Linked e-resources

Details

Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents; Algorithms and Security Analysis; A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor D ...; Abstract; 1 Introduction; 2 Data Clustering Based on Improved AFSA; 2.1 AFSA and Its Improvement

2.2 Clustering Analysis Based on the Improved AFSA3 Tensor Model and Recommendation Algorithm; 3.1 Tensor and Tensor Decomposition; 3.2 Tensor Decomposition with Dynamic Incremental Updating; 3.3 Tensor Modeling and Recommendation Algorithm; 4 Experiment Design and Data Analysis; 4.1 Testing Datasets; 4.2 Algorithm Evaluation Indices; 4.3 Experiment Results and Discussions; 5 Conclusion; Acknowledgements; References; Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1 Introduction; 2 Representation Based Classification

3 The Classification of the Nearest Neighbor Representation in Feature Space4 Numerical Experiments; 4.1 Results of Experiments on Standard Two-Class Datasets; 4.2 Results of Experiment on Face Databases; 5 Conclusion; References; A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1 Introduction; 2 The Proposed Algorithm of Aesthetic QR Code; 2.1 The Improved Salient Region Detection Algorithm; 2.2 The Generation of SPBVM; 2.3 The Synthetic Strategy; 3 Experimental Results; 3.1 Comparison Results with and Without Salient Region Detection

3.2 Correctness of QR Code Decoding3.3 Comparison of Different Aesthetic QR Code Algorithms; 4 Conclusion; Acknowledgments; References; Compact Cat Swarm Optimization Algorithm; Abstract; 1 Introduction; 2 Related Work; 2.1 Virtual Population and Sampling Mechanism; 2.2 The Perturbation Vector Updating Rule; 2.3 Cat Swarm Optimization; 2.3.1 Seeking Mode; 2.3.2 Tracing Mode; 3 Compact Cat Swarm Optimization Algorithm; 3.1 Initialization and Perturbation Vector Updating Rules; 3.2 Seeking Mode; 3.3 Tracing Mode; 3.4 The Implementation Procedure and Details; 4 Experimental Results and Analyze

4.1 Memory Usage for All Compared Algorithms4.2 Comparisons for Convergence Result; 5 Conclusion; References; Cryptanalysis and Detection Systems; Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1 Introduction; 2 Local Gabor Wavelets Patterns; 3 The Proposed Method; 3.1 Image Pre-processing; 3.2 Feature Extraction with LGWP; 3.3 Matching Block Pairs; 3.4 Post-processing; 4 Experimental Results; 5 Conclusions; References; A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1 Introduction; 1.1 Cluster Analysis

Browse Subjects

Show more subjects...

Statistics

from
to
Export