Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we propose a new discriminative dictionary learning framework, called robust Label Embedding Projective Dictionary Learning (LE-PDL), for data classification. LE-PDL can learn a discriminative dictionary and the blockdiagonal representations without using the l0-norm or l1-norm sparsity regularization, since the l0 or l1-norm constraint on the coding coefficients used in the existing...
Anaerobic reactor is one of the most important reaction devices for biogas engineering. Fire, explosion and toxic incidents will be triggered if the biogas leaks, and severe serial explosion accidents will be easily caused if the leakage cannot be identified, monitored and warned early in the process of production and operation. Therefore, this paper aims to establish a leakage risk monitoring and...
In this paper, we propose a L1-Norm driven Semi-Supervised Local Discriminant Projection (S2LDP-L1) for robust dimensionality reduction and image representation. For feature learning, our S2LDP-L1 approach aims at compacting local within-class divergence and separating local betweenclass divergence at the same time in addition to possessing the locality preserving power over all training data. To...
Protocol state machine is very essential in network security and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short time to market" phenomenon, often leads to a lack of up-to-date specifications and they are often characterized by bugs, anomalies and even threads. How to mine the accurate protocol...
Performance degradation of memory-intensive programs caused by the LRU policy's inability to handle weak-locality data accesses in the last level cache is increasingly serious for two reasons. First, the last-level cache remains in the CPU's critical path, where only simple management mechanisms, such as LRU, can be used, precluding some sophisticated hardware mechanisms to address the problem. Second,...
Nonnegative matrix factorization (NMF) is an unsupervised method whose aim is to find an approximate factorization Vn*m = Wn*r*Hr*m into non-negative matrices Wn*r and Hr*m. This paper presents an extension to NMF and discusses the development and the use of damped Newton based the non-negative matrix factorization called DNNMF with good convergence properties for wood image representation by adding...
Many problems in intelligent data analysis involve some forms of dimensionality reduction. The paper discusses a new supervised dimensionality reduction method where samples are accompanied with class labels. We also show that it can be easily extended to the non-linear dimensionality reduction scenarios by the kernel tricks, and then we proposes an effective orthogonal feature subspace and correlation...
The grading of woods is mainly determined by the defects on wood surfaces and determines the potential uses and values for the sawmills. However, the dimensions of wood images are high, which is difficult to deal with. Dimensionality reduction is one of key interests in processing the higher-dimensional image data without losing intrinsic information. The problem of sub-pattern based discriminative...
Conventional approach of detecting malwares relies on static scanning of malware signature. However, it may not work on the malwares that use software protection methods such as encryption and packing with run-time decryption and unpacking. We propose a hardware-assisted malware detection system that detects malwares during program run time to complement the conventional approach. It searches for...
Based on discrete Hermite-Gaussian-like functions, a discrete fractional Fourier transform (DFRFT), which provides sample approximations of the continuous fractional Fourier transform, was defined and investigated recently. In this paper, we propose a novel nearly tridiagonal matrix, which commutes with the generalized discrete Fourier transform (GDFT) matrix. It doesn't has repeated eigenvalue. We...
The discrete formal FRFT is difficult to obtained by the directly sampling the continuous FRFT because the kernel function of the continuous fractional Fourier transform (FRFT) exhibits drastic oscillation and the oscillation amplitude has the distinct difference from the different order of the FRFT. Discrete FRFT has been intensively investigated recently and many definitions of the discrete FRFT...
Scripting accelerates and simplifies the composition of existing codes to form more powerful applications. Parallel scripting extends this technique to allow for the rapid development of highly parallel applications that can run efficiently on platforms ranging from multicore workstations to petascale supercomputers.
The values of a board have a direct relationship with the grading determined by the number and distribution of defects. Currently, wood defects recognition research are one of the key interests in the wood industry. In this paper, DWT and NMF are employed and we apply the decomposition to wood feature selection. The feature images by DWT can describe the characteristics and differences of the defects...
The widespread use of multicore processors has dramatically increased the demand on high memory bandwidth and large memory capacity. As DRAM subsystem designs stretch to meet the demand, memory power consumption is now approaching that of processors. However, the conventional DRAM architecture prevents any meaningful power and performance trade-offs for memory-intensive workloads. We propose a novel...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.