Alkali metal vapor cells are essential components of atomic magnetometers for magnetic field measurements. In this letter, a novel measurement method based on the surface plasmon resonance (SPR) effect to determine th...
详细信息
Age of Information (AoI) has been proposed as a new performance metric to capture the freshness of data. At wireless-powered network edge, the source nodes first need to be charged ready for update transmissions, whic...
详细信息
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st...
详细信息
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are still challenges,particularly for non-predetermined data *** propose an adaptive k-prototype clustering method(kProtoClust)which launches cluster exploration with a sketchy division of K clusters and finds evidence for splitting and *** behalf of a group of data samples,support vectors and outliers from the perspective of support vector data description are not the appropriate candidates for prototypes,while inner samples become the first candidates for instability reduction of *** from the representation of samples in traditional,we extend sample selection by encouraging fictitious samples to emphasize the representativeness of *** get out of the circle-like pattern limitation,we introduce a convex decomposition-based strategy of one-cluster-multiple-prototypes in which convex hulls of varying sizes are prototypes,and accurate connection analysis makes the support of arbitrary cluster shapes *** by geometry,the three presented strategies make kProtoClust bypassing the K dependence well with the global and local position relationship analysis for data *** results on twelve datasets of irregular cluster shape or high dimension suggest that kProtoClust handles arbitrary cluster shapes with prominent accuracy even without the prior knowledge K.
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has been known about the underlying relationships and how they reflect(or affect) user behaviors. To fill this gap, we characterize the app recommendation relationships in the i OS app store from the perspective of the complex network. We collect a dataset containing over 1.3 million apps and 50 million app recommendations. This dataset enables us to construct a complex network that captures app recommendation relationships. Through this, we explore the recommendation relationships between mobile apps and how these relationships reflect or affect user behavior patterns. The insights gained from our research can be valuable for understanding typical user behaviors and identifying potential policy-violating apps.
Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu...
详细信息
Flood is regarded as common disaster which could cause serious devastation in any country. Typically, it is caused due to precipitation & river runoffs, specifically at the time of excessive rainfall season. The t...
详细信息
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s...
详细信息
QIM(quantization index modulation)-based VoIP steganography is an information-hiding technology that malicious users could misuse to engage in illegal activities. Its countermeasure, commonly known as the QIM-based Vo...
详细信息
暂无评论