In recent years, along with the development of technologies for distributed computing such as big data and clouds workflow systems, efficiency of workflow scheduling has become very impotent. Hence sc
In recent years, along with the development of technologies for distributed computing such as big data and clouds workflow systems, efficiency of workflow scheduling has become very impotent. Hence sc
To predict lung nodule malignancy with a high sensitivity and specificity, we propose a fusion algorithm that combines handcrafted features (HF) into the features learned at the output layer of a 3D deep convolutional...
详细信息
Implicit discourse relation recognition is a crucial component for automatic discourse-level analysis and nature language understanding. Previous studies exploit discriminative models that are built on either powerful...
详细信息
Overcome context-independent probabilities based reasoning, with decomposition of categories and predicates into features as non-stable predicates. With distinction between generative classifier and discriminative cla...
详细信息
Overcome context-independent probabilities based reasoning, with decomposition of categories and predicates into features as non-stable predicates. With distinction between generative classifier and discriminative classifier, we purpose to use some discriminative classifiers such as dual-form perceptron and kernelized support vector machine to improve to result of reasoning process. With capability of dual-form perceptron and kernelized support vector machine, finding linear or non-linear decision boundary for similarity-like supporting predicate for reasoning process.
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally published electronically on the publisher’s internet portal.
We consider deep learning (DL) for event classification using electroencephalogram (EEG) measurements of brain activities. We proposed HDNN or hierarchical deep neural network, and CNN4EEG, a new convolution neural ne...
详细信息
In the present study, there are a number of recognition methods with high recognition accuracy, which are based on deep learning. However, these methods usually have a good effect in a restricted environment, but in t...
详细信息
In the present study, there are a number of recognition methods with high recognition accuracy, which are based on deep learning. However, these methods usually have a good effect in a restricted environment, but in the natural environment, the accuracy of face recognition has decreased significantly, especially in the case of occlusion, face recognition will appear inaccurate or unrecognized situation. Based on this, this paper presents a face recognition method based on the deep learning in the natural environment, hoping to achieve robust performance in the natural environment, especially in the case of occlusion. The main contribution of this paper is improving the method of multi-patches by using 4 areas' patches in the face. And in order to have a higher performance, we use a Joint Bayesian (JB) measure in face-verification. Finally, we trained the model by the set of CASIA-WebFace and test it in the Labeled Faces in the Wild (LFW).
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory da...
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However...
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However, it is difficult to consider numerous factors. We present a new approach for analyzing the SET pulses propagation probabilities (SPPs). It considers all masking effects and uses SET pulses propagation probabilities matrices (SPPMs) to represent the SPPs in current cycle. Based on the matrix union operations, the SPPs in consecutive cycles can be calculated. Experimental results show that our approach is practicable and efficient.
Dear editor,The Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)hybrid with the resource reservation approach from Time Division Multiple Address(TDMA)has been emerged as a promising method to solve col...
详细信息
Dear editor,The Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)hybrid with the resource reservation approach from Time Division Multiple Address(TDMA)has been emerged as a promising method to solve collision problems in wireless LANs[1–6].In the hybrid method,a TDMA circle contains multiple slots for nodes to contend for the ***,it allows a
暂无评论