Role-Based Access Control (RBAC) does not define information flow and not enforce information flow control, which can cause illegal information flow and many researchers in some literature have discussed. But some pro...
详细信息
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practic...
详细信息
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practical value. In the paper, we propose a method to calculate the pre-images using the kernel methods. And we specifically design an algorithm to obtain the pre-image based on the kernel PCA with Gaussian kernel. In the algorithm, the constructed optimal problem is solved by the iterative method. The method is available to all the learning problems with a large sample set. We use the method to detect the defects on the tickets' surface. The experiments results indicate that the method not only reduce the mistake rate but also cut down the detection time.
Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, norm...
详细信息
Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, normal samples) to train detectors. This paper presents an improved negative selection algorithm (NSA) and its applications to anomaly detection. This approach can only use normal samples to train detectors;at the same time, in order to overcome the drawbacks of the current representation of the self-space in NSAs, a new scheme of the representation of the self-space is introduced with variable-sized self-radius. In our experiments, this approach is tested using the wellknown real world datasets;preliminary results show that the new approach improves the overall performance of detectors and without increase in complexity.
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy g...
详细信息
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy gap,and the model is valided in both subthreshold and above-threshold *** second one is the polynomial based model valided in above-threshold regime,and the model has the advantage in the simple parameter extraction steps by fitting the experimental effective mobility with the polynomial *** presented models are verified with the experimental data, and good agreements are obtained.
3d model plays an important role in modern visualization applications. Image or video based 3d model reconstruction is being more and more widely used. In this paper, the way to reconstruct a 3d model from video colle...
详细信息
3d model plays an important role in modern visualization applications. Image or video based 3d model reconstruction is being more and more widely used. In this paper, the way to reconstruct a 3d model from video collected with a compact camera is discussed, including both the main procedure and some technical implementation issues.
Detecting unknown malicious executables is a challenging task. Traditional anti-virus systems use signatures to detect malicious executables. However, the method cannot detect unseen instances or variants. Inspired by...
详细信息
In this paper, the feasibility of co-channel coexistence of Time Division- Synchronous Code Division Multiple Access (TD-SCDMA) and Code Division Multiple Access 2000 (CDMA2000) systems operating in a macro cell envir...
详细信息
In order to solve the low accuracy problem of GPU-based FFT, a mixed precision method is employed in this paper. A "precision cache" method is proposed as the supplement of the mixed precision method to calc...
详细信息
Pedestrian detection has been widely used in many applications, however, it is a challenging task and there are many problems unsolved to be handled. Althougth Histograms of Oriented Gradients (HOG) plus Support Vecto...
详细信息
For Chinese word segmentation and POS tagging problem, both character-based and word-based discriminative approaches can be used. Experiments show that these two approaches bring different errors and can complement ea...
详细信息
暂无评论