-
2921
-
2922
-
2923
Fast Adaptive Sparse Iterative Reweighted Super-Resolution Method for Forward-Looking Radar Imaging
Published 2024-01-01“…However, this method suffers from poor adaptability and high computational complexity due to its noise-sensitive user-parameter and the necessity for high-dimensional matrix inversion. …”
Get full text
Article -
2924
SCAT: Shift Channel Attention Transformer for Remote Sensing Image Super-Resolution
Published 2025-01-01Get full text
Article -
2925
-
2926
-
2927
-
2928
-
2929
Hankel Tensor Subspace Representation for Remotely Sensed Image Fusion
Published 2025-01-01Get full text
Article -
2930
SSL-MBC: Self-Supervised Learning With Multibranch Consistency for Few-Shot PolSAR Image Classification
Published 2025-01-01“…Nevertheless, fully utilizing SSL in PolSAR classification tasks is still a great challenge due to the data complexity. Based on the abovementioned issues, we propose an SSL model with multibranch consistency (SSL-MBC) for few-shot PolSAR image classification. …”
Get full text
Article -
2931
DE-Unet: Dual-Encoder U-Net for Ultra-High Resolution Remote Sensing Image Segmentation
Published 2025-01-01Get full text
Article -
2932
-
2933
Rectified Adam Optimizer and LSTM with Attention Mechanism for ECG-Based Multi-class Classification of Cardiac Arrhythmia
Published 2025-06-01“…Cardiac Arrhythmia (CA) is one of the most prevalent cardiac conditions and prime reasons for sudden death. The current CA detection methods face challenges in noise removal, R-peak detection, and low-level feature selection, which can impact diagnostic accuracy and signal stability. …”
Get full text
Article -
2934
Attribute-based lightweight reconfigurable access control policy
Published 2020-02-01“…Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was proposed.Taking the attribute-based access control policy as an example,the attribute-based access control policy was divided into multiple disjoint atomic access control rules according to the operation type,subject attribute,object attribute,and environment attribute in the access control policy.Complex access control policies were constructed through atomic access control rules and an algebraic expression formed by AND,OR logical relationships.A method for redundancy and collision detection of atomic access control rules was proposed.A method was proposed for decompose a complex access control policy into equivalent atomic access control rules and an algebraic expression.The method for redundancy and collision detection of complex access control policies were proposed through redundancy and collision detection of equivalent atomic access control rules and algebraic expressions.From time complexity and space complexity,the efficiency of the equivalent transformation access control policy was evaluated.It showes that the reconstruction method for access control policy greatly reduces the number,size and complexity of access control policy,improves the efficiency of access control policy redundancy and collision detection,and the efficiency of access control evaluation.…”
Get full text
Article -
2935
A fast video coding algorithm using data mining for video surveillance
Published 2025-08-01“…Video surveillance is crucial for various applications, including unmanned aerial vehicle operations, flight safety monitoring, social security management, industrial safety, and criminal detection. The large volume of video data generated in these areas requires efficient processing techniques. …”
Get full text
Article -
2936
Leveraging machine learning to proactively identify phishing campaigns before they strike
Published 2025-05-01“…These algorithms were chosen for their strong global search capabilities and adaptability to complex datasets, ensuring optimal parameter selection for improved model performance. …”
Get full text
Article -
2937
Fault analysis of chemical equipment based on an improved hybrid model.
Published 2025-01-01“…However, traditional fault detection techniques often exhibit limitations when applied to the complex operational conditions, varying environmental factors, and multimodal data encountered in chemical equipment. …”
Get full text
Article -
2938
Digital security risk identification and model construction of smart city based on deep learning
Published 2025-07-01“…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
Get full text
Article -
2939
A Blockchain-Based Architecture of Web3.0: A Comprehensive Decentralized Model With Relay Nodes, Unique IDs and P2P
Published 2025-01-01“…When faced with malicious requests, the system significantly reduces verification latency to an average of 0.0106 ms, ensuring rapid rejection and preserving network stability, while legitimate requests are processed efficiently with an average latency of 0.4125 ms.Experiments comparing latency-based and random-based relay selection methods across various network configurations (public-public, public-private, private-private) demonstrate that latency-based selection optimizes connection setup times in low-latency environments, while random-based selection provides robust performance in complex network scenarios. …”
Get full text
Article -
2940
Analysis and Synthesis March Memory Tests
Published 2021-07-01“…Mathematical models of memory device faults and the efficiency of their detection, in particular, complex pattern sensitive faults of the PNPSFk type, based on classical march memory tests are presented. …”
Get full text
Article