Advanced Search
Displaying 1-10 on page 1 of 45. Per Page  

Articles / Online

  • Provenance Method of Electronic Archives Based on Knowledge Graph in Big Data Environment
  • Abstract With the advent of the era of big data, the Provenance Method of electronic archives based on knowledge graph under the environment of big data has produced a large number of electronic archives due to the development of science and technology. How to guarantee the credential characteristics of electronic archives in the big data environment has attracted wide attention of the academic community. Provenance is an important technical means to guarantee the certification of electronic archives. In this paper, knowledge graph technology is used to provide the concept provenance of electronic archives in large data environment. It not only enriches…
  • More
  •   Views:286       Downloads:168        Download PDF
  • Adaptive Multi-Scale HyperNet with Bi-Direction Residual Attention Module for Scene Text Detection
  • Abstract Scene text detection is an important step in the scene text reading system. There are still two problems during the existing text detection methods: (1) The small receptive of the convolutional layer in text detection is not sufficiently sensitive to the target area in the image; (2) The deep receptive of the convolutional layer in text detection lose a lot of spatial feature information. Therefore, detecting scene text remains a challenging issue. In this work, we design an effective text detector named Adaptive Multi-Scale HyperNet (AMSHN) to improve texts detection performance. Specifically, AMSHN enhances the sensitivity of target semantics in…
  • More
  •   Views:245       Downloads:175        Download PDF
  • A Reversible Data Hiding Algorithm Based on Secret Sharing
  • Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the encrypted information using the watermark…
  • More
  •   Views:231       Downloads:174        Download PDF
  • The Design of Intelligent Wastebin Based on AT89S52
  • Abstract Mainly introduces intelligent classification trash can be dedicated to solving indoor household garbage classification. The trash can is based on AT89S52 single-chip microcomputer as the main control chip. The single-chip microcomputer realizes the intelligent classification of garbage by controlling the voice module, mechanical drive module, and infrared detection module. The use of voice control technology and infrared detection technology makes the trash can have voice control and overflow alarm functions. The design has the advantages of simple and intelligent operation, simple structure, stable performance, low investment, etc., which can further effectively isolate people and garbage, reduce human infection with bacteria,…
  • More
  •   Views:244       Downloads:175        Download PDF
  • Realization of Mobile Augmented Reality System Based on Image Recognition
  • Abstract With the development of computation technology, the augmented reality (AR) is widely applied in many fields as well as the image recognition. However, the AR application on mobile platform is not developed enough in the past decades due to the capability of the mobile processors. In recent years, the performance of mobile processors has changed rapidly, which makes it comparable to the desktop processors. This paper proposed and realized an AR system to be used on the Android mobile platform based on the image recognition through EasyAR engine and Unity 3D development tools. In this system, the image recognition could…
  • More
  •   Views:247       Downloads:167        Download PDF
  • A Broadcast Storm Detection and Treatment Method Based on Situational Awareness
  • Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers debug the corresponding code, they…
  • More
  •   Views:374       Downloads:253        Download PDF
  • Survey on the Loss Function of Deep Learning in Face Recognition
  • Abstract With the continuous development of face recognition network, the selection of loss function plays an increasingly important role in improving accuracy. The loss function of face recognition network needs to minimize the intra-class distance while expanding the inter-class distance. So far, one of our mainstream loss function optimization methods is to add penalty terms, such as orthogonal loss, to further constrain the original loss function. The other is to optimize using the loss based on angular/cosine margin. The last is Triplet loss and a new type of joint optimization based on HST Loss and ACT Loss. In this paper, based…
  • More
  •   Views:504       Downloads:321        Download PDF
  • A Fast Detection Method of Network Crime Based on User Portrait
  • Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use the Naive Bayesian method matching…
  • More
  •   Views:323       Downloads:263        Download PDF
  • XGBoost Algorithm under Differential Privacy Protection
  • Abstract Privacy protection is a hot research topic in information security field. An improved XGBoost algorithm is proposed to protect the privacy in classification tasks. By combining with differential privacy protection, the XGBoost can improve the classification accuracy while protecting privacy information. When using CART regression tree to build a single decision tree, noise is added according to Laplace mechanism. Compared with random forest algorithm, this algorithm can reduce computation cost and prevent overfitting to a certain extent. The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data.
  • More
  •   Views:376       Downloads:264        Download PDF
  • Feature-Enhanced RefineDet: Fast Detection of Small Objects
  • Abstract Object detection has been studied for many years. The convolutional neural network has made great progress in the accuracy and speed of object detection. However, due to the low resolution of small objects and the representation of fuzzy features, one of the challenges now is how to effectively detect small objects in images. Existing target detectors for small objects: one is to use high-resolution images as input, the other is to increase the depth of the CNN network, but these two methods will undoubtedly increase the cost of calculation and time-consuming. In this paper, based on the RefineDet network framework,…
  • More
  •   Views:320       Downloads:260        Download PDF
Displaying 1-10 on page 1 of 45. Per Page