999 resultados para Photon propagation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Levenberg Marquardt (LM) algorithm is one of the most effective algorithms in speeding up the convergence rate of the Artificial Neural Networks (ANN) with Multilayer Perceptron (MLP) architectures. However, the LM algorithm suffers the problem of local minimum entrapment. Therefore, we introduce several improvements to the Levenberg Marquardt algorithm by training the ANNs with meta-heuristic nature inspired algorithm. This paper proposes a hybrid technique Accelerated Particle Swarm Optimization using Levenberg Marquardt (APSO_LM) to achieve faster convergence rate and to avoid local minima problem. These techniques are chosen since they provide faster training for solving pattern recognition problems using the numerical optimization technique.The performances of the proposed algorithm is evaluated using some bench mark of classification’s datasets. The results are compared with Artificial Bee Colony (ABC) Algorithm using Back Propagation Neural Network (BPNN) algorithm and other hybrid variants. Based on the experimental result, the proposed algorithms APSO_LM successfully demonstrated better performance as compared to other existing algorithms in terms of convergence speed and Mean Squared Error (MSE) by introducing the error and accuracy in network convergence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inpainting images with smooth curvilinear structures interrupted is a challenging problem, because the structures are salient features sensitive to the human vision system and they are not easy to be completed in a visually pleasing way, especially when gaps are large. In this paper, we propose an approach to address this problem. A curve with a desired nice shape is first created to smoothly extend the missing structure from the known to unknown regions. As the curve partitions the unknown region into separate areas, textures can be filled independently into each area. We then adopt a patch-based texture inpainting method enhanced by a novel similarity measurement of patches. After that, very abrupt edges caused by different inpainted colours on their two sides need to be smoothed for natural colour transition across the curve. Experimental results demonstrate the effectiveness of the proposed approach. © 2014 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are the two common means for propagating worms: scanning vulnerable computers in the network and spreading through topological neighbors. Modeling the propagation of worms can help us understand how worms spread and devise effective defense strategies. However, most previous researches either focus on their proposed work or pay attention to exploring detection and defense system. Few of them gives a comprehensive analysis in modeling the propagation of worms which is helpful for developing defense mechanism against worms' spreading. This paper presents a survey and comparison of worms' propagation models according to two different spreading methods of worms. We first identify worms characteristics through their spreading behavior, and then classify various target discover techniques employed by them. Furthermore, we investigate different topologies for modeling the spreading of worms, analyze various worms' propagation models and emphasize the performance of each model. Based on the analysis of worms' spreading and the existing research, an open filed and future direction with modeling the propagation of worms is provided. © 2014 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the fracture mechanism of fluid coupled with a solid resulting from hydraulic fracture. A new loading machine was designed to improve upon conventional laboratory hydraulic fracture testing and to provide a means of better understanding fracture behavior of solid media. Test specimens were made of cement mortar. An extensometer and acoustic emission (AE) monitoring system recorded the circumferential deformation and crack growth location/number during the test. To control the crack growth at the post-peak stage the input fluid rate can be adjusted automatically according to feedback from the extensometer. The complete stress-deformation curve, including pre- and post-peak stages, was therefore obtained. The crack extension/growth developed intensively after the applied stress reached the breakdown pressure. The number of cracks recorded by the AE monitoring system was in good agreement with the amount of deformation (expansion) recorded by the extensometer. The results obtained in this paper provide a better understanding of the hydraulic fracture mechanism which is useful for underground injection projects. © 2014 Springer-Verlag Wien.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to the critical security threats imposed by email-based malware in recent years, modeling the propagation dynamics of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of email malware, modern email malware exhibits two new features, reinfection and self-start. Reinfection refers to the malware behavior that modern email malware sends out malware copies whenever any healthy or infected recipients open the malicious attachment. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. In the literature, several models are proposed for email malware propagation, but they did not take into account the above two features and cannot accurately model the propagation dynamics of modern email malware. To address this problem, we derive a novel difference equation based analytical model by introducing a new concept of virtual infected user. The proposed model can precisely present the repetitious spreading process caused by reinfection and self-start and effectively overcome the associated computational challenges. We perform comprehensive empirical and theoretical study to validate the proposed analytical model. The results show our model greatly outperforms previous models in terms of estimation accuracy. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the possible damage caused by smartphone malware. In the second part, we focus on smartphone malware propagation modeling. In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. We then extensively survey the smartphone malware propagation models. At the end of this paper, we highlight issues of the current smartphone malware propagation models and discuss possible future trends based on our understanding of this topic. © © 2014 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Smartphone applications are getting more and more popular and pervasive in our daily life, and are also attractive to malware writers due to their limited computing source and vulnerabilities. At the same time, we possess limited understanding of our opponents in cyberspace. In this paper, we investigate the propagation model of SMS/MMS-based worms through integrating semi-Markov process and social relationship graph. In our modeling, we use semi-Markov process to characterize state transition among mobile nodes, and hire social network theory, a missing element in many previous works, to enhance the proposed mobile malware propagation model. In order to evaluate the proposed models, we have developed a specific software, and collected a large scale real-world data for this purpose. The extensive experiments indicate that the proposed models and algorithms are effective and practical. © 2014 Elsevier Ltd. All rights reserved.