筛选条件 共查询到500条结果
排序方式
Improved AP Deployment Optimization Scheme Based on Multi-objective Particle Swarm Optimization Algorithm

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)

Deployment of access point (AP) is a problem that must be considered in network planning. However, this problem is usually a NP-hard problem which is ......

FD-StackGAN: Face De-occlusion Using Stacked Generative Adversarial Networks

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)

It has been widely acknowledged that occlusion impairments adversely distress many face recognition algorithms' performance. Therefore, it is crucial ......

Visual Analysis of Deep Q-network

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (3)

In recent years, deep reinforcement learning (DRL) models are enjoying great interest as their success in a variety of challenging tasks. Deep Q-Netwo......

DP-LinkNet: A convolutional network for historical document image binarization

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)

Document image binarization is an important pre-processing step in document analysis and archiving. The state-of-the-art models for document image bin......

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (6)

Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in ......

Joint Optimization Algorithm Based on DCA for Three-tier Caching in Heterogeneous Cellular Networks

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)

In this paper, we derive the expression of the cache hitting probability with random caching policy and propose the joint optimization algorithm based......

A review of Chinese named entity recognition

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (6)

Named Entity Recognition (NER) is used to identify entity nouns in the corpus such as Location, Person and Organization, etc. NER is also an important......

Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)

An image with infrared features and visible details is obtained by processing infrared and visible images. In this paper, a fusion method based on Lap......

DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)

Compared with vehicle trajectories, pedestrian trajectories have stronger degrees of freedom and complexity, which poses a higher challenge to traject......

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (8)

Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartph......

Competitive Influence Maximization on Online Social Networks under Cost Constraint

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)

In online competitive social networks, each user can be influenced by different competing influencers and consequently chooses different products. But......

Traffic Engineering with Segment Routing under Uncertain Failures

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (7)

Segment routing (SR) is a highly implementable approach for traffic engineering (TE) with high flexibility, high scalability, and high stability, whic......

PoW-BC: A PoW Consensus Protocol Based on Block Compression

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)

Proof-of-Work (PoW) is the first and still most common consensus protocol in blockchain. But it is costly and energy intensive, aiming at addressing t......

Stylized Image Generation based on Music-image Synesthesia Emotional Style Transfer using CNN Network

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (4)

Emotional style of multimedia art works are abstract content information. This study aims to explore emotional style transfer method and find the poss......

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

期刊: KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021; 15 (5)

Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts......

共500条页码: 1/34页15条/页