The advancements in technology help in analyzing and predicting the disease of human life using automation. Out of various technologies, Machine Learning (ML) and Deep learning (DL) provide some promising results to h...
详细信息
Cloud computing, with its fundamental virtualization technique, offers a flexible and powerful platform for deploying various applications. Real-time task scheduling in cloud environments, however, presents significan...
详细信息
作者:
Huang, AipingLi, LijianZhang, LeNiu, YuzhenZhao, TiesongLin, Chia-WenFuzhou University
Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou350108 China Fuzhou University
Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou350108 China University of Electronic Science and Technology of China
School of Information and Communication Engineering Chengdu611731 China Fuzhou University
Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering The Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou350108 China Institute of Communications Engineering
National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Image co-segmentation and co-localization exploit inter-image information to identify and extract foreground objects with a batch mode. However, they remain challenging when confronted with large object variations or ...
详细信息
Anti-ship missile coordinated attack mission planning is a complex multi-objective optimization problem with multiple combinations of platforms, strong decision-making constraints,and tightly coupled links. To avoid t...
详细信息
Anti-ship missile coordinated attack mission planning is a complex multi-objective optimization problem with multiple combinations of platforms, strong decision-making constraints,and tightly coupled links. To avoid the coupling disorder between path planning and firepower distribution and improve the efficiency of coordinated attack mission planning, a firepower distribution model under the conditions of path planning is established from the perspective of decoupling optimization and the algorithm is implemented. First, we establish reference coordinate system of firepower distribution to clarify the reference direction of firepower distribution and divide the area of firepower distribution;then, we construct an index table of membership of firepower distribution to obtain alternative firepower distribution plans;finally, the fitness function of firepower distribution is established based on damage income, missile loss,ratio of efficiency and cost of firepower distribution, and the mean square deviation of the number of missiles used, and the alternatives are sorted to obtain the optimal firepower distribution plan. According to two simulation experiments, the method in this paper can effectively solve the many-to-many firepower distribution problem of coupled path planning. Under the premise of ensuring that no path crossing occurs, the optimal global solution can be obtained, and the operability and timeliness are good.
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip...
详细信息
ISBN:
(纸本)9798350328202
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to principally uphold the confirmation framework. Notwithstanding foundations regulating guaranteed about information straightforwardly, affiliations are also obliging them to examine the fingerprint endorsement. Despite establishments overseeing ensured about data, directly associations are similarly obliging them to research the fingerprint check. Organizations and foundations both are typically utilizing the idea of fingerprint for the participation and presence reason. Nevertheless, establishments presently managing secured information as like institutes and additionally going along with them to investigate the fingerprint authentication. More than this usual action there are some particular applications where the authentication would be considerable to help the application than using a traditional pattern of password. We proposed a fingerprint authentication system for the scientific based industry database access system. We removed the noise if any found in the input fingerprint using anisotropic Gauss filtering. The noise free fingerprint image is not further passed to the binarization phase as the need of binarization and some form of the drawback of binarization is replaced with a thinning algorithm. The thinned fingerprint image is followed by the matching process and once it is matched, then only the sensitive and highly confidential information are allowed to access from the database. The testing is done using OpenCV and FVC 2004 dataset to assess the projected retrieval method. Further the matched fingerprints are used to prove some of the internal structure properties of multi-granular rough sets (MGRS) on authenticated database fields. The accuracy obtained in this hybrid approach is found to be more satisfactory and hence the security towards acce
The integration of the Internet of Things (IoT) into vehicular networks has paved the way for the exciting development of the Internet of Vehicles (IoV) within Intelligent Transportation systems (ITS). These breakthro...
详细信息
Deep learning and transfer learning are extremely important in the internet sector and the health care industry. Face recognition technology is essential in practically every industry in our digital age. Several impro...
详细信息
Hilbert curve describes a one-to-one mapping between multidimensional space and 1 D *** traditional 3D Hilbert encoding and decoding algorithms work on order-wise manner and are not aware of the difference between dif...
详细信息
Hilbert curve describes a one-to-one mapping between multidimensional space and 1 D *** traditional 3D Hilbert encoding and decoding algorithms work on order-wise manner and are not aware of the difference between different input data and spend equivalent computing costs on them, thus resulting in a low efficiency. To solve this problem, in this paper we design efficient 3D state views for fast encoding and decoding. Based on the state views designed, a new encoding algorithm(JFK-3HE) and a new decoding algorithm(JFK-3HD) are proposed. JFK-3HE and JFK-3HD can avoid executing iteratively encoding or decoding each order by skipping the first 0 s in input data, thus decreasing the complexity and improving the efficiency. Experimental results show that JFK-3HE and JFK-3HD outperform the state-of-the-arts algorithms for both uniform and skew-distributed data.
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi...
详细信息
Cascaded liquid crystal polarization grating (LCPG) structure is commonly used to realize two-dimension large angle optical beam steering. In this architecture, different LCPGs have different incident angles. As a liq...
详细信息
暂无评论