Results 41 to 50 of about 145,037 (166)

Incomplete Multi-View Clustering Based on Dynamic Dimensionality Reduction Weighted Graph Learning

open access: yesIEEE Access
Aiming at the existing incomplete multi-view clustering methods that usually ignore the noise and redundancy of the original data, hide the valuable information in the missing views, and the different importance of each view, this paper proposes the ...
Yaosong Yu, Dongpu Sun
doaj   +1 more source

Exponential Multi-Modal Discriminant Feature Fusion for Small Sample Size

open access: yesIEEE Access, 2022
Multi-modal Canonical Correlation Analysis (MCCA) is an important information fusion method, and some discriminant variations of MCCA have been proposed.
Yanmin Zhu, Tianhao Peng, Shuzhi Su
doaj   +1 more source

Machine learning algorithm for intelligent detection of WebShell

open access: yes网络与信息安全学报, 2017
WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To ...
Hua DAI,Jing LI,Xin-dai LU,Xin SUN
doaj   +1 more source

Double Structured Nuclear Norm-Based Matrix Decomposition for Saliency Detection

open access: yesIEEE Access, 2020
Saliency detection aims at identifying the most important and informative area in a scene. Recently low rank matrix recovery (LR) theory becomes an effective tool for saliency detection.
Junxia Li, Ziyang Wang, Zefeng Pan
doaj   +1 more source

Low-Rank Matrix Recovery Approach for Clutter Rejection in Real-Time IR-UWB Radar-Based Moving Target Detection

open access: yesSensors, 2016
The detection of a moving target using an IR-UWB Radar involves the core task of separating the waves reflected by the static background and by the moving target.
Donatien Sabushimike   +5 more
doaj   +1 more source

WSN key recovery attack based on symmetric matrix decomposition

open access: yesTongxin xuebao, 2018
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI   +5 more
doaj  

A Color Image Encryption Model Based on a System of Quaternion Matrix Equations

open access: yesMathematics
In the era of big data and multimedia communication, securing color images against unauthorized access and attacks is a pressing challenge. While quaternion-based models provide a unified representation for color images, most existing encryption schemes ...
Chen-Yang Qi   +3 more
doaj   +1 more source

Hyperspectral Target Detection With Target Prior Augmentation and Background Suppression-Based Multidetector Fusion

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Hyperspectral target detection (HTD) methods aim to exploit the abundant hyperspectral information to distinguish the key target pixels from multifarious background pixels.
Tan Guo   +5 more
doaj   +1 more source

An Improved Coordinated Multi-point Multi-user Precoding Algorithm

open access: yesJournal of Harbin University of Science and Technology, 2018
In Long Term Evolution-Advanced ( LTE-A) system,existing coordinated multi-point ( CoMP) multiuser precoding algorithm can not suppress multi-user,intra-user and noise interference at the same time and its computational complexity is high.
SUN Zeng-you, LIU Ling-yu
doaj   +1 more source

Pauli decomposition via the fast Walsh-Hadamard transform

open access: yesNew Journal of Physics
The decomposition of a square matrix into a sum of Pauli strings is a classical pre-processing step required to realize many quantum algorithms. Such a decomposition requires significant computational resources for large matrices. We present an exact and
Timothy N Georges   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy