The contrast is low and the venous structure is simple for the hand vein image captured by a near infrared camera. Based on the Retinex method a novel algorithm is presented for human hand dorsal vein image enhancemen...
详细信息
Reconfigurable intelligent Surface (RIS) is a revolutionary technology in modern wireless communication systems, since it can adjust the wireless communication environment with passive components. In this paper, we co...
详细信息
We propose a robust pipeline detection algorithm for obscuration environments, which includes two improvements: a pre-processing method called the Regional Adaptive Thresh-olding Algorithm (RATA) and a novel clusterin...
详细信息
This paper proposes and designs a microstrip antenna that can work in the B1 band for Beidou with a double-layer substrate, and realizes the circularly polarized radiation characteristics. The antenna consists of a gr...
详细信息
Magnetic coupling resonance wireless power transmission is a new technology to realize the wireless transmission of energy by means of high frequency coupling resonance between the coils. The variation of the coupling...
详细信息
The paper introduces a Kernel Weibull M-Transform Least-Mean Square (LMS) (KWMLMS) algorithm aimed to enhance filtering performance for a nonlinear system. By incorporating the Weibull M-Transformation into the cost f...
详细信息
Community structure is one of the most important features in real networks and reveals the internal organization of the vertices. Uncovering accurate community structure is effective for understanding and exploiting n...
详细信息
Community structure is one of the most important features in real networks and reveals the internal organization of the vertices. Uncovering accurate community structure is effective for understanding and exploiting networks. Tolerance Granulation based Community Detection Algorithm(TGCDA) is proposed in this paper, which uses tolerance relation(namely tolerance granulation) to granulate a network hierarchically. Firstly, TGCDA relies on the tolerance relation among vertices to form an initial granule set. Then granules in this set which satisfied granulation coefficient are hierarchically merged by tolerance granulation operation. The process is finished till the granule set includes one granule. Finally, select a granule set with maximum granulation criterion to handle overlapping vertices among some granules. The overlapping vertices are merged into corresponding granules based on their degrees of affiliation to realize the community partition of complex networks. The final granules are regarded as communities so that the granulation for a network is actually the community partition of the *** on several datasets show our algorithm is effective and it can identify the community structure more accurately. On real world networks, TGCDA achieves Normalized Mutual Information(NMI) accuracy 17.55% higher than NFA averagely and on synthetic random networks, the NMI accuracy is also improved. For some networks which have a clear community structure, TGCDA is more effective and can detect more accurate community structure than other algorithms.
Dynamic Quality of Service(QoS)prediction for services is currently a hot topic and a challenge for research in the fields of service recommendation and *** paper addresses the problem with a Time-aWare service Qualit...
详细信息
Dynamic Quality of Service(QoS)prediction for services is currently a hot topic and a challenge for research in the fields of service recommendation and *** paper addresses the problem with a Time-aWare service Quality Prediction method(named TWQP),a two-phase approach with one phase based on historical time slices and one on the current time *** the first phase,if the user had invoked the service in a previous time slice,the QoS value for the user calling the service on the next time slice is predicted on the basis of the historical QoS data;if the user had not invoked the service in a previous time slice,then the Covering Algorithm(CA)is applied to predict the missing *** the second phase,we predict the missing values for the current time slice according to the results of the previous phase.A large number of experiments on a real-world dataset,WS-Dream,show that,when compared with the classical QoS prediction algorithms,our proposed method greatly improves the prediction accuracy.
This paper first puts forward a case based system framework based on data mining techniques. Then the paper examines the possibility of using neural networks as a method of retrieval in such a case based system. In ...
详细信息
This paper first puts forward a case based system framework based on data mining techniques. Then the paper examines the possibility of using neural networks as a method of retrieval in such a case based system. In this system we propose data mining algorithms to discover case knowledge and other algorithms.
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmissi...
详细信息
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their *** propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic *** be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading *** proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping *** comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective *** derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading *** results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage ***,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
暂无评论