2019
DOI: 10.1016/j.eswa.2019.06.041
|View full text |Cite|
|
Sign up to set email alerts
|

A novel sparse representation model for pedestrian abnormal trajectory understanding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 71 publications
(27 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…According to the above discussion, the models established in this paper are as follows: According to the collected panel data of listed commercial banks, this paper firstly carries out the fixed effect regression and then carries out the Hausman test according to the obtained parameters. The test results show that the individual effect has nothing to do with the regression variables, so the random effect model is used to regression the sample panel data, and the equation results are as follows [21,22]:…”
Section: Block Chain Financial Risk Assessmentmentioning
confidence: 99%
“…According to the above discussion, the models established in this paper are as follows: According to the collected panel data of listed commercial banks, this paper firstly carries out the fixed effect regression and then carries out the Hausman test according to the obtained parameters. The test results show that the individual effect has nothing to do with the regression variables, so the random effect model is used to regression the sample panel data, and the equation results are as follows [21,22]:…”
Section: Block Chain Financial Risk Assessmentmentioning
confidence: 99%
“…In the practice of solving problems, the ultimate goal of genetic algorithm is to determine the global optimal solution. The essence of the whole process is random search, which has great uncertainty [22]. The operation process of genetic algorithm is continuously optimized under the expected value of the optimal solution, and it is regarded as the initial sequence.…”
Section: Convergence Theory Of Genetic Algorithmmentioning
confidence: 99%
“…Based on the analysis of the computer network attack principle under the virus propagation model, the computer network attack interface is built, and the computer network attacks under the virus propagation model include password attack, denial of service attack, buffer overflow attack, data-driven attack, forged information attack, and ARP attack, to implement the construction of the computer network attack analysis model [24].…”
Section: Analysis Of Computer Network Attackmentioning
confidence: 99%