期刊文献+
共找到478篇文章
< 1 2 24 >
每页显示 20 50 100
The Pre-processing Parallel Algorithm of A Sparse Linear Equation Group
1
作者 Cao Ying 《International English Education Research》 2015年第1期96-98,共3页
The solution of linear equation group can be applied to the oil exploration, the structure vibration analysis, the computational fluid dynamics, and other fields. When we make the in-depth analysis of some large or ve... The solution of linear equation group can be applied to the oil exploration, the structure vibration analysis, the computational fluid dynamics, and other fields. When we make the in-depth analysis of some large or very large complicated structures, we must use the parallel algorithm with the aid of high-performance computers to solve complex problems. This paper introduces the implementation process having the parallel with sparse linear equations from the perspective of sparse linear equation group. 展开更多
关键词 Sparse Linear Equations pre-processing Parallel algorithm
下载PDF
Fingerprint Directional Image Partitioning Based on Genetic Algorithm
2
作者 张朝鸣 刘云超 《Advances in Manufacturing》 SCIE CAS 2000年第S1期98-103,共6页
In this work, we introduce a method of fingerprint directional image partitioning based on GA. According to the fingerprint topology, A set of dynamic partition masks and a cost estimating function are designed to gui... In this work, we introduce a method of fingerprint directional image partitioning based on GA. According to the fingerprint topology, A set of dynamic partition masks and a cost estimating function are designed to guide the partitioning procedure. Finding best fitted mask application is converted to an functional optimizing problem, and we give out a GA solution to the problem. At last, we discuss the application of the proposed method in Fingerprint Classification. 展开更多
关键词 fingerprint classification directional image partitioning dynamic mask cost estimating function genetic algorithm (GA)
下载PDF
Product quality prediction based on RBF optimized by firefly algorithm 被引量:2
3
作者 HAN Huihui WANG Jian +1 位作者 CHEN Sen YAN Manting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期105-117,共13页
With the development of information technology,a large number of product quality data in the entire manufacturing process is accumulated,but it is not explored and used effectively.The traditional product quality pred... With the development of information technology,a large number of product quality data in the entire manufacturing process is accumulated,but it is not explored and used effectively.The traditional product quality prediction models have many disadvantages,such as high complexity and low accuracy.To overcome the above problems,we propose an optimized data equalization method to pre-process dataset and design a simple but effective product quality prediction model:radial basis function model optimized by the firefly algorithm with Levy flight mechanism(RBFFALM).First,the new data equalization method is introduced to pre-process the dataset,which reduces the dimension of the data,removes redundant features,and improves the data distribution.Then the RBFFALFM is used to predict product quality.Comprehensive expe riments conducted on real-world product quality datasets validate that the new model RBFFALFM combining with the new data pre-processing method outperforms other previous me thods on predicting product quality. 展开更多
关键词 product quality prediction data pre-processing radial basis function swarm intelligence optimization algorithm
下载PDF
Ligand Based Virtual Screening of Molecular Compounds in Drug Discovery Using GCAN Fingerprint and Ensemble Machine Learning Algorithm
4
作者 R.Ani O.S.Deepa B.R.Manju 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3033-3048,共16页
The drug development process takes a long time since it requires sorting through a large number of inactive compounds from a large collection of compounds chosen for study and choosing just the most pertinent compound... The drug development process takes a long time since it requires sorting through a large number of inactive compounds from a large collection of compounds chosen for study and choosing just the most pertinent compounds that can bind to a disease protein.The use of virtual screening in pharmaceutical research is growing in popularity.During the early phases of medication research and development,it is crucial.Chemical compound searches are nowmore narrowly targeted.Because the databases containmore andmore ligands,thismethod needs to be quick and exact.Neural network fingerprints were created more effectively than the well-known Extended Connectivity Fingerprint(ECFP).Only the largest sub-graph is taken into consideration to learn the representation,despite the fact that the conventional graph network generates a better-encoded fingerprint.When using the average or maximum pooling layer,it also contains unrelated data.This article suggested the Graph Convolutional Attention Network(GCAN),a graph neural network with an attention mechanism,to address these problems.Additionally,it makes the nodes or sub-graphs that are used to create the molecular fingerprint more significant.The generated fingerprint is used to classify drugs using ensemble learning.As base classifiers,ensemble stacking is applied to Support Vector Machines(SVM),Random Forest,Nave Bayes,Decision Trees,AdaBoost,and Gradient Boosting.When compared to existing models,the proposed GCAN fingerprint with an ensemble model achieves relatively high accuracy,sensitivity,specificity,and area under the curve.Additionally,it is revealed that our ensemble learning with generated molecular fingerprint yields 91%accuracy,outperforming earlier approaches. 展开更多
关键词 Drug likeness prediction machine learning ligand-based virtual screening molecular fingerprints ensemble algorithms
下载PDF
AWeb Application Fingerprint Recognition Method Based on Machine Learning
5
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 Web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
下载PDF
Pre-process algorithm for satellite laser ranging data based on curve recognition from points cloud
6
作者 Liu Yanyu Zhao Dongming Wu Shan 《Geodesy and Geodynamics》 2012年第2期53-59,共7页
The satellite laser ranging (SLR) data quality from the COMPASS was analyzed, and the difference between curve recognition in computer vision and pre-process of SLR data finally proposed a new algorithm for SLR was ... The satellite laser ranging (SLR) data quality from the COMPASS was analyzed, and the difference between curve recognition in computer vision and pre-process of SLR data finally proposed a new algorithm for SLR was discussed data based on curve recognition from points cloud is proposed. The results obtained by the new algorithm are 85 % (or even higher) consistent with that of the screen displaying method, furthermore, the new method can process SLR data automatically, which makes it possible to be used in the development of the COMPASS navigation system. 展开更多
关键词 satellite laser ranging (SLR) curve recognition points cloud pre-process algorithm COM- PASS screen displaying
下载PDF
零信任环境下的多层次身份认证数据流安全检测算法
7
作者 顾健华 冯建华 +1 位作者 高泽芳 文成江 《现代电子技术》 北大核心 2025年第1期85-89,共5页
身份认证数据流中的敏感信息可能在传输过程中被攻击者截获,并用于恶意目的,导致隐私泄露、身份盗用等风险,为确保网络安全性,提高主体身份认证安全性,提出零信任环境下的多层次身份认证数据流安全检测算法。采用改进的文档指纹检测算... 身份认证数据流中的敏感信息可能在传输过程中被攻击者截获,并用于恶意目的,导致隐私泄露、身份盗用等风险,为确保网络安全性,提高主体身份认证安全性,提出零信任环境下的多层次身份认证数据流安全检测算法。采用改进的文档指纹检测算法实现多层次身份认证过程中主体和客体交互数据流安全监测。通过Rabin-Karp算法实现身份认证数据文档的分块,采用Winnow算法划分身份认证数据分块文档边界后,得到身份认证数据文档指纹,将其与指纹库中的指纹进行匹配对比,识别出多层次身份认证数据流中的异常数据,实现多层次身份认证数据流安全检测。实验结果表明,该算法具有较好的身份认证数据流安全检测能力,有效地降低了网络威胁频率,提升了网络安全性。 展开更多
关键词 零信任 多层次身份认证 数据流安全检测 文档指纹检测算法 Rabin-Karp算法 WINNOW算法
下载PDF
基于5G UTDOA与MR指纹技术的室内定位融合算法研究
8
作者 金武 陈亦繁 +1 位作者 徐宗 连祝成 《邮电设计技术》 2025年第1期47-50,共4页
基于5G UTDOA与MR指纹技术的室内定位融合策略旨在提升定位系统的精确性和可靠性。通过整合这2种技术,开发了一个减少环境误差和增强稳定性的高精度定位算法。仿真结果表明,融合算法不仅有效提高了定位准确率,还展示了其结合现代通信技... 基于5G UTDOA与MR指纹技术的室内定位融合策略旨在提升定位系统的精确性和可靠性。通过整合这2种技术,开发了一个减少环境误差和增强稳定性的高精度定位算法。仿真结果表明,融合算法不仅有效提高了定位准确率,还展示了其结合现代通信技术在室内定位领域的应用潜力,为定位技术的进一步发展开辟了新的路径。 展开更多
关键词 室内定位 5G UTDOA MR指纹技术 融合算法
下载PDF
Tracking Your Browser with High-Performance Browser Fingerprint Recognition Model 被引量:4
9
作者 Wei Jiang Xiaoxi Wang +2 位作者 Xinfang Song Qixu Liu Xiaofeng Liu 《China Communications》 SCIE CSCD 2020年第3期168-175,共8页
As the cyber security has attracted great attention in recent years,and with all kinds of tools’(such as Network Agent,VPN and so on)help,traditional methods of tracking users like log analysis and cookie have been n... As the cyber security has attracted great attention in recent years,and with all kinds of tools’(such as Network Agent,VPN and so on)help,traditional methods of tracking users like log analysis and cookie have been not that effective.Especially for some privacy sensitive users who changed their browser configuration frequently to hide themselves.The Browser Fingerprinting technology proposed by Electronic Frontier Foundation(EFF)gives a new approach of tracking users,and then our team designed an enhanced fingerprint dealing solution based on browser fingerprinting technology.Our enhanced solution plays well in recognizing the similar fingerprints,but it is not that efficient.Nowadays we improve the algorithm and propose a high-performance,efficient Browser Fingerprint Recognition Model.Our new model reforms the fingerprint items set by EFF and propose a Fingerprint Tracking Algorithm(FTA)to deal with collected data.It can associate users with some browser configuration changes in different periods of time quickly and precisely.Through testing with the experimental website built on the public network,we prove the high-performance and efficiency of our algorithm with a 20%time-consuming decrease than ever. 展开更多
关键词 BROWSER fingerprint AHP fingerprint TRACKING algorithm
下载PDF
Fusing Fixed and Hint Landmarks on Crowd Paths for Automatically Constructing Wi-Fi Fingerprint Database 被引量:2
10
作者 HUANG Zhengyong XIA Jun +3 位作者 YU Hui GUAN Yunfeng GAN Xiaoying LIU Jing 《China Communications》 SCIE CSCD 2015年第1期11-24,共14页
In typical Wi-Fi based indoor positioning systems employing fingerprint model,plentiful fingerprints need to be trained by trained experts or technician,which extends labor costs and restricts their promotion.In this ... In typical Wi-Fi based indoor positioning systems employing fingerprint model,plentiful fingerprints need to be trained by trained experts or technician,which extends labor costs and restricts their promotion.In this paper,a novel approach based on crowd paths to solve this problem is presented,which collects and constructs automatically fingerprints database for anonymous buildings through common crowd customers.However,the accuracy degradation problem may be introduced as crowd customers are not professional trained and equipped.Therefore,we define two concepts:fixed landmark and hint landmark,to rectify the fingerprint database in the practical system,in which common corridor crossing points serve as fixed landmark and cross point among different crowd paths serve as hint landmark.Machinelearning techniques are utilized for short range approximation around fixed landmarks and fuzzy logic decision technology is applied for searching hint landmarks in crowd traces space.Besides,the particle filter algorithm is also introduced to smooth the sample points in crowd paths.We implemented the approach on off-the-shelf smartphones and evaluate the performance.Experimental results indicate that the approach can availably construct WiFi fingerprint database without reduce the localization accuracy. 展开更多
关键词 indoor localization fingerprint database construction fixed landmarks hint landmarks particle filter algorithm
下载PDF
Fingerprint Recognition on Various Authentication Sensors 被引量:1
11
作者 A.Tirupathi Rao N.Pattabhi Ramaiah C.Krishna Mohan 《Journal of Electronic Science and Technology》 CAS 2014年第1期134-138,共5页
Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minuti... Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm. 展开更多
关键词 -Authentication sensors binarization Bozorth algorithm fingerprintS NIST.
下载PDF
Optimization of MAC algorithm based on IEEE 802.15.4 in indoor positioning system 被引量:2
12
作者 Sun Guanyu Qin Danyang Lan Tingting 《High Technology Letters》 EI CAS 2021年第1期86-94,共9页
The mobility of the targets asks for high requirements of the locating speed in indoor positioning systems.The standard medium access control(MAC)algorithm will often cause lots of packet conflicts and high transmissi... The mobility of the targets asks for high requirements of the locating speed in indoor positioning systems.The standard medium access control(MAC)algorithm will often cause lots of packet conflicts and high transmission delay if multiple users communicate with one beacon at the same time,which will severely limit the speed of the system.Therefore,an optimized MAC algorithm is proposed based on channel reservation to enable users to reserve beacons.A frame threshold is set to ensure the users with shorter data frames do not depend on the reservation mechanism,and multiple users can achieve packets switching with relative beacon in a fixed sequence by using frequency division multiplexing technology.The simulation results show that the optimized MAC algorithm proposed in this paper can improve the positioning speed significantly while maintaining the positioning accuracy.Moreover,the positioning accuracy can be increased to a certain extent if more channel resources can be obtained,so as to provide effective technical support for the location and tracking applications of indoor moving targets. 展开更多
关键词 medium access control(MAC)algorithm indoor positioning MULTI-CHANNEL fingerprint identification IEEE 802.15.4
下载PDF
Design and Implementation of Fingerprint Identification System Based on KNN Neural Network 被引量:1
13
作者 Israa Ghazi Dakhil Ali Abdulhafidh Ibrahim 《Journal of Computer and Communications》 2018年第3期1-18,共18页
Fingerprint identification and recognition are considered popular technique in many security and law enforcement applications. The aim of this paper is to present a proposed authentication system based on fingerprint ... Fingerprint identification and recognition are considered popular technique in many security and law enforcement applications. The aim of this paper is to present a proposed authentication system based on fingerprint as biometric type, which is capable of recognizing persons with high level of confidence and minimum error rate. The designed system is implemented using Matlab 2015b and tested on a set of fingerprint images gathered from 90 different persons with 8 samples for each using Futronic’s FS80 USB2.0 Fingerprint Scanner and the ftrScanApiEx.exe program. An efficient image enhancement algorithm is used to improve the clarity (contrast) of the ridge structures in a fingerprint. After that core point and candidate core points are extracted for each Fingerprint image and feature vector have been extracted for each point using filterbank_based algorithm. Also, for the matching the KNN neural network was used. In addition, the matching results were calculated and compared to other papers using some performance evaluation factors. A threshold has been proposed and used to provide the rejection for the fingerprint images that does not belong to the database and the experimental results show that the KNN technique have a recognition rate equal to 93.9683% in a threshold equal to 70%. 展开更多
关键词 fingerprint CORE Point and CANDIDATE CORE POINTS Filterbank_Based algorithm Weightless Neural Network KNN
下载PDF
基于Fingerprint定位算法的设计与实现 被引量:1
14
作者 马晓 《电气自动化》 2013年第5期16-17,35,共3页
首先将RSSI、TOA与TDOA、超声波与无线结合定位算法进行对比,指出了各种算法的优缺点。提出了一种基于RSSI Fingerprint定位算法,给出了该方法的思想,指出了其适用范围,最后通过软件测试了该算法的可行性。
关键词 RSSI fingerprint 定位算法 TOA与TDOA 超声波与无线结合
下载PDF
A Robust Wi-Fi Fingerprinting Indoor Localization Coping with Access Point Movement
15
作者 Yuan Liang Xingqun Zhan +1 位作者 Wenhan Yuan Shuai Jing 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第4期31-37,共7页
A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental e... A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental environmental changes,such as AP movement. In order to address this problem,a robust fingerprinting indoor localization method is initiated. In the offline phase,three attributes of Received Signal Strength Indication( RSSI) —average,standard deviation and AP's response rate—are computed to prepare for the subsequent computation. In this way,the underlying location-relevant information can be captured comprehensively. Then in the online phase, a three-step voting scheme-based decision mechanism is demonstrated, detecting and eliminating the part of AP where the signals measured are severely distorted by AP 's movement. In the following localization step,in order to achieve accuracy and efficiency simultaneously,a novel fingerprinting localization algorithm is applied. Bhattacharyya distance is utilized to measure the RSSI distribution distance,thus realizing the optimization of MAximum Overlapping algorithm( MAO). Finally,experimental results are displayed,which demonstrate the effectiveness of our proposed methods in eliminating outliers and attaining relatively higher localization accuracy. 展开更多
关键词 WI-FI fingerprinting INDOOR localization RECEIVED Signal Strength INDICATION (RSSI) Access Point MOVEMENT erroneous AP detecting algorithm
下载PDF
Coordinate correction algorithm for WLAN indoor positioning
16
作者 孙永亮 徐玉滨 +1 位作者 马琳 韩军义 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期67-70,共4页
In the fingerprint matching-based wireless local area network(WLAN) indoor positioning system,Kalman filter(KF) is usually applied after fingerprint matching algorithms to make positioning results more accurate and co... In the fingerprint matching-based wireless local area network(WLAN) indoor positioning system,Kalman filter(KF) is usually applied after fingerprint matching algorithms to make positioning results more accurate and consecutive.But this method,like most methods in WLAN indoor positioning field,fails to consider and make use of users' moving speed information.In order to make the positioning results more accurate through using the users' moving speed information,a coordinate correction algorithm(CCA) is proposed in this paper.It predicts a reasonable range for positioning coordinates by using the moving speed information.If the real positioning coordinates are not in the predicted range,it means that the positioning coordinates are not reasonable to a moving user in indoor environment,so the proposed CCA is used to correct this kind of positioning coordinates.The simulation results prove that the positioning results by the CCA are more accurate than those calculated by the KF and the CCA is effective to improve the positioning performance. 展开更多
关键词 indoor positioning fingerprint matching Kalman filter coordinate correction algorithm
下载PDF
Accurate Fingerprint Enhancement and Identification Using Minutiae Extraction
17
作者 Kumar Attangudi Perichiappan Perichappan Sreenivas Sasubilli 《Journal of Computer and Communications》 2017年第14期28-38,共11页
Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger... Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger impression picture isn’t that simple. So we must process unique finger impression picture before coordinating. A crucial advance in measurements of fingerprint minutiae is to obtain minutiae from the finger impression pictures dependably. However, fingerprint images are occasionally of perfect quality. They might be debased and defiled because of varieties in skin and impression conditions. Along these lines, image enhancement strategies utilize other details extraction to acquire a more reliable estimation of minutiae areas. The primary objective of this research work is to introduce a superior and improved unique fingerprint image. We studied the elements identifying with getting elite component focuses detection algorithm, for example, picture quality, segmentation, picture upgrade and highlight recognition. Usually utilized features for enhancing unique finger impression picture quality are Fourier spectrum energy, Sobel filter energy, and local orientation. Precise segmentation of unique finger impression edges from a broad foundation is vital. For productive improvement and feature extraction algorithms, we zero the commotion in segmented features. As a pre-processing method, we need to perform comprising of field introduction, ridge frequency estimation, Sobel filtering, division. Then connect the resulting picture to a thinning algorithm and consequent minutiae extraction. After resultant extraction of these minutiae focuses, we will utilize the picture with focuses for coordinating or finding the offenders and also for other security issues. The procedure of image pre-processing and minutiae extraction is explored. The simulations are performed in the MATLAB environment to assess the execution of the implemented algorithm. 展开更多
关键词 AFAS (Automatic fingerprint AUTHENTICATION System) fingerprint Image pre-processing MINUTIAE Extraction fingerprint RIDGE THINNING MINUTIAE
下载PDF
Emotion Deduction from Social Media Text Data Using Machine Learning Algorithm
18
作者 Thambusamy Velmurugan Baskaran Jayapradha 《Journal of Computer and Communications》 2023年第11期183-196,共14页
Emotion represents the feeling of an individual in a given situation. There are various ways to express the emotions of an individual. It can be categorized into verbal expressions, written expressions, facial express... Emotion represents the feeling of an individual in a given situation. There are various ways to express the emotions of an individual. It can be categorized into verbal expressions, written expressions, facial expressions and gestures. Among these various ways of expressing the emotion, the written method is a challenging task to extract the emotions, as the data is in the form of textual dat. Finding the different kinds of emotions is also a tedious task as it requires a lot of pre preparations of the textual data taken for the research. This research work is carried out to analyse and extract the emotions hidden in text data. The text data taken for the analysis is from the social media dataset. Using the raw text data directly from the social media will not serve the purpose. Therefore, the text data has to be pre-processed and then utilised for further processing. Pre-processing makes the text data more efficient and would infer valuable insights of the emotions hidden in it. The preprocessing steps also help to manage the text data for identifying the emotions conveyed in the text. This work proposes to deduct the emotions taken from the social media text data by applying the machine learning algorithm. Finally, the usefulness of the emotions is suggested for various stake holders, to find the attitude of individuals at that moment, the data is produced. . 展开更多
关键词 Data pre-processing Machine Learning algorithms Emotion Deduction Sentiment Analysis
下载PDF
一种基于SO-CNN模型的可见光室内定位优化方法
19
作者 陈静 刘旋 +2 位作者 王金元 章永龙 朱俊武 《电讯技术》 北大核心 2024年第5期702-709,共8页
针对基于机器学习的可见光室内定位方法存在的手工调参、定位精度低等问题,结合蛇优化(Snake Optimization,SO)算法的寻优能力与卷积神经网络(Convolutional Neural Network,CNN)处理复杂非线性问题的能力,提出了一种基于SO-CNN模型的... 针对基于机器学习的可见光室内定位方法存在的手工调参、定位精度低等问题,结合蛇优化(Snake Optimization,SO)算法的寻优能力与卷积神经网络(Convolutional Neural Network,CNN)处理复杂非线性问题的能力,提出了一种基于SO-CNN模型的可见光室内定位优化方法。在考虑多径效应影响的情况下,采集每个位置点处的信噪比和对应位置坐标构建指纹数据库,对SO-CNN模型进行训练和测试,以得到最佳定位模型。实验结果表明,在5 m×5 m×3 m的房间中,与未经优化的CNN相比,该方法的平均定位误差降低了35.13%;与反向传播神经网络(Back Propagation Neural Network,BPNN)、多层感知器(Multilayer Perceptron,MLP)、SO-MLP相比,该方法的平均定位误差分别降低了54.75%,48.08%,37.01%。 展开更多
关键词 可见光室内定位(VLIP) 指纹定位法 蛇优化算法 卷积神经网络
下载PDF
基于多层编码的数据库指纹溯源方法
20
作者 李莉 《自动化技术与应用》 2024年第7期134-136,188,共4页
为了实现针对数据库数据的泄密追踪,提出一套基于多层编码的数据库指纹溯源方法。在通过OFFO多层编码预防用户合谋的基础上在数据库中嵌入数据指纹,详细介绍指纹嵌入的基本原理与实现流程,通过提取码元的方式实现数据库指纹的溯源。最... 为了实现针对数据库数据的泄密追踪,提出一套基于多层编码的数据库指纹溯源方法。在通过OFFO多层编码预防用户合谋的基础上在数据库中嵌入数据指纹,详细介绍指纹嵌入的基本原理与实现流程,通过提取码元的方式实现数据库指纹的溯源。最后通过数据库指纹匹配率对比实验的方式对溯源算法的有效性加以验证,实验结果表明,研究所提出的数据库指纹溯源方案在溯源准确率方面应用效果较为理想。 展开更多
关键词 数据库指纹 多层编码 溯源算法 数据安全
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部