- Constraint Satisfaction and Optimization
- Data Management and Algorithms
- Complexity and Algorithms in Graphs
- Lung Cancer Research Studies
- Dark Matter and Cosmic Phenomena
- Computational Geometry and Mesh Generation
- Advanced Graph Theory Research
- Bayesian Modeling and Causal Inference
- Advanced Database Systems and Queries
- IoT-based Smart Home Systems
- Nanoplatforms for cancer theranostics
- Network Security and Intrusion Detection
- Data Mining Algorithms and Applications
- Logic, programming, and type systems
- Lubricants and Their Additives
- Artificial Immune Systems Applications
- Nanoparticle-Based Drug Delivery
- Synthesis and properties of polymers
- Fire Detection and Safety Systems
- Particle physics theoretical and experimental studies
- Anomaly Detection Techniques and Applications
- Robotic Path Planning Algorithms
- Formal Methods in Verification
- Quantum Chromodynamics and Particle Interactions
Qingdao Binhai University
2024
State Key Laboratory of Electrical Insulation and Power Equipment
2024
Xi'an Jiaotong University
2024
Jilin University
2023
University of Science and Technology of China
2023
Tianjin Fire Research Institute
2023
PLA Air Force Aviation University
2012
Guangxi University
2005
This paper researches the intrusion detection problem of network defense, pointing at low fitting defects in traditional algorithm high precision and forecasting accuracy under situation small sample training, puts forward Support Vector Machine.Aimed important influence SVM kernel function on classification performance, this adopts improved Ant Colony Algorithm as method selection characteristics parameters.Experiments show is significantly higher than other training speed, have a enhance...
Using 58 million $J/\ensuremath{\psi}$ events accumulated with the BES II detector, branching fractions for ${\ensuremath{\eta}}_{c}\ensuremath{\rightarrow}VV$ decays, ${\ensuremath{\eta}}_{c}\ensuremath{\rightarrow}\ensuremath{\rho}\ensuremath{\rho}$, ${\ensuremath{\eta}}_{c}\ensuremath{\rightarrow}{K}^{*}{\overline{K}}^{*}$, ${\ensuremath{\eta}}_{c}\ensuremath{\rightarrow}\ensuremath{\omega}\ensuremath{\omega}$, and...
AllDifferent constraint is widely used in Constraint Programming to model real world problems. Existing Generalized Arc Consistency (GAC) algorithms map an onto a bipartite graph and utilize the structure of Strongly Connected Components (SCCs) filter values. Calculating SCCs time-consuming existing algorithms, so we propose novel GAC algorithm for this paper, which eliminates computation SCCs. We prove that all redundant edges point some alternating cycles. Our exploits property uses more...
Periodic itemset patterns (PIPs) are widely used in predicting the occurrence of periodic events. However, extensive redundancy arises due to a large number patterns. Mining skyline (SPIPs) can reduce PIPs and guarantee accuracy prediction. The existing SPIP mining algorithm uses FP-Growth generate frequent (FPs), then identify SPIPs from FPs. Such separate steps lead massive time consumption, so we propose an efficient bit-based approach named BitSPIM mine SPIPs. proposed method introduces...
With the continuous development and maturity of artificial intelligence sensing, positioning, navigation, driving technologies, outdoor firefighting robots have been applied in more scenarios, even automatic tracking firefighting. However, due to frequent operation complex environments such as wilderness, forests, mountain slopes, they may encounter issues uneven ground, bumps, overgrown weeds. This puts stricter requirements on positioning technology robots, resulting GPS offset, with...