Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segment...
详细信息
Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segmented into a constant number of sub-images in vertical direction. Color features are extracted from every sub-image to get chromosome coding. It is considered that fuzzy membership and intuitive fuzzy hesitancy degree of every pixel's color in image are associated to all the color histogram bins. Certain feature, fuzzy feature and intuitive fuzzy feature of colors in an image, are used together to describe the content of image. Efficient combinations of sub-image are selected according to operation of selecting, crossing and variation. Retrieval results are obtained from image matching based on these color feature combinations of sub-images. Tests show that this approach can improve the accuracy of image retrieval in the case of not decreasing the speed of image retrieval. Its mean precision is above 80 %.
the research proposed an approach that based on Domain Partitional Markov Decision Process to make decisions about the protection and defense against cyber attacks. We partitioned the network into several security dom...
详细信息
The nude image is an important part in adult images spreading on the Internet. A new recognizing algorithm of nude image based on the navel and body feature is proposed in this paper. The algorithm considers the naked...
详细信息
Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images;cloud initialization part has a face subspace and template...
详细信息
Based on analysis of inherent limitations in existing security response decision-making systems, a dynamic adaptive fault response model is presented Several security fault levels were found, which comprise the basic ...
详细信息
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles...
详细信息
ISBN:
(纸本)9781424445196
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireless networks have emerged. Based on the epidemic theory, this paper proposes a general model which predicts how a worm propagates through a wireless ad hoc network. Then the differential equations of the model is presented and a necessary condition for worms to spread in these networks is derived, which may be useful in designing a secure wireless ad hoc network. Simulation results show that the process of worm propagation in these wireless networks is sensitive to the deployment density of nodes and the energy consumption of nodes. Therefore, our study can provide insight into deriving a general model to characterize worm propagation in wireless ad hoc networks. & copy;2009 IEEE.
Intention recognition is the ability to predict an opposing force's high level goals. Knowing an attacker's intention can support the decision-making of the network security administrators. Furthermore Intent ...
详细信息
A novel approach for IP traceback is proposed, which combines probabilistic packet marking and network coding techniques. Dissimilar to prior PPM schemes, our approach stores random linear combinations of router label...
详细信息
Snort is a rule-based intrusion detection system, applying defined rules to inspect suspicious packets in network. An alert will be generated if an alert rule is triggered. Analysis of the relation between rules and a...
详细信息
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurrin...
详细信息
暂无评论