Ear recognition is a new kind of biometric identification technology now.Feature extraction is a key step in pattern recognition technology,which determines the accuracy of classification results.The method of single ...Ear recognition is a new kind of biometric identification technology now.Feature extraction is a key step in pattern recognition technology,which determines the accuracy of classification results.The method of single feature extraction can achieve high recognition rate under certain conditions,but the use of double feature extraction can overcome the limitation of single feature extraction.In order to improve the accuracy of classification results,this paper proposes a new method,that is,the method of complementary double feature extraction based on Principal Component Analysis(PCA)and Fisherface,and we apply it to human ear image recognition.The experiment was carried out on the ear image library provided by the University of Science and Technology Beijing.The results show that the ear recognition rate of the proposed method is significantly higher than the single feature extraction using PCA,Fisherface,or Independent component analysis(ICA)alone.展开更多
Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculatin...Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.展开更多
基金National Key R&D Program of China(No:2019YFD0901605).
文摘Ear recognition is a new kind of biometric identification technology now.Feature extraction is a key step in pattern recognition technology,which determines the accuracy of classification results.The method of single feature extraction can achieve high recognition rate under certain conditions,but the use of double feature extraction can overcome the limitation of single feature extraction.In order to improve the accuracy of classification results,this paper proposes a new method,that is,the method of complementary double feature extraction based on Principal Component Analysis(PCA)and Fisherface,and we apply it to human ear image recognition.The experiment was carried out on the ear image library provided by the University of Science and Technology Beijing.The results show that the ear recognition rate of the proposed method is significantly higher than the single feature extraction using PCA,Fisherface,or Independent component analysis(ICA)alone.
基金This research is supported by the National Natural Science Foundations of China under Grants Nos.61862040,61762060 and 61762059The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.
文摘Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.