Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an...
详细信息
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process.
A novel and facile oxidation-induced self-doping process of graphene-silicon Schottky junction by nitric acid(HNO3) vapor is reported. The HNO3 oxidation process makes graphene p-type self-doped, and leads to a high...
详细信息
A novel and facile oxidation-induced self-doping process of graphene-silicon Schottky junction by nitric acid(HNO3) vapor is reported. The HNO3 oxidation process makes graphene p-type self-doped, and leads to a higher built-in potential and conductivity to enhance charge transfer and to suppress charge carrier recombination at the graphene-silicon Schottky junction. After the HNO3 oxidation process, the open-circuit voltage is increased from the initial value of 0.36 V to the maximum value of 0.47 V, the short-circuit current is greatly increased from 0.80μA to 7.71μA, and the ideality factor is optimized from 4.4 to 1.0. The enhancement of the performance of graphene-Si solar cells may be due to oxidation-induced p-type self-doping of graphene-Si junctions.
With the continuous deepening of Artificial Neural Network(ANN)research,ANN model structure and function are improving towards diversification and ***,the model is more evaluated from the pros and cons of the problem-...
详细信息
With the continuous deepening of Artificial Neural Network(ANN)research,ANN model structure and function are improving towards diversification and ***,the model is more evaluated from the pros and cons of the problem-solving results and the lack of evaluation from the biomimetic aspect of imitating neural networks is not inclusive ***,a new ANN models evaluation strategy is proposed from the perspective of bionics in response to this problem in the ***,four classical neural network models are illustrated:Back Propagation(BP)network,Deep Belief Network(DBN),LeNet5 network,and olfactory bionic model(KIII model),and the neuron transmission mode and equation,network structure,and weight updating principle of the models are analyzed *** analysis results show that the KIII model comes closer to the actual biological nervous system compared with other models,and the LeNet5 network simulates the nervous system in ***,evaluation indexes of ANN are constructed from the perspective of bionics in this paper:small-world,synchronous,and chaotic ***,the network model is quantitatively analyzed by evaluation indexes from the perspective of *** experimental results show that the DBN network,LeNet5 network,and BP network have synchronous *** the DBN network and LeNet5 network have certain chaotic characteristics,but there is still a certain distance between the three classical neural networks and actual biological neural *** KIII model has certain small-world characteristics in structure,and its network also exhibits synchronization characteristics and chaotic *** with the DBN network,LeNet5 network,and the BP network,the KIII model is closer to the real biological neural network.
This paper presents a new clustering algorithm to solve the blind identification problem of digital communication signal modulation types. the algorithm utilized the instantaneous frequency and instantaneous phase of ...
详细信息
A strategy was proposed to predict accurately the dielectric permittivity and dielectric strength based on the Onsager local field *** molecular dynamic simulation was utilised to analyse the dipole moment fluctuation...
详细信息
A strategy was proposed to predict accurately the dielectric permittivity and dielectric strength based on the Onsager local field *** molecular dynamic simulation was utilised to analyse the dipole moment fluctuation in polyimide(PI)to reflect the polar-isation response of applied electric *** simulation results revealed that the optical dielectric permittivity and static dielectric permittivity were 2.62 and 3.34,showing that the electronic displacement polarisation of the PI acted as a major *** deviation between simulated and measured values of the frequency-dependent relative dielectric permittivity was no more than 5%,which exhibited high *** the polarisation response of the polar groups in the PI was at infrared frequencies,the conductive loss may be the dominant role in 102–106 Hz at room ***,the effect of Joule heat on the structure,dielectric permittivity and Young modulus was considered to accurately predict the dielectric strength of the PI(359 kV/mm),which was in agreement with experimental values in the *** results establish a clear correlation between structural characteristics and dielectric properties of the PI,which would be the theoretical insights into the design and synthesis of the PI with tailored dielectric properties.
Since the propulsion performance of fish pectoral fin is directly related to its kinematic parameters, for improving the propulsion performance of pectoral fin, the kinematic model of propulsion motion of pectoral fin...
详细信息
A novel method for fingerprint singular points extraction including location and orientation is proposed based on some properties of the orientation field models. Singular points are located by clustering the results ...
详细信息
A novel method for fingerprint singular points extraction including location and orientation is proposed based on some properties of the orientation field models. Singular points are located by clustering the results of corner detection. Then, through examining the sub-block orientation fields at a number of selected positions on concentric circles centered about the located singular point, an iterative method based on the orientation differences is proposed to compute the orientation of the core point. Experimental results on NIST4 and FVC2002 four databases demonstrate the proposed method can consistently locate singular points with the high accuracy. The location and orientation of the detected singular points can be used for alignment (translation and rotation) parameters in fingerprint matching.
Image segmentation is a classical problem in the area of image processing, motion estimation, and soon. Although there exist a lot of clustering based approaches to perform image segmentation, few of them study how to...
详细信息
Image segmentation is a classical problem in the area of image processing, motion estimation, and soon. Although there exist a lot of clustering based approaches to perform image segmentation, few of them study how to obtain more accurate image segmentation results by designing a suitable clustering method. In this paper, we select an appropriate distance measure in the composite feature space of color and texture. Then the distance measure is incorporated in a clustering method that utilizes the spatial information of each feature vector. Finally, the proposed scheme performs morphology filtering to obtain the final segmented regions. Experimental results show that proposed scheme can constantly achieve higher segmentation accuracy compared to some state-of-art image segmentation algorithms.
This paper introduces a novel approach of watermarking for copyright protection applications using the singular value decomposition (SVD) in the dual tree complex wavelet transform (DT-CWT) domain. After applying the ...
详细信息
This paper introduces a novel approach of watermarking for copyright protection applications using the singular value decomposition (SVD) in the dual tree complex wavelet transform (DT-CWT) domain. After applying the 2-level DT-CWT to the cover grayscale image, we apply the SVD to each high-pass subband obtained. The singular values in each subband are then modified by the singular values of the DT-CWT-transformed visual watermark. Modification in all subbands allows the development of a watermarking scheme that is robust to a wide range of attacks. Experimental results demonstrate that the proposed watermarking scheme is highly robust to various attacks.
Due to utilization of the relativity of every pixel of an image, the Markov random field (MRF) model is effective in solving the problem of detecting moving objects under a complex background. In this paper, the bits-...
详细信息
暂无评论