Relative humidity (RH) significantly influences various aspects of human life, including agriculture, weather prediction, indoor air quality, and energy consumption. Its intricate non-linear behavior poses a significa...
详细信息
Summary: The elegant and surprising Conway Circle Theorem (CCT) for triangles has become more widely known following the death of its discoverer John Horton Conway (1938–2020). The logical equivalence of the CCT and ...
详细信息
Multiform fractures have a direct impact on the mechanical performance of rock *** accurately identify multiform fractures,the distribution patterns of grayscale and the differential features of fractures in their nei...
详细信息
Multiform fractures have a direct impact on the mechanical performance of rock *** accurately identify multiform fractures,the distribution patterns of grayscale and the differential features of fractures in their neighborhoods are *** on this,a multiscale processing algorithm is *** multiscale process is as *** the neighborhood of pixels,a grayscale continuous function is constructed using bilinear interpolation,the smoothing of the grayscale function is realized by Gaussian local filtering,and the grayscale gradient and Hessian matrix are calculated with high *** small-scale blocks,the pixels are classified by adaptively setting the grayscale threshold to identify potential line segments and *** the global image,potential line segments and mini-fillings are spliced together by progressing the block frontier layer-by-layer to identify and mark multiform *** accuracy of identifying multiform fractures is improved by constructing a grayscale continuous function and adaptively setting the grayscale thresholds on small-scale *** the layer-by-layer splicing algorithm is performed only on the domain of the 2-layer small-scale blocks,reducing the *** using rock mass images with different fracture types as examples,the identification results show that the proposed algorithm can accurately identify the multiform fractures,which lays the foundation for calculating the mechanical parameters of rock masses.
The persistence and growth of insider threats pose a significant challenge to the information security community. Malicious insiders have been identified as one of the most detrimental threats to sensitive data includ...
详细信息
Contemporary Machine Learning (ML) techniques can now be conveniently applied to the wireless channel estimation problem to reduce the estimation complexity and enhance the system's overall data rate. Traditionall...
详细信息
The security of academic credentials is increasingly at risk due to cyberattacks and credential fraud. Traditional verification systems rely on centralised databases, creating single points of failure and privacy conc...
详细信息
Biometric recognition is a widely used technology for user *** the application of this technology,biometric security and recognition accuracy are two important issues that should be *** terms of biometric security,can...
详细信息
Biometric recognition is a widely used technology for user *** the application of this technology,biometric security and recognition accuracy are two important issues that should be *** terms of biometric security,cancellable biometrics is an effective technique for protecting biometric *** recognition accuracy,feature representation plays a significant role in the performance and reliability of cancellable biometric *** to design good feature representations for cancellable biometrics is a challenging topic that has attracted a great deal of attention from the computer vision community,especially from researchers of cancellable *** extraction and learning in cancellable biometrics is to find suitable feature representations with a view to achieving satisfactory recognition performance,while the privacy of biometric data is *** survey informs the progress,trend and challenges of feature extraction and learning for cancellable biometrics,thus shedding light on the latest developments and future research of this area.
This paper provides the latest information on browser fingerprinting issues in the Dark Web. The data analysis has been initiated, and the latest techniques for browser fingerprinting are included. A comparative analy...
详细信息
In this paper,the authors consider the stabilization and blow up of the wave equation with infinite memory,logarithmic nonlinearity and acoustic boundary *** authors discuss the existence of global solutions for the i...
详细信息
In this paper,the authors consider the stabilization and blow up of the wave equation with infinite memory,logarithmic nonlinearity and acoustic boundary *** authors discuss the existence of global solutions for the initial energy less than the depth of the potential well and investigate the energy decay estimates by introducing a Lyapunov ***,the authors establish the finite time blow up results of solutions and give the blow up time with upper bounded initial energy.
An essential feature of the subdiffusion equations with theα-order time fractional derivative is the weak singularity at the initial *** weak regularity of the solution is usually characterized by a regularity parame...
详细信息
An essential feature of the subdiffusion equations with theα-order time fractional derivative is the weak singularity at the initial *** weak regularity of the solution is usually characterized by a regularity parameterσ∈(0,1)∪(1,2).Under this general regularity assumption,we present a rigorous analysis for the truncation errors and develop a new tool to obtain the stability results,i.e.,a refined discrete fractional-type Grönwall inequality(DFGI).After that,we obtain the pointwise-in-time error estimate of the widely used L1 scheme for nonlinear subdiffusion *** present results fill the gap on some interesting convergence results of L1 scheme onσ∈(0,α)∪(α,1)∪(1,2].Numerical experiments are provided to demonstrate the effectiveness of our theoretical analysis.
暂无评论