搜索结果: 1-15 共查到“Clustering”相关记录247条 . 查询时间(0.065 秒)
Analysis of atmospheric visibility degradation in early haze based on the nucleation clustering model
Early haze Initial nucleation process Heterogeneous cluster Visible-light absorption
2023/3/1
The initial nucleation of ultrafine particle recently attracts more attention as a key factor in visibility degradation during early haze. In this study, we have performed Density Functional Theory (D...
中国地质大学科学技术发展院 李正来,唐厂 等,计算机学院. IEEE T-MM (2021), Consensus Graph Learning for Multi-view Clustering(图)
噪声;冗余信息;捕获;数据;相似性;干扰
2021/10/14
2021年5月21日,《IEEE Transactions on Multimedia》正式刊发了国地质大学计算机学院与国防科技大学、深圳大学以及国家超算济南中心等单位合作完成的研究成果—Consensus Graph Learning for Multi-view Clustering(基于一致图学习的多视图聚类算法),论文的第一作者为中国地质大学计算机学院硕士研究生李正来,通讯作者为唐厂教授。
Towards a Practical Clustering Analysis over Encrypted Data
clustering mean-shift homomorphic encryption, privacy
2019/5/13
Clustering analysis is one of the most significant unsupervised machine learning tasks, and it is utilized in various fields associated with privacy issue including bioinformatics, finance and image p...
CLUSTERING OF WALL GEOMETRY FROM UNSTRUCTURED POINT CLOUDS
Building Information Modeling Clustering Wall Building Point Clouds
2019/3/1
The automated reconstruction of Building Information Modeling (BIM) objects from point cloud data is still ongoing research. A key aspect is retrieving the proper observations for each object. After s...
DENDROGRAM CLUSTERING FOR 3D DATA ANALYTICS IN SMART CITY
Smart City Dendrogram Clustering 3D Spatial Database 3D GIS Data Analytics Data Structure
2018/11/9
Smart city is a connection of physical and social infrastructure together with the information technology to leverage the collective intelligence of the city. Cities will build huge data centres. Thes...
EDGE-BASED LOCALLY AGGREGATED DESCRIPTORS FOR IMAGE CLUSTERING
Edge feature points Local feature aggregation Global image descriptors Image clustering
2018/5/11
The current global image descriptors are mostly obtained by using the local image features aggregation, which fail to take full account of the details of the image, resulting in the loss of the semant...
MINING CO-LOCATION PATTERNS WITH CLUSTERING ITEMS FROM SPATIAL DATA SETS
Spatial data mining Clustering items Co-location patterns with clustering items Neighbor relationship Praticipation index
2018/5/17
The explosive growth of spatial data and widespread use of spatial databases emphasize the need for the spatial data mining. Co-location patterns discovery is an important branch in spatial data minin...
A HYBRID APPROACH FOR PREDICTION OF CHANGES IN LANDSLIDE RATES BASED ON CLUSTERING AND A DECISION TREE
Landslides Prediction Two-step cluster Classification and regression tree (CART) White box model
2018/4/18
Forecasting the complex deformation patterns (e.g., displacement, velocity, etc.) of landslides is required to prevent property damage and loss of human lives caused by landslide deformation and failu...
A HYBRID APPROACH FOR PREDICTION OF CHANGES IN LANDSLIDE RATES BASED ON CLUSTERING AND A DECISION TREE
Landslides, Prediction, Two-step cluster, Classification and regression tree (CART), White box model
2018/5/8
Forecasting the complex deformation patterns (e.g., displacement, velocity, etc.) of landslides is required to prevent property damage and loss of human lives caused by landslide deformation and failu...
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
side-channel attack SCA ECC
2017/12/19
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because th...
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Truncated Differential Cryptanalysis TWEAKEY MANTIS
2017/11/28
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implication...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
MULTI-PATCHES IRIS BASED PERSON AUTHENTICATION SYSTEM USING PARTICLE SWARM OPTIMIZATION AND FUZZY C-MEANS CLUSTERING
Particle swarm optimization Fuzzy c-means Taylor’s series expansion weighted mean Hamming distance Iris recognition system
2017/6/19
Locating the boundary parameters of pupil and iris and segmenting the noise free iris portion are the most challenging phases of an automated iris recognition system. In this paper, we have presented ...
Hashtags are creative labels used in micro-blogs to characterize the topic of a message/discussion.
Regardless of the use for which they were originally intended, hashtags cannot be used as a means
...
Evaluation of forest fire risk using the Apriori algorithm and fuzzy c-means clustering
wildfire association rules fuzzification Ilam Province Iran
2018/3/6
In this study we evaluated forest fire risk in the west of Iran using the Apriori algorithm and fuzzy c-means (FCM)
clustering. We used twelve different input parameters to model fire risk in Ilam Pr...