Service computing techniques have achieved remarkable results in solving the cohesiveness problem of Web applications and are therefore introduced into the IoT do-main to break the trend of inlining IoT systems. Howev...
详细信息
With the vigorous development of digital and network technology in China, computer and it's technology have been widely used in various industries. Therefore, information technology has become increasingly importa...
With the vigorous development of digital and network technology in China, computer and it's technology have been widely used in various industries. Therefore, information technology has become increasingly important in today's society. However, there are still many shortcomings in computer teaching in China, and reforms and improvements are urgently needed to give full play to the important role of computer technology. The research focuses on the following reforms of computer network practice course teaching reform.
As deep learning technology increasingly permeates various fields, the significance of optimization algorithms in neural network training has become more prominent. Typically, the training of deep learning networks re...
详细信息
This paper first analyzes the concept and development status of computer network technology, then expounds the problems existing in computer network practice teaching, and finally makes an in-depth analysis on how to ...
This paper first analyzes the concept and development status of computer network technology, then expounds the problems existing in computer network practice teaching, and finally makes an in-depth analysis on how to formulate strategies to solve the problems existing in computer network practice teaching, including the detailed discussion and planning on the reform of course examination methods, the improvement of course setting and the study of software and hardware. Based on the current situation of computer network development in China, the practical teaching of computer network is continuously improved, which makes this course carry out smoothly in teaching.
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorit...
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorithm, the leakage of privacy, and the programming vulnerability of blockchain and hash collisions. Then it introduces in detail the three key technologies of security protection under the blockchain application environment, P2P network technology, asymmetric encryption technology and consensus mechanism technology. In order to make more relevant people know more about the key technologies of safety protection in the application environment of blockchain.
An approach of direct adaptive fuzzy sliding-mode control which combines the fuzzy control with the sliding-mode control, is proposed for the control of a class of unknown nonlinear dynamic systems. The control goal i...
详细信息
ISBN:
(纸本)9781479987313
An approach of direct adaptive fuzzy sliding-mode control which combines the fuzzy control with the sliding-mode control, is proposed for the control of a class of unknown nonlinear dynamic systems. The control goal is to obtain a direct adaptive fuzzy sliding-mode control law and a constructive Lyapunov synthesis approach with respect to a class of nonlinear systems without the knowledge of uncertainties. For improving the approximate performance of the fuzzy system, the proposed approach in this study not only online updates the parameter values in the consequence fuzzy sets, but also updates the shape parameters of the membership functions of the prime fuzzy sets. The fuzzy control rules are updated through the online adaptive learning, which makes the output of fuzzy control to approximate to a sliding-mode equivalent control. The asymptotic stability of the overall system based on Lyapunov theory is proved. Some numerical simulation results show the efficiency of the proposed approach.
Underwater images are often influenced by color casts, low contrast, and blurred details. We observe that images taken in natural settings typically have similar histograms across color channels, while underwater imag...
Underwater images are often influenced by color casts, low contrast, and blurred details. We observe that images taken in natural settings typically have similar histograms across color channels, while underwater images do not. To improve the natural appearance of an underwater image, it is critical to improve the histogram similarity across its color channels. To address this problem, we develop a histogram similarity-oriented color compensation method that corrects color casts by improving the histogram similarity across color channels in the underwater image. In addition, we apply the multiple attribute adjustment method, including max-min intensity stretching, luminance map-guided weighting, and high-frequency edge mask fusion, to enhance contrast, saturation, and sharpness, effectively addressing problems of low contrast and blurred details and eventually enhancing the overall appearance of underwater images. Particularly, the method proposed in this work is not based on deep learning, but it effectively enhances a single underwater image. Comprehensive empirical assessments demonstrated that this method exceeds state-of-the-art underwater image enhancement techniques. To facilitate public assessment, we made our reproducible code available at https://***/wanghaoupc/UIE_HS2CM2A.
This paper investigates the problem of global exponential anti-synchronization of a class of switched neural networks with time-varying delays and lag signals. Considering the packed circuits, the controller is depend...
详细信息
This paper investigates the problem of global exponential anti-synchronization of a class of switched neural networks with time-varying delays and lag signals. Considering the packed circuits, the controller is dependent on the output of the system as the inner states are very hard to measure. Therefore, it is necessary to investigate the controller based on the output of the neuron cell. Through theoretical analysis, it is obvious that the obtained ones improve and generalize the results derived in the previous literature. To illustrate the effectiveness, a simulation example with applications in image encryptions is also presented in the paper.
Research and development of electroencephalogram (EEG) based brain-computer interfaces (BCIs) have advanced rapidly, partly due to deeper understanding of the brain and wide adoption of sophisticated machine learning ...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image into a vector and then used L 1 or L 2 norm to measure the error matrix. However, in the stacking step, the structure information of the error image can be lost. Depart from the previous methods, in this paper, we propose a novel method by exploiting the low-rankness of both the data representation and each occlusion-induced error image simultaneously, by which the global structure of data together with the error images can be well captured. In order to learn more discriminative low-rank representations, we formulate our objective such that the learned representations are optimal for classification with the available supervised information and close to an ideal-code regularization term. With strong structure information preserving and discrimination capabilities, the learned robust and discriminative low-rank representation (RDLRR) works very well on face recognition problems, especially with face images corrupted by continuous occlusions. Together with a simple linear classifier, the proposed approach is shown to outperform several other state-of-the-art face recognition methods on databases with a variety of face variations.
暂无评论