Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Hongying Qin"'
Publikováno v:
Neurocomputing. 509:206-220
Publikováno v:
2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI).
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030775681
Image visual effects can be enhanced primarily through edge and texture enhancement or contrast enhancement. Image enhancement based on fractional differential can effectively enhance image details such as edge and texture using the weak derivative p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76b80b860c6be96d2213ea9ad1f0828f
https://doi.org/10.1007/978-3-030-77569-8_15
https://doi.org/10.1007/978-3-030-77569-8_15
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030775681
The main goal of this paper is to investigate the problems of the uniqueness of equilibrium and the global \(\mu \)-stability for the QVNN (quaternion-valued neural network) with leaky constant delay, non-differentiable discrete time-varying delay, d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6f8e671ab37039ad049d7e998f41d1a
https://doi.org/10.1007/978-3-030-77569-8_18
https://doi.org/10.1007/978-3-030-77569-8_18
Publikováno v:
CIS
The network traffics of Denial of Service (DoS) rise in large scale. Adaptive detection technologies for large-scale DoS network behaviors are needed urgently. For the above, a detection method for large-scale DoS behaviors based on Artificial Immune
Publikováno v:
CIS
The security situation of the Internet of Things (IoT) is constantly changing. Traditional passive management strategies for IoT can not adapt to the complicated environment of IoT. To solve the above problem, a dynamic defense architecture for the s
Publikováno v:
SKG
The dynamic nature and complexity of Internet make the surveillance of network behavior more and more difficult. To effectively survey anomaly network behaviors, the clonal selection principle is used to construct a surveillance algorithm for transmi
Publikováno v:
2012 International Conference on Computer Science and Electronics Engineering.
An efficient implementation of quick sort algorithm based on java muti-thread technology was proposed for multi-core computer system. According to Divide-and-Conquer method, it divided the data into a number of segments, and then merged the segments
Publikováno v:
2010 International Symposium on Intelligence Information Processing and Trusted Computing.
Compressive Sensing is a new theory to simultaneous sensing and compression. It enables a potentially large reduction in the sampling and computation costs for signals based on them having sparse representation in some basis. Many wavelet transformat