With the development of network application technology, there are tremendous viruses and Trojans, especially botnet which has a great harm. It causes a large number of DDoS attacks and spread of spams. And some usual ...
详细信息
With the development of network application technology, there are tremendous viruses and Trojans, especially botnet which has a great harm. It causes a large number of DDoS attacks and spread of spams. And some usual detection ways have their disadvantages. This paper proposes a method to detect zombie hosts based on analysis of initial parameters of the hosts sending mails.
To find similar trajectories of a moving object has been recently an interesting issue in moving object databases due to its diverse application fields (e.g., traffic control systems, meteorology monitoring systems, e...
详细信息
To find similar trajectories of a moving object has been recently an interesting issue in moving object databases due to its diverse application fields (e.g., traffic control systems, meteorology monitoring systems, etc.). In this work, trajectories are first modeled based discrete grid cells. Then, the similarity between trajectories is defined by introducing a new distance function. Furthermore, a novel nearest neighbor query for trajectory of moving objects, i.e. Set Nearest Neighbor (SNN) query is presented, and an efficient shape-based similarity algorithm for SNN is given. The performance study shows the proposed query method is efficient.
Projectors are widely used in high-precision industrial fields, and the accuracy of projector calibration is the key to achieve system accuracy. Therefore, it is necessary to perform high-precision calibration for the...
Projectors are widely used in high-precision industrial fields, and the accuracy of projector calibration is the key to achieve system accuracy. Therefore, it is necessary to perform high-precision calibration for the projector. This paper analyzes the pinhole mathematical model and classifies the calibration method of the projector: projector calibration method based on virtual mark points and projector calibration method based on phase-shifting technique. Then the principle and methods of each calibration method are summarized, the experiment is carried out and the calibration results are compared. Finally, the advantages and disadvantages of two calibration methods are analyzed, which has the certain guiding significance in the choice of projector calibration method.
In traditional multiple instance learning (MIL), both positive and negative bags are required to learn a prediction function. However, a high human cost is needed to know the label of each bag - positive or negative. ...
In this paper a new blind watermarking algorithm based on DCT (discrete cosine transform) and DWT (discrete wavelet transform) was proposed. In order to enhance the security of watermarking, Arnold transform is carrie...
详细信息
In the process of Vector Quantization, the performance of traditional LBG algorithm often relies on the selection of the initial codebook and it easily falls into local optimum. In this paper, Immune Cat Swarm Optimiz...
详细信息
In the process of Vector Quantization, the performance of traditional LBG algorithm often relies on the selection of the initial codebook and it easily falls into local optimum. In this paper, Immune Cat Swarm Optimization is proposed to resolve these problems. In the searching group, the clonal expansion operator is used to do local searching to maintain the diversity of solutions. In the tracking group, the individual genes are mutated through extraction and inoculation operator of dynamic vaccine for global search. Then the progeny population is updated by the balance of concentration operator and selection operator. Finally the optimal codebook can be obtained from the training vectors by the proposed algorithm. Put it to the HMM model for training and recognition. The results show that the codebook design based on Immune Cat Swarm Optimization algorithm does not depend on the selection of initial codebook. The algorithm has strong robustness. It can reduce the error rate of speech recognition.
For a class of adaptive generalized projective synchronization with unknown periods of time-varying parameters, a cycle identification algorithm based on switching logic is proposed in this paper. Firstly, the adaptiv...
详细信息
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
The car CAN (Controller Area Network) bus message injection attacks seriously affects various functions of the safety of cars, life and property. However, low-speed injection attack is detection inconspicuous in a maj...
详细信息
Real-time 3D sensing plays a critical role in robotic navigation, video surveillance and human-computer interaction, etc. When computing 3D structures of dynamic scenes from stereo sequences, spatiotemporal stereo and...
详细信息
暂无评论