In order to realize that IPv6 (Internet Protocol version 6) clients are able to visit remote IPv6 servers through GPRS (General Packet Radio Service), we proposed a new and feasible framework. After discussing the lim...
详细信息
The existing 3D direction models approximate spatial objects either as a point or as a minimal bounding block, which decrease the descriptive capability and precision. Considering the influence of object's shape, ...
详细信息
In the heavy clutter environment, the information capacity is large,the relationships among information are complicated, and track initiationoften has a high false alarm rate or missing alarm rate. Obviously, it is ad...
详细信息
In the heavy clutter environment, the information capacity is large,the relationships among information are complicated, and track initiationoften has a high false alarm rate or missing alarm rate. Obviously, it is adifficult task to get a high-quality track initiation in the limited measurementcycles. This paper studies the multi-target track initiation in heavy *** first, a relaxed logic-based clutter filter algorithm is presented. In thealgorithm, the raw measurement is filtered by using the relaxed logic *** not only design a kind of incremental and adaptive filtering gate, but alsoadd the angle extrapolation based on polynomial extrapolation. The algorithm eliminates most of the clutter and obtains the environment with highdetection rate and less clutter. Then, we propose a fuzzy sequential Houghtransform-based track initiation algorithm. The algorithm establishes a newmeshing rule according to system noise to balance the relationship between thegrid granularity and the track initiation quality. And a flexible superpositionmatrix based on fuzzy clustering is constructed, which avoids the transformation error caused by 0–1 voting method in traditional Hough *** addition, the algorithm allows the superposition matrixes of nonadjacentcycles to be associated to overcome the shortcoming that the track can’t beinitiated in time when the measurements appear in an intermittent way. Anda slope verification method is introduced to detect formation-intensive serialtracks. Last, the sliding window method is employed to feedback the trackinitiation results timely and confirm the track. Simulation results verify thatthe proposed algorithms can initiate the tracks accurately in heavy clutter.
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and thei...
详细信息
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services.
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are act...
详细信息
Sensor optimization is the problem of minimizing sensor activation in a controlled discrete event system. During the evolutionary process, the available resources are supposed to be limited. Therefore, sensors are activated by the agent when it is necessary. Sensor activation policies are the functions that determine which sensors are to be activated. One policy is considered to minimal, if any strictly less activation decided by the agent satisfies the feasibility. In this paper, a new algorithm is proposed to compute the minimal sensor activation policy. The algorithm, based on the operation of Reverse Change and the property of the Label-reached, calculates the minimal solution of sensor activation and achieves a lower complexity of computation relatively.
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ...
详细信息
In augmented reality, smart devices need to sense their own position in real physical space and complex scene structure to achieve good virtual reality interaction and three-dimensional registration. This paper propos...
详细信息
Graphs, as a fundamental data structure, have proven efficacy in modeling complex relationships between objects and are therefore found in wide web applications. Graph classification is an essential task in graph data...
详细信息
Grid-based path planning is one of the classic problems in AI, and a popular topic in application areas such as computer games and robotics. Compressed Path Databases (CPDs) are recognized as a state-of-the-art method...
详细信息
Few-shot learning (FSL) aims to learn to new concepts based on very limited data. One of the main challenges in FSL is the use of pretrained embeddings whose dimension is too high for the small sample size. While the ...
详细信息
暂无评论