期刊文献+
共找到530篇文章
< 1 2 27 >
每页显示 20 50 100
Random forest algorithm reveals novel sites in HA protein that shift receptor binding preference of the H9N2 avian influenza virus
1
作者 Yuncong Yin Wen Li +7 位作者 Rujian Chen Xiao Wang Yiting Chen Xinyuan Cui Xingbang Lu David M.Irwin Xuejuan Shen Yongyi Shen 《Virologica Sinica》 2025年第1期109-117,共9页
A switch from avian-typeα-2,3 to human-typeα-2,6 receptors is an essential element for the initiation of a pandemic from an avian influenza virus.Some H9N2 viruses exhibit a preference for binding to human-typeα-2,... A switch from avian-typeα-2,3 to human-typeα-2,6 receptors is an essential element for the initiation of a pandemic from an avian influenza virus.Some H9N2 viruses exhibit a preference for binding to human-typeα-2,6 receptors.This identifies their potential threat to public health.However,our understanding of the molecular basis for the switch of receptor preference is still limited.In this study,we employed the random forest algorithm to identify the potentially key amino acid sites within hemagglutinin(HA),which are associated with the receptor binding ability of H9N2 avian influenza virus(AIV).Subsequently,these sites were further verified by receptor binding assays.A total of 12 substitutions in the HA protein(N158D,N158S,A160 N,A160D,A160T,T163I,T163V,V190T,V190A,D193 N,D193G,and N231D)were predicted to prefer binding toα-2,6 receptors.Except for the V190T substitution,the other substitutions were demonstrated to display an affinity for preferential binding toα-2,6 receptors by receptor binding assays.Especially,the A160T substitution caused a significant upregulation of immune-response genes and an increased mortality rate in mice.Our findings provide novel insights into understanding the genetic basis of receptor preference of the H9N2 AIV. 展开更多
关键词 H9n2 Hemagglutinin(HA) Receptor binding preference Random forest algorithm Host shift Interspecies transmission
原文传递
基于N-best策略的军事资源匹配方法 被引量:1
2
作者 吴瑞杰 孙鹏 +1 位作者 李锴 孙昱 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2016年第2期82-87,共6页
对于军事任务与平台的匹配问题,传统算法中平台的分配顺序与任务优先级高低有关,这样容易产生局部最优,导致全局的任务完成精度降低。针对此问题,提出了一种基于N-best策略的军事资源匹配方法。该方法包括2部分内容,第1部分是根据决策... 对于军事任务与平台的匹配问题,传统算法中平台的分配顺序与任务优先级高低有关,这样容易产生局部最优,导致全局的任务完成精度降低。针对此问题,提出了一种基于N-best策略的军事资源匹配方法。该方法包括2部分内容,第1部分是根据决策空间划分理论而提出的最佳算法,该算法能够为决策者提供若干种可供选择的分配方案,克服了单一方案带来的局限性;第2部分是设计一种反馈策略,通过对若干种可行解进行组合,找到使全局任务完成精度最大的解。实验仿真结果表明,基于N-best的策略能够提高使命完成精度。 展开更多
关键词 决策空间理论 反馈策略 任务完成精度 最佳算法
在线阅读 下载PDF
基于汉语语音音节特点的N-Best改进算法 被引量:1
3
作者 田斌 易克初 周战馨 《西安电子科技大学学报》 EI CAS CSCD 北大核心 1999年第1期84-88,共5页
连续语音识别中,由于各声学单元之间没有明显的间隔或声学标志,匹配和搜索算法成为影响系统实时性能的核心问题.基于汉语语音的特点,提出了一种改进的N-Best搜索算法.该算法大大降低了传统N-Best程序搜索空间而不至于... 连续语音识别中,由于各声学单元之间没有明显的间隔或声学标志,匹配和搜索算法成为影响系统实时性能的核心问题.基于汉语语音的特点,提出了一种改进的N-Best搜索算法.该算法大大降低了传统N-Best程序搜索空间而不至于失去最优解,有利于算法的实时实现. 展开更多
关键词 汉族语音识别 n-best算法 连续语音识别
在线阅读 下载PDF
一种有效的N-Best算法及其在中文语音识别中的应用
4
作者 王兴斌 王炳锡 《微计算机信息》 北大核心 2006年第06X期301-303,共3页
在连续语音识别中,N-best有很多应用。本论文分析了常用的N-best搜索算法,如并行算法,串行算法,以及Tree-Trellis搜索在搜索过程中的问题后,指出Tree-Trellis搜索的有效性,并且针对Tree-Trellis搜索后向得分计算复杂的问题,提出了一种... 在连续语音识别中,N-best有很多应用。本论文分析了常用的N-best搜索算法,如并行算法,串行算法,以及Tree-Trellis搜索在搜索过程中的问题后,指出Tree-Trellis搜索的有效性,并且针对Tree-Trellis搜索后向得分计算复杂的问题,提出了一种实现方便的方法,从而快速有效的输出N个有效路径。 展开更多
关键词 算法 n-best Tree-Trellis
在线阅读 下载PDF
A Fourier Reconstruction Algorithm in π-Scheme Short-Scan SPECT 被引量:2
5
作者 SHI Tingting WANG Jinping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期97-101,共5页
In this paper, an approximate analytical algorithm in the form of direct Fourier reconstruction is obtained for the recon- struction of data functions arisen from ^-scheme short-scan sin- gle-photon emission computed ... In this paper, an approximate analytical algorithm in the form of direct Fourier reconstruction is obtained for the recon- struction of data functions arisen from ^-scheme short-scan sin- gle-photon emission computed tomography(SPECT) with uniform attenuation, and the modified central slice theorem is developed. Numerical simulations are conducted to demonstrate the effec- tiveness of the developed method. 展开更多
关键词 single-photon emission computed tomography(SPECT) inversion formula Fourier reconstruction algorithm thecentral slice theorem n -scheme short-scan
原文传递
Multi-variable grey model (MGM(1,n,q)) based on genetic algorithm and its application in urban water consumption 被引量:3
6
作者 Yan Han Shi Guoxu 《Agricultural Science & Technology》 CAS 2007年第1期14-20,共7页
Urban water consumption has some characteristics of grey because it is influenced by economy, population, standard of living and so on. The multi-variable grey model (MGM(1,n)), as the expansion and complement of GM(1... Urban water consumption has some characteristics of grey because it is influenced by economy, population, standard of living and so on. The multi-variable grey model (MGM(1,n)), as the expansion and complement of GM(1,1) model, reveals the relationship between restriction and stimulation among variables, and the genetic algorithm has the whole optimal and parallel characteristics. In this paper, the parameter q of MGM(1,n) model was optimized, and a multi-variable grey model (MGM(1,n,q)) was built by using the genetic algorithm. The model was validated by examining the urban water consumption from 1990 to 2003 in Dalian City. The result indicated that the multi-variable grey model (MGM(1,n,q)) based on genetic algorithm was better than MGM(1,n) model, and the MGM(1,n) model was better than MGM(1,1) model. 展开更多
关键词 grey system MGM (1 n q) genetic algorithm urban water consumption
在线阅读 下载PDF
N4SID and MOESP Algorithms to Highlight the Ill-conditioning into Subspace Identification 被引量:4
7
作者 Slim Hachicha Maher Kharrat Abdessattar Chaari 《International Journal of Automation and computing》 EI CSCD 2014年第1期30-38,共9页
In this paper,an analysis for ill conditioning problem in subspace identifcation method is provided.The subspace identifcation technique presents a satisfactory robustness in the parameter estimation of process model ... In this paper,an analysis for ill conditioning problem in subspace identifcation method is provided.The subspace identifcation technique presents a satisfactory robustness in the parameter estimation of process model which performs control.As a frst step,the main geometric and mathematical tools used in subspace identifcation are briefly presented.In the second step,the problem of analyzing ill-conditioning matrices in the subspace identifcation method is considered.To illustrate this situation,a simulation study of an example is introduced to show the ill-conditioning in subspace identifcation.Algorithms numerical subspace state space system identifcation(N4SID)and multivariable output error state space model identifcation(MOESP)are considered to study,the parameters estimation while using the induction motor model,in simulation(Matlab environment).Finally,we show the inadequacy of the oblique projection and validate the efectiveness of the orthogonal projection approach which is needed in ill-conditioning;a real application dealing with induction motor parameters estimation has been experimented.The obtained results proved that the algorithm based on orthogonal projection MOESP,overcomes the situation of ill-conditioning in the Hankel s block,and thereby improving the estimation of parameters. 展开更多
关键词 Subspace identification ILL-COnDITIOnInG oblique projection orthogonal projection algorithms numerical subspace state space system identification (n4SID) multivariable output error state space model identification (MOESP) induction motor
原文传递
A Bit-level Text Compression Scheme Based on the ACW Algorithm
8
作者 Hussein Al-Bahadili Shakir M. Hussain 《International Journal of Automation and computing》 EI 2010年第1期123-131,共9页
This paper presents a description and performance evaluation of a new bit-level, lossless, adaptive, and asymmetric data compression scheme that is based on the adaptive character wordlength (ACW(n)) algorithm. Th... This paper presents a description and performance evaluation of a new bit-level, lossless, adaptive, and asymmetric data compression scheme that is based on the adaptive character wordlength (ACW(n)) algorithm. The proposed scheme enhances the compression ratio of the ACW(n) algorithm by dividing the binary sequence into a number of subsequences (s), each of them satisfying the condition that the number of decimal values (d) of the n-bit length characters is equal to or less than 256. Therefore, the new scheme is referred to as ACW(n, s), where n is the adaptive character wordlength and s is the number of subsequences. The new scheme was used to compress a number of text files from standard corpora. The obtained results demonstrate that the ACW(n, s) scheme achieves higher compression ratio than many widely used compression algorithms and it achieves a competitive performance compared to state-of-the-art compression tools. 展开更多
关键词 Data compression bit-level text compression ACW(n algorithm Huffman coding adaptive coding
在线阅读 下载PDF
Stochastic Design of Enhanced Network Management Architecture and Algorithmic Implementations 被引量:1
9
作者 Song-Kyoo Kim 《American Journal of Operations Research》 2013年第1期87-93,共7页
The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of b... The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of backup servers are also considered. The remote backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network. A Virtual Private Network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The remote backup servers also replace broken main severs immediately under the different conditions with local backups. When the system performs a mandatory routine maintenance of main and local backup servers, auxiliary servers from other location are being used for backups during idle periods. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems. The operational workflow give the guidelines for the actual implementations. 展开更多
关键词 STOCHASTIC network Management n-POLICY CLOSED QUEUE algorithmic Implementation STOCHASTIC Optimization
在线阅读 下载PDF
Algorithm for Visualization of Zero Divisor Graphs of the Ring ℤn Using MAPLE Coding
10
作者 Nasir Ali 《Open Journal of Discrete Mathematics》 2024年第1期1-8,共8页
This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study ... This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations. 展开更多
关键词 Zero Divisor Graph Ring Theory Maple algorithm n Modulo n Graph Theory Mathematical Computing
在线阅读 下载PDF
Optimization of Linear Consecutive-k-Out-of-n Systems with Birnbaum Importance Based Ant Colony Optimization Algorithm
11
作者 WANG Wei CAI Zhiqiang +1 位作者 ZHAO Jiangbin SI Shubin 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第2期253-260,共8页
The linear consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(G))system consists of n interchangeable components that have different reliabilities.These components are arranged in a line path and different component a... The linear consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(G))system consists of n interchangeable components that have different reliabilities.These components are arranged in a line path and different component assignments change the system reliability.The optimization of Lin/Con/k/n:F(G)system is to find an optimal component assignment to maximize the system reliability.As the number of components increases,the computation time for this problem increases considerably.In this paper,we propose a Birnbaum importance-based ant colony optimization(BIACO)algorithm to obtain quasi optimal assignments for such problems.We compare its performance using the Birnbaum importance based two-stage approach(BITA)and Birnbaum importancebased genetic local search(BIGLS)algorithm from previous researches.The experimental results show that the BIACO algorithm has a good performance in the optimization of Lin/Con/k/n:F(G)system. 展开更多
关键词 LInEAR consecutive-k-out-of-n:failure(good)(Lin/Con/k/n:F(G))system ant COLOnY optimization(ACO)algorithm OPTIMIZATIOn Birnbaum importance(BI)
原文传递
基于改进DDPG算法的N-1潮流收敛智能调整方法
12
作者 陈东旭 陈胜硕 +3 位作者 许智光 李岩松 陈兴雷 刘君 《华北电力大学学报(自然科学版)》 北大核心 2025年第4期88-98,共11页
N-1状态下潮流不收敛问题对N-1校验和电网的安全运行造成极大困扰,但当前的潮流收敛研究主要集中于静态潮流,且调整方法不仅动作有效性低,也难以兼顾快速性和成功率。因此提出一种基于BNN-DS的DDPG改进算法,通过深度强化学习对N-1潮流... N-1状态下潮流不收敛问题对N-1校验和电网的安全运行造成极大困扰,但当前的潮流收敛研究主要集中于静态潮流,且调整方法不仅动作有效性低,也难以兼顾快速性和成功率。因此提出一种基于BNN-DS的DDPG改进算法,通过深度强化学习对N-1潮流不收敛网络进行智能调整。首先,根据N-1方案校验元件类型及潮流重载量等指标确定了方案的调整措施,通过广度优先算法确定调整元件组以保证动作的有效性,根据CRITIC权重法计算了多重奖励之和,据此,设计了N-1潮流收敛调整MDP模型。其次对MDP模型中所用DDPG算法进行改进,搭建了轻量BNN网络以降低计算复杂度、提高计算速度,设计了高奖励经验池以及存量判定机制以优化模型的收敛性。最后,在某分部2179节点网络和某分部12732节点网络上对改进算法进行测试验证,结果表明基于BNN-DS的DDPG改进算法比传统方法的成功率提高36.535%,平均用时减少95.01%。 展开更多
关键词 深度强化学习 n-1潮流收敛 神经网络 DDPG算法
在线阅读 下载PDF
融合N-Gram的水产养殖长文本实体关系联合抽取 被引量:1
13
作者 毕甜甜 张思佳 +3 位作者 孙旭菲 王水涛 王祎涵 安宗诗 《哈尔滨理工大学学报》 北大核心 2025年第2期91-103,共13页
针对水产养殖长文本中存在大量与目标主题无关的信息,导致模型误判和丢失有效信息的问题,提出了融合N-Gram的水产养殖长文本实体关系联合抽取方法。该方法首先采用多模型融合算法提取基于BERT初始化的文本矩阵特征图,进一步利用级联BiL... 针对水产养殖长文本中存在大量与目标主题无关的信息,导致模型误判和丢失有效信息的问题,提出了融合N-Gram的水产养殖长文本实体关系联合抽取方法。该方法首先采用多模型融合算法提取基于BERT初始化的文本矩阵特征图,进一步利用级联BiLSTM提取深层次特征。然后逐层提取融合N-Gram算法预处理的长文本切片矩阵特征,建模切片矩阵的相对位置和绝对位置。在自构建的水产养殖长文本数据集和SKE公共数据集上的实验效果与基准模型相比有了明显提升。实验结果表明,该方法能够充分获取并处理水产养殖长文本中的语义信息,有效提高了实体关系抽取的准确性和完整性。 展开更多
关键词 水产养殖 长文本 实体关系联合抽取 n-Gram算法 多模型融合算法
在线阅读 下载PDF
PARALLEL(M-N) SVD ALGORITHMS ON THE SIMD COMPUTERS
14
作者 Wang Guorong Wei Yimin(Dept. of Mathematics, Shanghai Normal University Shanghai 200234, P. R. China Institute of Mathematics, Fudan University Shanghai 200133, P. R. China) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期541-546,共6页
Let A be m by n matrix, M and N be positive definite matrices of order in and n respectively. This paper presents an efficient method for computing (M-N) singular value decomposition((M-N) SVD) of A on a cube connecte... Let A be m by n matrix, M and N be positive definite matrices of order in and n respectively. This paper presents an efficient method for computing (M-N) singular value decomposition((M-N) SVD) of A on a cube connected single instruction stream-multiple data stream(SIMD) parallel computer. This method is based on a one-sided orthogonalization algorithm due to Hestenes. On the cube connected SIMD parallel computer with o(n) processors, the (M -- N) SVD of a matrix A requires a computation time of o(m3 log m/n). 展开更多
关键词 Parallel algorithm cube connected SIMD machine (M-n) SVD.
在线阅读 下载PDF
Collusion detector based on G-N algorithm for trust model
15
作者 Lin Zhang Na Yin +1 位作者 Jingwen Liu Ruchuan Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. 展开更多
关键词 trust model collusion detector G-n algorithm
在线阅读 下载PDF
基于EFN-YOLO的钢管表面缺陷检测
16
作者 马自勇 屈言森 +2 位作者 马立东 张之腾 孔世武 《组合机床与自动化加工技术》 北大核心 2025年第1期195-200,共6页
针对目前钢管表面缺陷视觉检测方法存在小目标缺陷难以识别的问题,提出一种基于EFN-YOLO的缺陷实时检测方法。首先,结合NWD度量和Iou loss,提出改进型N-iou loss,增强小缺陷目标的感知能力;其次,采用Efficient Former特征提取模块嵌入... 针对目前钢管表面缺陷视觉检测方法存在小目标缺陷难以识别的问题,提出一种基于EFN-YOLO的缺陷实时检测方法。首先,结合NWD度量和Iou loss,提出改进型N-iou loss,增强小缺陷目标的感知能力;其次,采用Efficient Former特征提取模块嵌入主干网络融合局部和全局特征信息,提高对细小且聚集缺陷目标的识别能力;接着,采用轻量化C2f特征提取模块替换原Yolov5的C3层,降低模型的参数量和复杂度,丰富图像的梯度流信息;最后,结合现场采集的钢管表面缺陷图片,对检测方法进行试验验证。结果表明,相较于改进前检测方法的mAP值提升5.8%,有效提升钢管表面细小缺陷检测能力,且FPS达到31,完全满足工业现场实时检测要求。 展开更多
关键词 钢管 小目标缺陷 YOLOv5 n-iou loss efficient former 深度学习
在线阅读 下载PDF
(n,k)-排列图的t/s诊断度与t/s诊断算法研究
17
作者 张世豪 冷明 《计算机科学》 北大核心 2025年第S1期893-901,共9页
鉴于多处理器系统中日益严峻的故障风险挑战,特别是在超级计算机领域,如何有效提升系统的可靠性和容错能力成为了亟待解决的关键问题。(n,k)-排列图作为一种新型的互连网络拓扑结构应运而生,它是基于星图网络的推广和变形。它在保留星... 鉴于多处理器系统中日益严峻的故障风险挑战,特别是在超级计算机领域,如何有效提升系统的可靠性和容错能力成为了亟待解决的关键问题。(n,k)-排列图作为一种新型的互连网络拓扑结构应运而生,它是基于星图网络的推广和变形。它在保留星图网络原有的对称性和容错性的同时,具有更好的灵活性。目前对于(n,k)-排列图的可靠性研究尚不全面。基于此,展开了对(n,k)-排列图的t/s和t/s诊断算法研究。首先,给出了(n,k)-排列图的系列拓扑性质;然后,度量了(n,k)-排列图在PMC(Preparata,Metze,Chien)模型下的t/s诊断度;最后,设计了一个时间复杂度为O(N log2N)的快速诊断算法,用于识别(n,k)-排列图的所有故障结点。(n,k)-排列图的t/s诊断度被确定,进一步完善了(n,k)-排列图网络的可靠性指标,为其在应用和推广中的可靠性提供了重要的依据。 展开更多
关键词 可靠性 t/s诊断度 t/s诊断算法 (n k)-排列图 PMC模型
在线阅读 下载PDF
HL-LHC运行下N-subjettiness喷注子结构算法的应用
18
作者 杨硕 王宝霞 +1 位作者 周笑然 赵子墨 《辽宁师范大学学报(自然科学版)》 2025年第3期381-385,共5页
在粒子笺理领域,喷注子结构技术可以有效识别大增速强子衰变的大质量粒子,如W玻色子和顶夸克.本文介绍了喷注子结构标记算法N-subjettiness并将其应用在高亮度大型强子对撞机(HL-LHC)上pp→W'→WZ,pp→Z'→tt过程的唯象研究中.... 在粒子笺理领域,喷注子结构技术可以有效识别大增速强子衰变的大质量粒子,如W玻色子和顶夸克.本文介绍了喷注子结构标记算法N-subjettiness并将其应用在高亮度大型强子对撞机(HL-LHC)上pp→W'→WZ,pp→Z'→tt过程的唯象研究中.模拟结果表明在以上过程中,使用N-subjettiness标记算法能有效降低QCD背景噪声的干扰,有助于提取超出标准模型的新物理信号. 展开更多
关键词 n-subjettiness 喷注子结构算法 喷注
在线阅读 下载PDF
基于NFC通信的机电设备开关状态智能监控系统设计 被引量:1
19
作者 秦雷 余鹏飞 龚磊 《日用电器》 2025年第5期133-136,143,共5页
本文设计了一种基于NFC通信的机电设备开关状态智能监控系统,构建多层系统架构,融合电流、磁场和位移三维感知,实现设备状态的精准识别与远程监控。系统采用改进的状态判别算法和抗干扰设计,有效提升了识别准确率和通信稳定性。实验验... 本文设计了一种基于NFC通信的机电设备开关状态智能监控系统,构建多层系统架构,融合电流、磁场和位移三维感知,实现设备状态的精准识别与远程监控。系统采用改进的状态判别算法和抗干扰设计,有效提升了识别准确率和通信稳定性。实验验证表明,该系统具有高可靠性、低功耗和良好的环境适应性,适用于复杂工业现场的智能监测需求。 展开更多
关键词 nFC通信 开关状态监控 多传感器融合 状态识别算法
在线阅读 下载PDF
基于神经网络的1 N推力器组件电磁阀关时间预测
20
作者 陈阳 《航天器环境工程》 2025年第5期566-573,共8页
1 N推力器组件电磁阀的开关性能是影响卫星推进系统可靠性的关键因素。低温环境测试下的关时间超标会导致研制周期延误与成本增加,因此,需要建立高精度预测模型以实现风险预警。文章基于194台1 N推力器组件的生产测试数据,选取21项电磁... 1 N推力器组件电磁阀的开关性能是影响卫星推进系统可靠性的关键因素。低温环境测试下的关时间超标会导致研制周期延误与成本增加,因此,需要建立高精度预测模型以实现风险预警。文章基于194台1 N推力器组件的生产测试数据,选取21项电磁阀关键参数作为输入,以低温关时间为输出,分别构建反向传播(BP)神经网络和卷积神经网络(CNN)预测模型。误差参数的对比评估表明,BP神经网络模型预测精度显著优于CNN模型,其全连接结构更适用于此类小规模、物理规律明确的工程数据。BP神经网络在航天部件性能预测方面有良好的应用前景,可为研制流程中的参数优化与风险防控提供数据支撑,从而提升研制效率与产品可靠性。 展开更多
关键词 1 n推力器组件 电磁阀关时间 预测模型 BP算法 卷积神经网络模型
在线阅读 下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部