Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current...
详细信息
Magnetic resonance imaging plays an important role in auxiliary diagnosis and brain exploration. However, limited by hardware, scanning time and cost, it's challenging to acquire high-resolution (HR) magnetic reso...
详细信息
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo...
详细信息
ISBN:
(纸本)9781450385862
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framework for face recognition employed in the embedded system. Through data collaboration, the cloud could build a more complex data set with a small amount of uploaded data gathered by the end devices. And the framework collaboration makes sure that the fully-trained cloud model directly download or distillate knowledge to the end devices. Experiments show that the deep model not only realizes the real-time response and the accurate response of the cloud system, but also greatly reduces the bandwidth consumption caused by sample data transmission in the model training process.
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith...
详细信息
Error analysis is an important support for improving the precision of floating-point calculations. However, the floating-point error distribution does not have dominant characteristics, making it difficult to optimize...
详细信息
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli...
详细信息
In underground communication systems, continuous mud pulse signals are susceptible to pump noise during transmission, resulting in a high bit error rate(BER). In this paper, a Normal Inner Product Orthogonal Matching ...
详细信息
ISBN:
(数字)9798350389692
ISBN:
(纸本)9798350389708
In underground communication systems, continuous mud pulse signals are susceptible to pump noise during transmission, resulting in a high bit error rate(BER). In this paper, a Normal Inner Product Orthogonal Matching Pursuit(NIPOMP) algorithm is proposed for the transmission characteristics of continuous waves in the underground. First, a cyclic prefix(CP) is added in front of the sent data. Then the observation vector is obtained by making a difference between the CP of the latter set of data and the CP of the former set of data. Then, the columns of the sensing matrix that are most correlated with the observation vectors are selected as candidate support sets by calculating the L2 norm. The least squares method was used to solve for the previous set of pump noise estimates. Finally, the pump noise is reconstructed using the correspondence between the time and frequency domains. This paper establishes a complete underground communication system. We discuss the noise characteristics of pump noise and analyze the denoising performance of the NIPOMP algorithm in depth. Simulation results show that the algorithm significantly reduces the system BER in complex channel environments with more drastic fading, including gas-phase, liquid-phase, gas-liquid two-phase, and liquid-solid two-channel environments.
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o...
详细信息
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in...
详细信息
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ...
详细信息
暂无评论