Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Dapeng Lang"'
Publikováno v:
Drones, Vol 7, Iss 9, p 572 (2023)
In emergency rescue missions, rescue teams can use UAVs and efficient path planning strategies to provide flexible rescue services for trapped people, which can improve rescue efficiency and reduce personnel risks. However, since the task environment
Externí odkaz:
https://doaj.org/article/57d1b29371584b279f90bfc025691c5b
Publikováno v:
Entropy, Vol 25, Iss 9, p 1306 (2023)
Deep neural networks have made great achievements in remote sensing image analyses; however, previous studies have shown that deep neural networks exhibit incredible vulnerability to adversarial examples, which raises concerns about regional safety a
Externí odkaz:
https://doaj.org/article/5afbe97e241f40179abf357dd55900bb
Publikováno v:
AIMS Mathematics, Vol 6, Iss 2, Pp 1822-1832 (2021)
The iterative functional equation $ \alpha\rightarrow(\alpha\rightarrow \beta) = \alpha\rightarrow \beta $ and the law of importation $ (\alpha\wedge \beta)\rightarrow \gamma = \alpha\rightarrow (\beta\rightarrow \gamma) $ are two tautologies in clas
Externí odkaz:
https://doaj.org/article/cf81853d3195401aa95cd2a134d38484
Publikováno v:
IEEE Access, Vol 8, Pp 1644-1652 (2020)
Specific Emitter Identification (SEI) detects the individual emitter according its varied signal characteristics. The method operates in the physical layer of the internet and can effectively improve the security of the Internet of Things (IoT). Gene
Externí odkaz:
https://doaj.org/article/7a2da31a2757435080763b3ce51ddad3
Publikováno v:
Algorithms, Vol 15, Iss 12, p 465 (2022)
Small perturbations can make deep models fail. Since deep models are widely used in face recognition systems (FRS) such as surveillance and access control, adversarial examples may introduce more subtle threats to face recognition systems. In this pa
Externí odkaz:
https://doaj.org/article/6c3d0970d9454a8987d8c2a3d03a6a9a
Publikováno v:
Information, Vol 13, Iss 10, p 465 (2022)
The deep model is widely used and has been demonstrated to have more hidden security risks. An adversarial attack can bypass the traditional means of defense. By modifying the input data, the attack on the deep model is realized, and it is impercepti
Externí odkaz:
https://doaj.org/article/5a671ffe3d434f438d0ae0e33f482fe1
Publikováno v:
Advances in Mechanical Engineering, Vol 6 (2014)
A hybrid numerical method was used to calculate the flow-induced noise and vibration of the centrifugal pump in the paper. The unsteady flows inside the centrifugal pumps with different blade outlet angles were simulated firstly. The unsteady pressur
Externí odkaz:
https://doaj.org/article/1e7936810bc444259b5d053d439b527f
Publikováno v:
PLoS ONE, Vol 9, Iss 3, p e90109 (2014)
The limitations in general methods to evaluate clustering will remain difficult to overcome if verifying the clustering validity continues to be based on clustering results and evaluation index values. This study focuses on a clustering process to an
Externí odkaz:
https://doaj.org/article/aae1052b87404736acb3003deb9f03a9
Publikováno v:
AIMS Mathematics, Vol 6, Iss 2, Pp 1822-1832 (2021)
The iterative functional equation $ \alpha\rightarrow(\alpha\rightarrow \beta) = \alpha\rightarrow \beta $ and the law of importation $ (\alpha\wedge \beta)\rightarrow \gamma = \alpha\rightarrow (\beta\rightarrow \gamma) $ are two tautologies in clas
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Deep learning has been widely used in the field of image classification and image recognition and achieved positive practical results. However, in recent years, a number of studies have found that the accuracy of deep learning model based on classifi