56 research outputs found

    Study on the mesh mode of IEEE 802.16

    No full text
    [[abstract]]The new Wireless-MAN standard, IEEE 802.16, provides broadband, wide coverage, was one of the most worthy technique. there are two established modes for IEEE 802.16, One is PMP another is Mesh, There are two mechanisms to schedule data transmission in the IEEE 802.16 Mesh networks: centralized and distributed scheduling.In the centralized scheduling scheme, the BS works like the cluster head and determines time slot allocation of each SS. In order to transmit data packets, the SS is required to submit the request packet to the BS via the control channel. The BS grants the access request by sending the slot allocation schedule call UP_MAP to all SS nodes. In the distributed scheduling scheme, if the SS have data to send, it need to compete with it neighbors. So that it can start data transmission. In this paper, for clarity purposes we will focus on a two classes system and use an approximation two-dimensional Markov mode to analyze the system performance, though the analysis approach may be easily extended to general class case

    A Detection Approach Using LSTM-CNN for Object Removal Caused by Exemplar-Based Image Inpainting

    No full text
    Exemplar-based image inpainting technology is a “double-edged sword”. It can not only restore the integrity of image by inpainting damaged or removed regions, but can also tamper with the image by using the pixels around the object region to fill in the gaps left by object removal. Through the research and analysis, it is found that the existing exemplar-based image inpainting forensics methods generally have the following disadvantages: the abnormal similar patches are time-consuming and inaccurate to search, have a high false alarm rate and a lack of robustness to multiple post-processing combined operations. In view of the above shortcomings, a detection method based on long short-term memory (LSTM)-convolutional neural network (CNN) for image object removal is proposed. In this method, CNN is used to search for abnormal similar patches. Because of CNN’s strong learning ability, it improves the speed and accuracy of the search. The LSTM network is used to eliminate the influence of false alarm patches on detection results and reduce the false alarm rate. A filtering module is designed to eliminate the attack of post-processing operation. Experimental results show that the method has a high accuracy, and can resist the attack of post-processing combination operations. It can achieve a better performance than the state-of-the-art approaches

    The Nanshe group and its poetics in the late Qing and early Republican periods

    No full text
    published_or_final_versionChineseMasterMaster of Philosoph

    Haptic Slider for Data Visualisation in Virtual Reality

    No full text

    CFSH: Factorizing sequential and historical purchase data for basket recommendation.

    No full text
    To predict what products customers will buy in next transaction is an important task. Existing work in next-basket prediction can be summarized into two paradigms. One is the item-centric paradigm, where sequential patterns are mined from customers' transactional data and leveraged for prediction. However, these approaches usually suffer from the data sparseness problem. The other is the user-centric paradigm, where collaborative filtering techniques have been applied on customers' historical data. However, these methods ignore the sequential behaviors of customers which is often crucial for next-basket prediction. In this paper, we introduce a hybrid method, namely the Co-Factorization model over Sequential and Historical purchase data (CFSH for short) for next-basket recommendation. Compared with existing methods, our approach conveys the following merits: 1) By mining global sequential patterns, we can avoid the sparseness problem in traditional item-centric methods; 2) By factorizing product-product and customer-product matrices simultaneously, we can fully exploit both sequential and historical behaviors to learn customer and product representations better; 3) By using a hybrid recommendation method, we can achieve better performance in next-basket prediction. Experimental results on three real-world purchase datasets demonstrated the effectiveness of our approach as compared with the state-of-the-art methods

    An Intelligent Forensics Approach for Detecting Patch-Based Image Inpainting

    No full text
    Image inpainting algorithms have a wide range of applications, which can be used for object removal in digital images. With the development of semantic level image inpainting technology, this brings great challenges to blind image forensics. In this case, many conventional methods have been proposed which have disadvantages such as high time complexity and low robustness to postprocessing operations. Therefore, this paper proposes a mask regional convolutional neural network (Mask R-CNN) approach for patch-based inpainting detection. According to the current research, many deep learning methods have shown the capacity for segmentation tasks when labeled datasets are available, so we apply a deep neural network to the domain of inpainting forensics. This deep learning model can distinguish and obtain different features between the inpainted and noninpainted regions. To reduce the missed detection areas and improve detection accuracy, we also adjust the sizes of the anchor scales due to the inpainting images and replace the original nonmaximum suppression single threshold with an improved nonmaximum suppression (NMS). The experimental results demonstrate this intelligent method has better detection performance over recent approaches of image inpainting forensics

    Weakly Supervised GAN for Image-to-Image Translation in the Wild

    No full text
    Generative Adversarial Networks (GANs) have achieved significant success in unsupervised image-to-image translation between given categories (e.g., zebras to horses). Previous GANs models assume that the shared latent space between different categories will be captured from the given categories. Unfortunately, besides the well-designed datasets from given categories, many examples come from different wild categories (e.g., cats to dogs) holding special shapes and sizes (short for adversarial examples), so the shared latent space is troublesome to capture, and it will cause the collapse of these models. For this problem, we assume the shared latent space can be classified as global and local and design a weakly supervised Similar GANs (Sim-GAN) to capture the local shared latent space rather than the global shared latent space. For the well-designed datasets, the local shared latent space is close to the global shared latent space. For the wild datasets, we will get the local shared latent space to stop the model from collapse. Experiments on four public datasets show that our model significantly outperforms state-of-the-art baseline methods

    Source analysis and health risk assessment of heavy metals in agricultural land of multi-mineral mining and smelting area in the Karst region – a case study of Jichangpo Town, Southwest China

    No full text
    In the Karst region of Southwest China, the content of soil heavy metals is generally high because of the geological background. Moreover, Southwest China is rich in mineral resources. A large number of mining and smelting activities discharge heavy metals into surrounding soil and cause superimposed pollution, which has drawn widespread concern. Due to the large variation coefficients of soil heavy metals in the Karst region, it is particularly essential to select appropriate analysis methods. In this paper, Jichangpo in Puding County, a Karst area with multi-mineral mining and smelting, is selected as the research object. A total of 368 pieces of agricultural topsoil in the study area are collected. The pollution level of heavy metals in agricultural soil is evaluated by the geological accumulation index (Igeo) and enrichment factor (EF). Absolute Factor Score/Multiple Linear Regression (APCS/MLR), geographic information system (GIS), self-organizing mapping (SOM), and random forest (RF) are used for the source allocation of soil heavy metals. Finally, the combination of APCS/MLR and health risk assessment model is adopted to evaluate the risks of heavy metal sources and determine the priority-control source. The results show that the average values of soil heavy metals in the study area (Cd, Hg, As, Pb, Cr, Cu, Zn, and Ni) exceed the background values of corresponding elements in Guizhou Province. Three sources of heavy metals are identified by combining APCS/MLR, GIS, SOM, and RF. Zn (63.47%), Pb (55.77%), Cd (58.98%), Hg (32.17%), Cu (14.41%), and As (5.99%) are related to lead-zinc mining and smelting; Cr (98.14%), Ni (90.64%), Cu (76.93%), Pb (43.02%), Zn (35.22%), Cd (28.97%), Hg (22.44%), and As (5.84%) are mixed sources (natural and agricultural sources); As (88.17%), Hg (45.39%), Cd (12.04%), Cu (8.66%), and Ni (6.72%) are related to the mining and smelting of coal and iron. The results of health risk assessment show that only As poses a non-carcinogenic risk to human health. 3.31% of the sampling points of As have non-carcinogenic risks to adults and 10.22% to children. In terms of carcinogenic risks, As, Pb, and Cr pose carcinogenic risks to adults and children. Combined with APCS/MLR and the health risk assessment model, the mining and smelting of coal and iron is the priority-control pollution source. This paper provides a comprehensive method for studying the distribution of heavy metal sources in areas with large variation coefficients of soil heavy metals in the Karst region. Furthermore, it offers a theoretical basis for the management and assessment of heavy metal pollution in agricultural land in the study area, which is helpful for researchers to make strategic decisions on food security when selecting agricultural land

    An Improved Permission Management Scheme of Android Application Based on Machine Learning

    No full text
    The Android permission mechanism prevents malicious application from accessing the mobile multimedia data and invoking the sensitive API. However, there are still lots of deficiencies in the current permission management, which results in the permission mechanism being unable to protect users’ private data properly. In this paper, a dynamic management scheme of Android permission based on machine learning is proposed to solve the problem of the existing permission mechanism. In order to accomplish the dynamic management, the proposed scheme maintains a dynamic permission management database which records the state of permissions for each application. Only the permission which is granted state in the database can be used in this application. In the whole process, the scheme first classifies the application by means of machine learning, then retrieves the corresponding permission information from databases, and issues the dangerous permission warning to users. Finally, the scheme updates the dynamic management database according to the users’ decisions. Through this scheme, users can prevent malicious behaviour of accessing private data and invoking sensitive API in time. The solution increases the flexibility of permission management and improves the security and reliability of multimedia data in Android devices

    Layerwise Adversarial Learning for Image Steganography

    No full text
    Image steganography is a subfield of pattern recognition. It involves hiding secret data in a cover image and extracting the secret data from the stego image (described as a container image) when needed. Existing image steganography methods based on Deep Neural Networks (DNN) usually have a strong embedding capacity, but the appearance of container images is easily altered by visual watermarks of secret data. One of the reasons for this is that, during the end-to-end training process of their Hiding Network, the location information of the visual watermarks has changed. In this paper, we proposed a layerwise adversarial training method to solve the constraint. Specifically, unlike other methods, we added a single-layer subnetwork and a discriminator behind each layer to capture their representational power. The representational power serves two purposes: first, it can update the weights of each layer which alleviates memory requirements; second, it can update the weights of the same discriminator which guarantees that the location information of the visual watermarks remains unchanged. Experiments on two datasets show that the proposed method significantly outperforms the most advanced methods
    • …
    corecore