Robustness analysis of random hyper-networks based on the internal structure of hyper-edges
Random hyper-network is an important hyper-network structure. Studying the structure and properties of random hyper-networks, which helps researchers to understand the influence of the hyper-network structure on its properties. Currently, studies related
Bin Zhou +3 more
doaj +1 more source
Improvement of a depth camera installation for fall risk estimation
We propose a monitoring system for accidental falling of patients using a point cloud dataset (PCD) of the depth camera-captured images. The conventional system requires the PCD to comprise images showing the bed top view.
Keisuke Isomoto, Daisuke Kushida
doaj +1 more source
RMPD: Method for Enhancing the Robustness of Recommendations With Attack Environments
Personalized item recommendation has become a hot topic research among academic and industry community. But lots of purposeful fraudsters maybe perform different attacks on the recommender system to insert fake ratings, which could reduce the ...
Qi Ding +4 more
doaj +1 more source
Aging concrete structures: a review of mechanics and concepts
The safe and cost-efficient management of our built infrastructure is a challenging task considering the expected service life of at least 50 years. In spite of time-dependent changes in material properties, deterioration processes and changing demand by
Wan-Wendner Roman
doaj +1 more source
Digital video watermarking algorithm based on asymmetric causal spatio-temporal filter
Digital video is vulnerable to accidental or malicious destruction in storage, transmission, processing, which damages the legitimate rights and interests of the product owners.
Yanliang Ge +5 more
doaj +1 more source
Computational Efficiency of a Modular Reservoir Network for Image Recognition
Liquid state machine (LSM) is a type of recurrent spiking network with a strong relationship to neurophysiology and has achieved great success in time series processing.
Yifan Dai +3 more
doaj +1 more source
Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks
This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a new mechanism termed as “trusted
Yiming Wu, Xiongxiong He
doaj +1 more source
Stability of Liver Radiomics across Different 3D ROI Sizes—An MRI In Vivo Study
We aimed to evaluate the stability of radiomic features in the liver of healthy individuals across different three-dimensional regions of interest (3D ROI) sizes in T1-weighted (T1w) and T2-weighted (T2w) images from different MR scanners.
Laura J. Jensen +5 more
doaj +1 more source
A Novel Robust Classification Method for Ground-Based Clouds
Though the traditional convolutional neural network has a high recognition rate in cloud classification, it has poor robustness in cloud classification with occlusion.
Aihua Yu +6 more
doaj +1 more source
Adaptive Robust Vehicle Motion Control for Future Over-Actuated Vehicles
Many challenges still need to be overcome in the context of autonomous vehicles. These vehicles would be over-actuated and are expected to perform coupled maneuvers.
Moad Kissai +4 more
doaj +1 more source

