限定检索结果

检索条件"机构=School of Computer Science & Information Technology"
56 条 记 录,以下是1-10 订阅
视图:
排序:
DWT BASED HMM FOR FACE RECOGNITION
收藏 引用
《Journal of Electronics(China)》2007年 第6期24卷 835-837页
作者:Shen Linlin Ji Zhen Bai Li Xu ChenTI DSPs Lab Faculty of Information Engineering Shenzhen University Shenzhen 518050 China School of Computer Science & Information Technology University of Nottingham NG8 1BB UK Institute of Intelligent Computing Science Shenzhen University Shenzhen 518060 China 
A novel Discrete Wavelet Transform (DWT) based Hidden Markov Module (HMM) for face recognition is presented in this letter. To improve the accuracy of HMM based face recognition algorithm, DWT is used to replace Discr...
来源:详细信息评论
Innovative Batik Design with an Interactive Evolutionary Art System
收藏 引用
《Journal of computer science & technology2009年 第6期24卷 1035-1047页
作者:李扬 胡长军 姚新School of Information Engineering University of Science and Technology Beijing The Centre of Excellence for Research in Computational Intelligence and Applications (CERCIA)School of Computer Science University of Birmingham 
This paper describes an evolutionary art system, which explores the potential ability of evolutionary computation in Batik design. We investigate the use of Interactive Evolutionary Algorithm (IEA) in our system, wi...
来源:详细信息评论
Security Analysis and Enhanced Design of a Dynamic Block Cipher
收藏 引用
《China Communications》2016年 第1期13卷 150-160页
作者:ZHAO Guosheng WANG JianCollege of Computer Science and Information EngineeringHarbin Normal University School of Computer Science and TechnologyHarbin University of Science and Technology 
There are a lot of security issues in block cipher *** analysis and enhanced design of a dynamic block cipher was ***,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the...
来源:详细信息评论
Efficient Reconstruction of Spatial Features for Remote Sensing Image-Text Retrieval
收藏 引用
《Transactions of Nanjing University of Aeronautics and Astronautics》2025年 第1期42卷 101-111页
作者:ZHANG Weihang CHEN Jialiang ZHANG Wenkai LI Xinming GAO Xin SUN XianAerospace Information Research InstituteChinese Academy of SciencesBeijing 100190P.R.China Key Laboratory of Target Cognition and Application Technology(TCAT)Chinese Academy of SciencesBeijing 100190P.R.China School of ElectronicElectrical and Communication EngineeringUniversity of Chinese Academy of SciencesBeijing 100190P.R.China School of Computer Science and Artificial IntelligenceAerospace Information Technology UniversityJinan 250299P.R.China 
Remote sensing cross-modal image-text retrieval(RSCIR)can flexibly and subjectively retrieve remote sensing images utilizing query text,which has received more researchers’attention ***,with the increasing volume of ...
来源:详细信息评论
Design of a Discrete-time Output-feedback Based Repetitive-control System
收藏 引用
《International Journal of Automation and computing》2013年 第4期10卷 343-349页
作者:Lan Zhou Jin-Hua She Min WuSchool of Information and Electrical Engineering Hunan University of Science and Technology School of Computer Science Tokyo University of Technology School of Information Science and Engineering Central South University 
This paper deals with the problem of designing a robust discrete output-feedback based repetitive-control system for a class of linear plants with periodic uncertainties. The periodicity of the repetitive-control syst...
来源:详细信息评论
Role based access control design using Triadic concept analysis
收藏 引用
《Journal of Central South University》2016年 第12期23卷 3183-3191页
作者:Ch.Aswani Kumar S.Chandra Mouliswaran LI Jin-hai C.ChandrasekarSchool of Information Technology & EngineeringVIT University Faculty of ScienceKunming University of Science and Technology Department of Computer SciencePeriyar University 
Role based access control is one of the widely used access control *** are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Onto...
来源:详细信息评论
Cross-Layer Design of Energy-Saving AODV Routing Protocol
收藏 引用
《Transactions of Tianjin University》2009年 第5期15卷 343-349页
作者:李冰 金志刚 舒炎泰School of Computer Science and TechnologyTianjin University School of Electronics and Information EngineeringTianjin University 
Since most ad hoc mobile devices today operate on batteries,the power consumption becomes an important *** paper proposes a cross-layer design of energy-aware ad hoc on-demand distance vector(CEAODV) routing protocol ...
来源:详细信息评论
An efficient GPU-based parallel tabu search algorithm for hardware/software co-design
收藏 引用
《Frontiers of computer science2020年 第5期14卷 135-152页
作者:Neng Hou Fazhi He Yi Zhou Yilin ChenSchool of Computer ScienceWuhan UniversityWuhan430072China School of Computer ScienceYangtze UniversityJingzhou434023China School of Information Science and EngineeringWuhan University of Science and TechnologyWuhan430081China 
Hardware/software partitioning is an essential step in hardware/software *** large size problems,it is difficult to consider both solution quality and *** paper presents an efficient GPU-based parallel tabu search alg...
来源:详细信息评论
Training SVMs on a bound vectors set based on Fisher projection
收藏 引用
《Frontiers of computer science2014年 第5期8卷 793-806页
作者:Xu YU Jing YANG Zhiqiang XIESchool of Information Science and Technology Qingdao University of Science and Technology Qingdao 266061 China College of Computer Science and Technology Harbin Engineering University Harbin 150001 China College of Computer Science and Technology Harbin University of Science and Technology Harbin 150080 China 
Standard support vector machines (SVMs) train- ing algorithms have O(l3) computational and O(l2) space complexities, where l is the training set size. It is thus com- /putationally infeasible on very large data ...
来源:详细信息评论
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition
收藏 引用
《Frontiers of computer science2011年 第4期5卷 419-428页
作者:Pu HUANG Zhenmin TANG Caikou CHEN Xintian CHENGSchool of Computer Science and Technology Nanjing University of Science and Technology Nanjing 210094 China College of Information Engineering Yangzhou University Yangzhou 225009 China 
Marginal Fisher analysis (MFA) is a repre- sentative margin-based learning algorithm for face recognition. A major problem in MFA is how to select appropriate parameters, k1 and k2, to construct the respective intri...
来源:详细信息评论
聚类工具 回到顶部