Results 41 to 50 of about 145,037 (166)
Incomplete Multi-View Clustering Based on Dynamic Dimensionality Reduction Weighted Graph Learning
Aiming at the existing incomplete multi-view clustering methods that usually ignore the noise and redundancy of the original data, hide the valuable information in the missing views, and the different importance of each view, this paper proposes the ...
Yaosong Yu, Dongpu Sun
doaj +1 more source
Exponential Multi-Modal Discriminant Feature Fusion for Small Sample Size
Multi-modal Canonical Correlation Analysis (MCCA) is an important information fusion method, and some discriminant variations of MCCA have been proposed.
Yanmin Zhu, Tianhao Peng, Shuzhi Su
doaj +1 more source
Machine learning algorithm for intelligent detection of WebShell
WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To ...
Hua DAI,Jing LI,Xin-dai LU,Xin SUN
doaj +1 more source
Double Structured Nuclear Norm-Based Matrix Decomposition for Saliency Detection
Saliency detection aims at identifying the most important and informative area in a scene. Recently low rank matrix recovery (LR) theory becomes an effective tool for saliency detection.
Junxia Li, Ziyang Wang, Zefeng Pan
doaj +1 more source
The detection of a moving target using an IR-UWB Radar involves the core task of separating the waves reflected by the static background and by the moving target.
Donatien Sabushimike +5 more
doaj +1 more source
WSN key recovery attack based on symmetric matrix decomposition
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI +5 more
doaj
A Color Image Encryption Model Based on a System of Quaternion Matrix Equations
In the era of big data and multimedia communication, securing color images against unauthorized access and attacks is a pressing challenge. While quaternion-based models provide a unified representation for color images, most existing encryption schemes ...
Chen-Yang Qi +3 more
doaj +1 more source
Hyperspectral target detection (HTD) methods aim to exploit the abundant hyperspectral information to distinguish the key target pixels from multifarious background pixels.
Tan Guo +5 more
doaj +1 more source
An Improved Coordinated Multi-point Multi-user Precoding Algorithm
In Long Term Evolution-Advanced ( LTE-A) system,existing coordinated multi-point ( CoMP) multiuser precoding algorithm can not suppress multi-user,intra-user and noise interference at the same time and its computational complexity is high.
SUN Zeng-you, LIU Ling-yu
doaj +1 more source
Pauli decomposition via the fast Walsh-Hadamard transform
The decomposition of a square matrix into a sum of Pauli strings is a classical pre-processing step required to realize many quantum algorithms. Such a decomposition requires significant computational resources for large matrices. We present an exact and
Timothy N Georges +3 more
doaj +1 more source

