The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed fo...
详细信息
ISBN:
(纸本)9781467349970
The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed for the initial *** this paper,an initialization method based on the core clusters is used for the locality-weight fuzzy c-means *** core clusters can be formed by constructing the σ-neighborhood graph and their centers are regarded as the initial centers of the locality-weight fuzzy c-means *** investigate the effectiveness of our approach,several experiments are done on three *** results show that our proposed method can improve the clustering performance compared to the previous locality-weight fuzzy c-means clustering.
This paper proposes a method of the fault detection and diagnosis for the railway turnout based on the current curve of switch machine. Exact curve matching fault detection method and SVM-based fault diagnosis method ...
详细信息
Cough Recognition is a valuable classification problem in healthcare. Generally, feature representation contributes a lot to the overall classifying performance. In this paper, a novel feature extraction method, Gamma...
详细信息
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to access data from sensor nodes. Recently, M.L. Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. Later, Khan and Alghathbar (K-A) pointed out that Das’ scheme has some security pitfalls and showed several improvements to overcome these weaknesses. However, we demonstrate that in the K-A-scheme, there is no provision of non-repudiation, it is susceptible to the attack due to a lost smart card, and mutual authentication between the user and the GW-node does not attained. Moreover, the GW-node cannot prove that the first message comes from the user. To overcome these security weaknesses of the K-A-scheme, we propose security patches and prove our scheme.
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework.
In the initialization of the traditional semi-supervised k-means, the mean of some labeled data belonging to one same class was regarded as one initial center and the number of the initial centers is equal to the numb...
详细信息
The clustering method based on one-class support vector machine has been presented recently. Although this approach can improve the clustering accuracies, it often gains the unstable clustering results because some ra...
详细信息
A semi-supervised subtractive clustering has been proposed recently. However, it performance depends greatly on the choice of the parameters of the mountain function and only proper parameters enable the clustering me...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework.
This paper proposes a two-dimensional color uncorrelated principal component analysis algorithm(2DCUPCA) for unsupervised subspace learning directly from color face images. The 2DCUPCA can be used to explore uncorrela...
详细信息
暂无评论