Multi-objective decision-making problems have been widely applied to business, financial investment, transportation, optimal routing design, environment protection, and military strategies. In this paper, we give a no...
详细信息
Community mining has been the focus of many recent researches on dynamic social networks. In this paper, we propose a clustering based improved ant colony algorithm (CIACA) for community mining in social networks. The...
详细信息
作者:
LI YONG XU LUCollege of Mathematics
Key Laboratory of Symbolic computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012
In this paper, we study the persistence of lower dimensional tori for random Hamiltonian systems, which shows that majority of the unperturbed tori persist as Cantor fragments of lower dimensional ones under small per...
详细信息
In this paper, we study the persistence of lower dimensional tori for random Hamiltonian systems, which shows that majority of the unperturbed tori persist as Cantor fragments of lower dimensional ones under small perturbation. Using this result, we can describe the stability of the non-autonomous dynamic systems.
To satisfy the requirements of real-time and high quality mosaics, a bionic compound eye visual system was designed by simulating the visual mechanism of a fly compound eye. Several CCD cameras were used in this syste...
详细信息
To satisfy the requirements of real-time and high quality mosaics, a bionic compound eye visual system was designed by simulating the visual mechanism of a fly compound eye. Several CCD cameras were used in this system to imitate the small eyes of a compound eye. Based on the optical analysis of this system, a direct panoramic image mosaic algorithm was proposed. Several sub-images were collected by the bionic compound eye visual system, and then the system obtained the overlapping proportions of these sub-images and cut the overlap sections of the neighboring images. Thus, a panoramic image with a large field of view was directly mosaicked, which expanded the field and guaranteed the high resolution. The experimental results show that the time consumed by the direct mosaic algorithm is only 2.2% of that by the traditional image mosaic algorithm while guaranteeing mosaic quality. Furthermore, the proposed method effectively solved the problem of misalignment of the mosaic image and eliminated mosaic cracks as a result of the illumination factor and other factors. This method has better real-time properties compared to other methods.
Compared with traditional algorithms of rough set feature selection, the stochastic algorithms for feature selection based on rough set and swarm intelligence are popular. This paper gives the overview of rough set al...
详细信息
This study proposes an efficient non-parametric classifier for bankruptcy prediction using an adaptive fuzzy k-nearest neighbor (FKNN) method, where the nearest neighbor k and the fuzzy strength parameter m are adapti...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications between elements can be represented as reaction rules. RFID untraceability can be represented as behavioral congruences. We take a RFID air interface protocol as a case study and show the usability of this approach.
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac...
详细信息
ISBN:
(纸本)9781601321916
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarithm polar coordinate system;and use phase correlation method to obtain rotation angle, scaling size and position offset;and then, the tampered regions would be located roughly. Finally, use geometry method to accurately calculate the rotation angle, scaling size and position offset between the copy-paste regions, and according to these values, the tampered region can be located accurately. Experimental results showed that our algorithm can detect the copy-paste tampering, even with rotation and scaling transformation, and it can resist some post-processing, such as blurring, adding noise, and so on.
Max Restricted Path Consistency (maxRPC) is a promising domain filtering consistency for binary constraints. In existing algorithms, the process of searching for PC-witnesses requires most constraint checks. And the c...
详细信息
Topological relations between spatial objects have played important roles in spatial representing and reasoning. Various models for expressing topological relations have been put forward. The Region Connection Calculu...
详细信息
暂无评论