Zobrazeno 1 - 10
of 452
pro vyhledávání: '"Renfa Li"'
Publikováno v:
IEEE Access, Vol 12, Pp 108374-108388 (2024)
Detecting drones is a complex challenge, primarily due to their small feature size for extraction and variable lighting conditions. It is crucial to effectively capture and model features for drone detection. To accurately detect drones, we propose f
Externí odkaz:
https://doaj.org/article/de9a4c12eed148cbb644b1949bfa1e32
Publikováno v:
Complex & Intelligent Systems, Vol 9, Iss 1, Pp 317-328 (2022)
Abstract Multimodal medical image is an effective method to solve a series of clinical problems, such as clinical diagnosis and postoperative treatment. In this study, a medical image fusion method based on convolutional sparse representation (CSR) a
Externí odkaz:
https://doaj.org/article/cac38ec81faf46df8c9516a47489efda
Publikováno v:
iScience, Vol 25, Iss 11, Pp 105299- (2022)
Summary: Predicting associations between microRNAs (miRNAs) and diseases from the viewpoint of function modules has become increasingly popular. However, existing methods obtained the relations between diseases and miRNAs only through the constructio
Externí odkaz:
https://doaj.org/article/883b95b3f02e4281b538ea4643e87ad3
Publikováno v:
Tongxin xuebao, Vol 42, Pp 54-64 (2021)
By effectively capturing the spatio-temporal characteristics of urban private car travel, a multi-source heterogeneous data fusion model for private car volume prediction was proposed.Firstly, private car trajectory and area-of-interest data were int
Externí odkaz:
https://doaj.org/article/4070a88ad81a4b32be2f83d187e7ab56
Publikováno v:
IEEE Access, Vol 9, Pp 2665-2679 (2021)
Building the security mechanism for Controller Area Network (CAN) to defend against attack has drawn substantial attention recently. Fingerprinting ECUs to provide the ability of authentication based on the physical characteristics can protect the CA
Externí odkaz:
https://doaj.org/article/92ca00bed9ee404993184d2ca7150e91
Publikováno v:
Tongxin xuebao, Vol 41, Pp 161-174 (2020)
Cyber attacks on vehicles not only cause privacy leaks and economic losses but also endanger human life and even rise to national public safety issues.Therefore,the research on the cybersecurity of intelligent and connected vehicle (ICV) has become a
Externí odkaz:
https://doaj.org/article/9f20d6398a5143679c5a8114f747bdfd
Publikováno v:
IEEE Access, Vol 8, Pp 89084-89092 (2020)
Differential power analysis attacks are the most commonly used means to break cryptographic devices within the side-channel attack technology. Since there is a lot of noise in the energy trace of cryptographic devices, a large number of energy traces
Externí odkaz:
https://doaj.org/article/7cf79a0474b445c5b4b3ac22d2bd722e
Publikováno v:
IEEE Access, Vol 8, Pp 89300-89317 (2020)
Depth estimation has received considerable attention and is often applied to visual simultaneous localization and mapping (SLAM) for scene reconstruction. At least to our knowledge, sufficiently reliable depth always fails to be provided for monocula
Externí odkaz:
https://doaj.org/article/092e86a694be4cf58fd61a3d11cd4983
Publikováno v:
IEEE Access, Vol 8, Pp 174516-174529 (2020)
Boolean expression testing requires certain types of tests for each Boolean expression in program specification or implementation. Fault-based testing essentially uses a subset of the exhaustive test set to detect certain special types of faults. A f
Externí odkaz:
https://doaj.org/article/969de8d06e54436cb491a3b9010f2620
Publikováno v:
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.1, January 2012
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failur
Externí odkaz:
http://arxiv.org/abs/1202.1733