The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Three-dimensional surface reconstruction based on photometric stereo requires accurate positioning of the light source or estimation of the lighting parameters, which increases the complexity of the operation in experiments. Moreover, the actual light environment is composed of many kinds of complex optical components, and the accurate lighting parameters cannot be measured. In this paper, a reference...
Electric lines were the most common physical evidences in the fire scenes, and they played an important role in identifying the causes of the fire. Automatic recognition which based on deep learning about the images of insulating lagging (PVC and rubber) were researched, the traces on the images of insulating lagging were extracted by identifying the characteristics which were caused by low-over current...
Aiming at the problem that the node energy is limited, the network cycle is short and the throughput is low in the wireless sensor network, Dynamic Routing Protocol Based on Clustering was proposed known as KACO (K-means and Ant Colony Optimal). At the beginning it employs ant colony optimal and k-means algorithm to form cluster, and the novel method which consider the energy ratio, node location...
The geological disasters of landslides induced by the Wenchuan earthquake are great in number so landslide disaster recognition and investigation must be conducted in the early stage of large construction planning in the disaster area. In recent years, the studies on image recognition focus on the extreme learning machine algorithm. Based on the preprocessing of remote sensing images, this paper conducts...
Identifying influential spreaders in social network is of great theoretical and practical significance. In this paper, we propose an improved weighted LeaderRank algorithm. Instead of considering degree of node only, we also take clustering coefficient into account to depict the weight. Moreover, we change the way of score assignment, which can give more scores to those high-influence nodes. Compared...
With the Extension and application of cloud computing, users are more inclined to store data in the cloud. Hence the user data privacy protection have become important issues to be solved urgently. Encryption is an effective way to protect privacy, but encryption has a great impact on the performance of data processing. Encrypted data are often lost maneuverability. To cope with this problem, in this...
Activity recognition is mainly used in health care, authentication and many other fields. Activity recognition based on a smart watch usually performs much better than any other means of activity recognition in these areas. With its small size, high integration and multi-function, smart watch holds more advantages over the devices used in image based activity recognition, for example, a monitor, which...
In this paper, we present an analysis model for fire accidents of electric bicycles based on principal component analysis (PCA). Our schema proposes a method to extract fire data of electric bicycle and analyzes the features selected as representative of fire data. The PCA method, which is one of the most popular methods of feature extraction at present, is introduced to the analysis model for fire...
With the country's rapid economic development, as well as the growing shortage of land resources, many Chinese enterprises (especially manufacturers and distributors) would like to optimize their inventory capacity rate in the limited space they have available. The integration of storage with other processes is the key step in achieving the efficient sorting of goods and their warehousing; however,...
The artificial visual detection and recognition of bridges' cracks bear great dangers, therefore, we put forward a method of digital and intelligent detection of bridges fractures, combined with machine vision and the Deep Belief Network technologies. This method adopts Raspberry Pi to collect and pre-process images, to transmit images data by the GPRS / 3G or wired networks. And it uses high-level...
With the rapid development of Internet, we have entered an era of information explosion, there is a lot of redundant information in the Network. How to extract a useful part of this information from the massive information resources, analyzing the vast amount of information and finally get the potential knowledge we want to extract. Web mining technology came into being, and saved out the human from...
Traditional approaches to analysis the sentiment of short text don't consider the relationship between emotion words and modifiers and simply accumulate the sentiment of the sentence to obtain the sentiment of short text. In this paper, we show how to mitigate the problems through sentiment structure and the sentiment calculation rules. The sentiment structure is obtained from the dependency parsing...
Apriori algorithm is a classic mining algorithm which can mining association rules and sequential patterns. However, when the Apriori algorithm is applied to contiguous sequential pattern mining, it is inefficient. In web log mining, the contiguous sequential pattern can better represent the semantic information of the user's access to the site due to the continuity of the user's visit to the site...
Passwords are frequently used in data encryption and user authentication. Since people incline to choose meaningful words or numbers as their passwords, lots of passwords are easy to guess. This paper introduces a password guessing method based on Long Short-Term Memory recurrent neural networks. After training our LSTM neural network with 30 million passwords from leaked Rockyou dataset, the generated...
In this work, we derive the Bernoulli forward-backward smoother for interval measurement using finite set statistics, and box-particle implementation was given. A box particle is a random sample that occupies a controllable rectangular region of nonzero volume in the target state space, which has nature advantage when dealing with interval measurement. While smoothing reduces estimation error by delaying...
Unknown malware has increased dramatically, but the existing security software cannot identify them effectively. In this paper, we propose a new malware detection and classification method based on n-grams attribute similarity. We extract all n-grams of byte codes from training samples and select the most relevant as attributes. After calculating the average value of attributes in malware and benign...
In response to the problems of the Windows executable being reverse-analyzed easily, we introduce the technology of INT3 breakpoint detection and characteristics detection in the tail of the heap in the software anti-dynamic-debugging. We also applied the multistage security policy which contains self-stored secret key decryption and the UKEY based decryption to the anti-static-analysis. When an attacker...
Antiviral drugs are taken as the primary measures to control influenza pandemics efficacious, especially in the early stage of pandemic influenza outbreak. To limit strain on hospitals, commercial pharmacies have been taken as antiviral drug-dispensing partners in some governments' pandemic response plans. Existing researches focus on site selection by optimizing the single objective of access to...
Prediction of incident duration not only can give the traffic managers decisive support, such as releasing traffic information in advance, but also can make the traffic participants arrange travel routes and improve travel efficiency. In order to improve the low prediction accuracy and complexity of the model proposed previously, traffic broadcasting information, including incident broadcasting information...
The ubiquity of sensor enabled by Wireless Sensor Network (WSN) technologies cover many areas of modern daily lives. This offers the possibility to measure, simulate and control environments, from natural resources to urban environments. It is usually use Internet of Things (IoT) for centralized management or control of machines, equipment and personnel. This paper use WSN to get temperature and transmit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.