3D novelty detection plays a crucial role in various real-world applications, especially in safety-critical fields such as autonomous driving and intelligent surveillance systems. However, existing 3D novelty detectio...
详细信息
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution lan...
详细信息
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution language (BPEL) is modified in company with the analysis of data dependency and an exact representation of dead path elimination (DPE) is proposed, which over-comes the difficulties brought to dataflow analysis. Then defining and using information based on data flow rules is collected by parsing BPEL and Web services description language (WSDL) documents and the def-use annotated control flow graph is created. Based on this model, data-flow anomalies which indicate potential errors can be discovered by traversing the paths of graph, and all-du-paths used in dynamic data flow testing for Web services composition are automatically generated, then testers can design the test cases according to the collected constraints for each path selected.
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safet...
详细信息
In the field of quantum communication,quantum steganography is an important branch of quantum information *** a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic ***,it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of *** paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise *** results show that when the noise factor of one quantum channel noise is known,the size of the noise factor of the other quantum channel can be adjusted accordingly,such as artificially applying noise,so that the influence of noises on the protocol is *** addition,this paper also proposes a method of improving the efficiency of the steganographic protocol in a noisy environment.
Due to growth of vehicles in urban cities, such problems are increases traffic control systems, security and crime investigation, intelligent parking and electronic toll collection. Moreover, Logistics access manageme...
详细信息
The advance of the high throughput technology allows to quantitative measure the level of expression of thousands of genes under several experimental conditions at one time which quickly produce many gene expression d...
详细信息
The advance of the high throughput technology allows to quantitative measure the level of expression of thousands of genes under several experimental conditions at one time which quickly produce many gene expression data. For efficiency processing the above data, many biclustering algorithms and many criterions are proposed. Even so, different biclustering algorithms generate different type of biclusters and draw various conclusions because the definition of the bicluster and its evaluation criterions used indifferent biclustering algorithms are similar but not the same. But there are only a few literatures forcomparing the biclustering algorithms and its evaluationcriterions. In this paper, the biclusters obtained by 11 biclustering algorithms are evaluated according to 7 criterions. In addition, the weight enrichment score and the proportion of the enriched biclusters by gene ontology are used for evaluating the biological significance of the biclustering *** analyzing the results of the chose biclustering algorithms, this study suggest that the biclustering algorithms provide a flexible solution for analyzing multiple types of gene expression data, and manyinteresting results are observedwhich facilitate exploratory data mining of gene expression data.
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r...
详细信息
Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the prediction ...
详细信息
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vi...
详细信息
Image recognition has always been a hot research topic in the scientific community and *** emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vision,especially in image *** it makes the recognition result largely dependent on the number and quality of training ***,DCGAN has become a frontier method for generating images,sounds,and *** this paper,DCGAN is used to generate sample that is difficult to collect and proposed an efficient design method of generating *** combine DCGAN with CNN for the second *** DCGAN to generate samples and training in image recognition model,which based by *** method can enhance the classification model and effectively improve the accuracy of image *** the experiment,we used the radar profile as dataset for 4 categories and achieved satisfactory classification *** paper applies image recognition technology to the meteorological field.
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic fi...
详细信息
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic filtering on image under various lighting conditions, whose key component is a Difference of Gaussian (DoG) filter, which can effectively reduce the effect of varying illumination. Then a LoG operator is used for illumination invariant extraction. Experimental results on the Yale face database B and CMU PIE database show that the proposed method can effectively eliminate the effect of varying illumination on face recognition, and the extracted illumination invariant is robust.
Transfer alignment is used to initialize SINS(Strapdown Inertial Navigation System)in ***-arm effect compensation is studied existing in an AUV(Autonomous Underwater Vehicle)before launched from the mother *** AUV is ...
详细信息
Transfer alignment is used to initialize SINS(Strapdown Inertial Navigation System)in ***-arm effect compensation is studied existing in an AUV(Autonomous Underwater Vehicle)before launched from the mother *** AUV is equipped with SINS,Doppler Velocity Log,depth sensor and other navigation *** lever arm will cause large error on the transfer alignment between master inertial navigation system and slave inertial navigation system,especially in big ship *** paper presents a novel method that can effectively estimate and compensate the flexural lever arm between the main inertial navigation system mounted on the mother ship and the slave inertial navigation system equipped on the *** nonlinear measurement equation of angular rate is derived based on three successive rotations of the body frame of the master inertial navigation *** filter is utilized as the nonlinear estimator for its capability of non-linear *** analysis was conducted on the SINS state vector based on singular value decomposition *** equation of SINS was adopted as the system state *** experiments were conducted and results showed that the proposed method can estimate the flexural lever arm more accurately,the precision of transfer alignment was improved and alignment time was shortened accordingly.
暂无评论