The boundary-layer method is used to study a wide moving jam to a class of higher-order viscous models. The equations for characteristic parameters are derived to determine the asymptotic solution. The sufficient and ...
详细信息
The boundary-layer method is used to study a wide moving jam to a class of higher-order viscous models. The equations for characteristic parameters are derived to determine the asymptotic solution. The sufficient and essential conditions for the wide moving jam formation are discussed in detail, respectively, and then used to prove or disprove the existence of the wide moving jam solutions to many well-known higher-order models. It is shown that the numerical results agree with the analytical results.
A cascaded co-evolutionary model for Attribute reduction and classification based on Coordinating architecture with bidirectional elitist optimization(ARC-CABEO) is proposed for the more practical applications. The re...
详细信息
A cascaded co-evolutionary model for Attribute reduction and classification based on Coordinating architecture with bidirectional elitist optimization(ARC-CABEO) is proposed for the more practical applications. The regrouping and merging coordinating strategy of ordinary-elitist-role-based population is introduced to represent a more holistic cooperative co-evolutionary framework of different populations for attribute reduction. The master-slave-elitist-based subpopulations are constructed to coordinate the behaviors of different elitists, and meanwhile the elitist optimization vector with the strongest balancing between exploration and exploitation is selected out to expedite the bidirectional attribute co-evolutionary reduction process. In addition, two coupled coordinating architectures and the elitist optimization vector are tightly cascaded to perform the co-evolutionary classification of reduction subsets. Hence the preferring classification optimization goal can be achieved better. Some experimental results verify that the proposed ARC-CABEO model has the better feasibility and more superior classification accuracy on different UCI datasets, compared with representative algorithms.
Frequent counting is a very so often required operation in machine learning algorithms. A typical machine learning task, learning the structure of Bayesian network (BN) based on metric scoring, is introduced as an e...
详细信息
Frequent counting is a very so often required operation in machine learning algorithms. A typical machine learning task, learning the structure of Bayesian network (BN) based on metric scoring, is introduced as an example that heavily relies on frequent counting. A fast calculation method for frequent counting enhanced with two cache layers is then presented for learning BN. The main contribution of our approach is to eliminate comparison operations for frequent counting by introducing a multi-radix number system calculation. Both mathematical analysis and empirical comparison between our method and state-of-the-art solution are conducted. The results show that our method is dominantly superior to state-of-the-art solution in solving the problem of learning BN.
First,according to characteristics of mobile social environment,by using optimization models based on similarity degree and interaction degree respectively,the optimal correlated users can be selected for analyzing tw...
详细信息
ISBN:
(纸本)9781509036202
First,according to characteristics of mobile social environment,by using optimization models based on similarity degree and interaction degree respectively,the optimal correlated users can be selected for analyzing two main factors of a target user's behaviors(***-term habits and shortterm influences);furthermore,an adaptive update strategy based on fuzzy theory is proposed to describe the importance of two factors in real time and quantitative ***,an improved Apriori theory is introduced to predict user service behaviors accurately;particularly,a new update mechanism for Apriori sample database is built to effectively integrate the samples of optimal correlated ***,simulation results verify the effectiveness of proposed algorithm.
Differential-neural cryptanalysis poses critical security threats to internet of things-embedded lightweight block ciphers, outperforming traditional methods but requiring efficient input difference identification. Cu...
详细信息
According to Shanno's information theory,the directional feature of texture is defined as the value of directional variable when an image signal attains a singularity of random *** terms of this definition,we calc...
详细信息
According to Shanno's information theory,the directional feature of texture is defined as the value of directional variable when an image signal attains a singularity of random *** terms of this definition,we calculate the texture's directional features using Tamura's method and study the directional probability distribution of Contourlet *** we find that the directional features tend to be conveyed across parent and child *** on this conclusion,we establish a novel probability distribution model of hidden direction variables under the condition of hidden state variable's distribution,named Contourlet HMT model with directional *** structure and training method of the model are presented as ***,an unsupervised context-based image segmentation algorithm is proposed on the basis of the proposed *** effectiveness is verified via extensive experiments carried out on several synthesized images and remote sensing images.
Completely independent spanning trees(CISTs) are important construct which can be used in data center networks for multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribu...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Completely independent spanning trees(CISTs) are important construct which can be used in data center networks for multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribution, etc. As a recently proposed server-centric data center network, BCube has many good properties. By focusing on the connections between servers, we define the logic graph of BCube as LBCube. We study the construction of CISTs with small diameter on BCubek and show that there are n/2 [(n-1)/2 if n is odd] CISTs with the diameter 2 k + 3 on L-BCubek by presenting a recursive algorithm.
Aiming at the problems of short duration,low intensity,and difficult detection of micro-expressions(MEs),the global and local features of ME video frames are extracted by combining spatial feature extraction and tempo...
详细信息
Aiming at the problems of short duration,low intensity,and difficult detection of micro-expressions(MEs),the global and local features of ME video frames are extracted by combining spatial feature extraction and temporal feature *** on traditional convolution neural network(CNN)and long short-term memory(LSTM),a recognition method combining global identification attention network(GIA),block identification attention network(BIA)and bi-directional long short-term memory(Bi-LSTM)is *** the BIA,the ME video frame will be cropped,and the training will be carried out by cropping into 24 identification blocks(IBs),10 IBs and uncropped *** alleviate the overfitting problem in training,we first extract the basic features of the preprocessed sequence through the transfer learning layer,and then extract the global and local spatial features of the output data through the GIA layer and the BIA layer,*** the BIA layer,the input data will be cropped into local feature vectors with attention weights to extract the local features of the ME frames;in the GIA layer,the global features of the ME frames will be ***,after fusing the global and local feature vectors,the ME time-series information is extracted by *** experimental results show that using IBs can significantly improve the model’s ability to extract subtle facial features,and the model works best when 10 IBs are used.
暂无评论