sybil attack is particularly easy to perform in BSN where the communication medium is broadcast with multiple node identifiers (ID).In contrast to existing solutions which are based on sharing encryption keys, we propose a new received signal strength indicator (RSSI) based technique to identify Sybil nodes when they are regulating their transmission power. This mechanism not only does not adopt symmetric key encryption technology, but also does not require each node maintains its own identity certificate. Both analysis and simulation results show that our solutions are effective and efficient, providing high detection rate, while incurring limited overhead.
This paper presents the routing recovery problem of mobile sink wireless sensor networks(mWSNs), which is caused by the sink mobility. We propose an immune orthogonal learning particle swarm optimization algorithm(IOL...
详细信息
This paper presents the routing recovery problem of mobile sink wireless sensor networks(mWSNs), which is caused by the sink mobility. We propose an immune orthogonal learning particle swarm optimization algorithm(IOLPSOA) based routing recovery method to build and optimize the alternative path, in order to repair the broken path and maintain the available route from the source nodes to the mobile sink through a multi-hop network. The IOLPSOA can improve the method with faster global convergence and higher solution quality, which can provide more efficient routing recovery capability to mWSNs. We have evaluated the performance of routing recovery method through both mathematical analysis and simulation experiments. The results show that our method effectively supports sink mobility with low energy consumption, communication overhead, and the improvement of routing recovery problem.
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tuk...
详细信息
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey ***,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor *** influence of attack profiles on the recommendation results is reduced through adjusting similarities among ***,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature ***,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization *** results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.
This paper considers the lateral and longitudinal path tracking control of four-wheel steering vehicles. By introducing the virtual points, a robust adaptive path tracking control strategy is proposed to simultaneousl...
详细信息
This paper considers the lateral and longitudinal path tracking control of four-wheel steering vehicles. By introducing the virtual points, a robust adaptive path tracking control strategy is proposed to simultaneously counteract modeling uncertainties, unexpected disturbances, and coupling effects. An adaptive model-based feedforward adaptive term and the robust integral of the sign of the error (RISE) feedback term are used to yield an asymptotic tracking result, which improve the tracking performance and reduce the control effort. The stability of closed-loop system is analyzed using a Lyapunov method. Simulation results are included to illustrate the proposed control scheme.
The most of existing encryption algorithm with public verifiability of the cipher-text are based on pairings. To our knowledge, it cost much time on the computing of the pairings. So it is always an interested studyin...
详细信息
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
暂无评论