期刊文献+
共找到8,600篇文章
< 1 2 250 >
每页显示 20 50 100
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems 被引量:2
1
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
在线阅读 下载PDF
A Power Data Anomaly Detection Model Based on Deep Learning with Adaptive Feature Fusion
2
作者 Xiu Liu Liang Gu +3 位作者 Xin Gong Long An Xurui Gao Juying Wu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4045-4061,共17页
With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve suffi... With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve sufficient extraction of data features,which seriously affects the accuracy and performance of anomaly detection.Therefore,this paper proposes a deep learning-based anomaly detection model for power data,which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction.Aiming at the distribution variability of power data,this paper developed a sliding window-based data adjustment method for this model,which solves the problem of high-dimensional feature noise and low-dimensional missing data.To address the problem of insufficient feature fusion,an adaptive feature fusion method based on feature dimension reduction and dictionary learning is proposed to improve the anomaly data detection accuracy of the model.In order to verify the effectiveness of the proposed method,we conducted effectiveness comparisons through elimination experiments.The experimental results show that compared with the traditional anomaly detection methods,the method proposed in this paper not only has an advantage in model accuracy,but also reduces the amount of parameter calculation of the model in the process of feature matching and improves the detection speed. 展开更多
关键词 data alignment dimension reduction feature fusion data anomaly detection deep learning
在线阅读 下载PDF
Data Analysis Methods and Signal Processing Techniques in Gravitational Wave Detection
3
作者 Bojun Yan 《Journal of Applied Mathematics and Physics》 2024年第11期3774-3783,共10页
Gravitational wave detection is one of the most cutting-edge research areas in modern physics, with its success relying on advanced data analysis and signal processing techniques. This study provides a comprehensive r... Gravitational wave detection is one of the most cutting-edge research areas in modern physics, with its success relying on advanced data analysis and signal processing techniques. This study provides a comprehensive review of data analysis methods and signal processing techniques in gravitational wave detection. The research begins by introducing the characteristics of gravitational wave signals and the challenges faced in their detection, such as extremely low signal-to-noise ratios and complex noise backgrounds. It then systematically analyzes the application of time-frequency analysis methods in extracting transient gravitational wave signals, including wavelet transforms and Hilbert-Huang transforms. The study focuses on discussing the crucial role of matched filtering techniques in improving signal detection sensitivity and explores strategies for template bank optimization. Additionally, the research evaluates the potential of machine learning algorithms, especially deep learning networks, in rapidly identifying and classifying gravitational wave events. The study also analyzes the application of Bayesian inference methods in parameter estimation and model selection, as well as their advantages in handling uncertainties. However, the research also points out the challenges faced by current technologies, such as dealing with non-Gaussian noise and improving computational efficiency. To address these issues, the study proposes a hybrid analysis framework combining physical models and data-driven methods. Finally, the research looks ahead to the potential applications of quantum computing in future gravitational wave data analysis. This study provides a comprehensive theoretical foundation for the optimization and innovation of gravitational wave data analysis methods, contributing to the advancement of gravitational wave astronomy. 展开更多
关键词 Gravitational Wave detection data Analysis Signal Processing Matched Filtering Machine Learning
在线阅读 下载PDF
Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation
4
作者 Xiaogang Yuan Huan Pei Yanlin Wu 《Computers, Materials & Continua》 2025年第9期5555-5575,共21页
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili... In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value. 展开更多
关键词 Wireless sensor networks intrusion detection dynamic trust evaluation data noise detection trust recovery mechanism
在线阅读 下载PDF
Application Technologies and Challenges of Big Data Analytics in Anti-Money Laundering and Financial Fraud Detection
5
作者 Haoran Jiang 《Open Journal of Applied Sciences》 2024年第11期3226-3236,共11页
As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and cha... As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies. 展开更多
关键词 Big data Analytics Anti-Money Laundering Financial Fraud detection Machine Learning Regulatory Technology
在线阅读 下载PDF
ADS-B Anomaly Data Detection Model Based on Deep Learning and Difference of Gaussian Approach 被引量:6
6
作者 WANG Ershen SONG Yuanshang +5 位作者 XU Song GUO Jing HONG Chen QU Pingping PANG Tao ZHANG Jiantong 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第4期550-561,共12页
Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for position... Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for positioning of general aviation aircraft.Aim to acquire the accurate position information of aircraft and detect anomaly data,the ADS-B anomaly data detection model based on deep learning and difference of Gaussian(DoG)approach is proposed.First,according to the characteristic of ADS-B data,the ADS-B position data are transformed into the coordinate system.And the origin of the coordinate system is set up as the take-off point.Then,based on the kinematic principle,the ADS-B anomaly data can be removed.Moreover,the details of the ADS-B position data can be got by the DoG approach.Finally,the long short-term memory(LSTM)neural network is used to optimize the recurrent neural network(RNN)with severe gradient reduction for processing ADS-B data.The position data of ADS-B are reconstructed by the sequence to sequence(seq2seq)model which is composed of LSTM neural network,and the reconstruction error is used to detect the anomalous data.Based on the real flight data of general aviation aircraft,the simulation results show that the anomaly data can be detected effectively by the proposed method of reconstructing ADS-B data with the seq2seq model,and its running time is reduced.Compared with the RNN,the accuracy of anomaly detection is increased by 2.7%.The performance of the proposed model is better than that of the traditional anomaly detection models. 展开更多
关键词 general aviation aircraft automatic dependent surveillance-broadcast(ADS-B) anomaly data detection deep learning difference of Gaussian(DoG) long short-term memory(LSTM)
在线阅读 下载PDF
Anomaly Detection Algorithm for Stay Cable Monitoring Data Based on Data Fusion 被引量:2
7
作者 Xiaoling Liu Qiao Huang Yuan Ren 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2016年第3期39-43,共5页
In order to improve the accuracy and consistency of data in health monitoring system,an anomaly detection algorithm for stay cables based on data fusion is proposed.The monitoring data of Nanjing No.3 Yangtze River Br... In order to improve the accuracy and consistency of data in health monitoring system,an anomaly detection algorithm for stay cables based on data fusion is proposed.The monitoring data of Nanjing No.3 Yangtze River Bridge is used as the basis of study.Firstly,an adaptive processing framework with feedback control is established based on the concept of data fusion.The data processing contains four steps:data specification,data cleaning,data conversion and data fusion.Data processing information offers feedback to the original data system,which further gives guidance for the sensor maintenance or replacement.Subsequently,the algorithm steps based on the continuous data distortion is investigated,which integrates the inspection data and the distribution test method.Finally,a group of cable force data is utilized as an example to verify the established framework and algorithm.Experimental results show that the proposed algorithm can achieve high detection accuracy,providing a valuable reference for other monitoring data processing. 展开更多
关键词 stay CABLE HEALTH monitoring ANOMALY detection data fusion MANUAL inspection
在线阅读 下载PDF
A Hybrid System Approach to Robust Fault Detection for a Class of Sampled-data Systems 被引量:4
8
作者 QIU Ai-Bing WEN Cheng-Lin JIANG Bin 《自动化学报》 EI CSCD 北大核心 2010年第8期1182-1188,共7页
关键词 鲁棒故障检测 自动化系统 设计方案 采样数据
在线阅读 下载PDF
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator 被引量:1
9
作者 Kamayani Shrivastav R.P.Yadav K.C.Jain 《Digital Communications and Networks》 SCIE CSCD 2021年第1期55-61,共7页
This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Fr... This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Frequency Division Multiplexing(OFDM)receivers used for high speed and high spectral efficient wireless communication systems.The MAP cost function for joint estimation and detection is derived and optimized further with the proposed cyclic gradient descent optimization algorithm.The proposed joint estimation and detection algorithm relaxes the restriction of small PHN assumptions and utilizes the prior statistical knowledge of PHN spectral components to produce a statistically optimal solution.The frequency-domain estimation of Channel Transfer Function(CTF)in frequency selective fading makes the method simpler,compared with the estimation of Channel Impulse Response(CIR)in the time domain.Two different time-varying PHN models,produced by Free Running Oscillator(FRO)and Phase-Locked Loop(PLL)oscillator,are presented and compared for performance difference with proposed OFDM receiver.Simulation results for joint MAP channel estimation are compared with Cramer-Rao Lower Bound(CRLB),and the simulation results for joint MAP data detection are compared with“NO PHN"performance to demonstrate that the proposed joint MAP estimation and detection algorithm achieve near-optimum performance even under multipath channel fading. 展开更多
关键词 Orthogonal frequency division multiplexing Phase noise Free running oscillator Phase-locked loop oscillator Maximum a posteriori Channel estimation data detection
在线阅读 下载PDF
An Efficient Outlier Detection Approach on Weighted Data Stream Based on Minimal Rare Pattern Mining 被引量:2
10
作者 Saihua Cai Ruizhi Sun +2 位作者 Shangbo Hao Sicong Li Gang Yuan 《China Communications》 SCIE CSCD 2019年第10期83-99,共17页
The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional... The distance-based outlier detection method detects the implied outliers by calculating the distance of the points in the dataset, but the computational complexity is particularly high when processing multidimensional datasets. In addition, the traditional outlier detection method does not consider the frequency of subsets occurrence, thus, the detected outliers do not fit the definition of outliers (i.e., rarely appearing). The pattern mining-based outlier detection approaches have solved this problem, but the importance of each pattern is not taken into account in outlier detection process, so the detected outliers cannot truly reflect some actual situation. Aimed at these problems, a two-phase minimal weighted rare pattern mining-based outlier detection approach, called MWRPM-Outlier, is proposed to effectively detect outliers on the weight data stream. In particular, a method called MWRPM is proposed in the pattern mining phase to fast mine the minimal weighted rare patterns, and then two deviation factors are defined in outlier detection phase to measure the abnormal degree of each transaction on the weight data stream. Experimental results show that the proposed MWRPM-Outlier approach has excellent performance in outlier detection and MWRPM approach outperforms in weighted rare pattern mining. 展开更多
关键词 OUTLIER detection WEIGHTED data STREAM MINIMAL WEIGHTED RARE pattern MINING deviation factors
在线阅读 下载PDF
Antarctic ice-sheet near-surface snowmelt detection based on the synergy of SSM/I data and QuikSCAT data 被引量:1
11
作者 Xing-Dong Wang Xin-Wu Li +1 位作者 Cheng Wang Xin-Guang Li 《Geoscience Frontiers》 SCIE CAS CSCD 2018年第3期955-963,共9页
Microwave radiometer SSM/I data and scatterometer QuikSCAT data have been widely used for the icesheet near-surface snowmelt detection based on their sensitivity to liquid water present in snow. In order to improve th... Microwave radiometer SSM/I data and scatterometer QuikSCAT data have been widely used for the icesheet near-surface snowmelt detection based on their sensitivity to liquid water present in snow. In order to improve the Antarctic ice-sheet near-surface snowmelt detection accuracy, a new Antarctic icesheet near-surface snowmelt synergistic detection method was proposed based on the principle of complementary advantages of SSM/I data(high reliability) and QuikSCAT data(high sensitivity) by the use of edge detection model to automatically extract the edge information to get the distribution of Antarctic snowmelt onset date, snowmelt duration and snowmelt end date. The verification result shows that the proposed snowmelt synergistic detection method improves the detection accuracy from about 75% to 86% based on AWS(Automatic Weather Stations) Butler Island and Larsen Ice Shelf. The algorithm can also be applied to other regions, which provides methodological support and supplement for the global snowmelt detection. 展开更多
关键词 SNOWMELT detectION SSM/I data QUIKSCAT data SYNERGY Edge detectION model
在线阅读 下载PDF
Anomaly Detection Based on Data-Mining for Routing Attacks in Wireless Sensor Networks 被引量:2
12
作者 Song Jianhua Ma Chuanxiang 《China Communications》 SCIE CSCD 2008年第2期34-39,共6页
With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wirele... With the increasing deployment of wireless sensordevices and networks,security becomes a criticalchallenge for sensor networks.In this paper,a schemeusing data mining is proposed for routing anomalydetection in wireless sensor networks.The schemeuses the Apriori algorithm to extract traffic patternsfrom both routing table and network traffic packetsand subsequently the K-means cluster algorithmadaptively generates a detection model.Through thecombination of these two algorithms,routing attackscan be detected effectively and automatically.Themain advantage of the proposed approach is that it isable to detect new attacks that have not previouslybeen seen.Moreover,the proposed detection schemeis based on no priori knowledge and then can beapplied to a wide range of different sensor networksfor a variety of routing attacks. 展开更多
关键词 ANOMALY detection ROUTING ATTACKS data-MINING WIRELESS sensor networks
在线阅读 下载PDF
Fault detection observer design for networked control system with long time-delays and data packet dropout 被引量:3
13
作者 Xuan Li Xiaobei Wu +1 位作者 Zhiliang Xu Cheng Huang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第5期877-882,共6页
Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,th... Focusing on the networked control system with long time-delays and data packet dropout,the problem of observerbased fault detection of the system is studied.According to conditions of data arrival of the controller,the state observers of the system are designed to detect faults when they occur in the system.When the system is normal,the observers system is modeled as an uncertain switched system.Based on the model,stability condition of the whole system is given.When conditions are satisfied,the system is asymptotically stable.When a fault occurs,the observers residual can change rapidly to detect the fault.A numerical example shows the effectiveness of the proposed method. 展开更多
关键词 networked control system fault detection long timedelays data packet dropout.
在线阅读 下载PDF
Top-k Outlier Detection from Uncertain Data 被引量:2
14
作者 Salman Ahmed Shaikh Hiroyuki Kitagawa 《International Journal of Automation and computing》 EI CSCD 2014年第2期128-142,共15页
Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclu... Uncertain data are common due to the increasing usage of sensors, radio frequency identification(RFID), GPS and similar devices for data collection. The causes of uncertainty include limitations of measurements, inclusion of noise, inconsistent supply voltage and delay or loss of data in transfer. In order to manage, query or mine such data, data uncertainty needs to be considered. Hence,this paper studies the problem of top-k distance-based outlier detection from uncertain data objects. In this work, an uncertain object is modelled by a probability density function of a Gaussian distribution. The naive approach of distance-based outlier detection makes use of nested loop. This approach is very costly due to the expensive distance function between two uncertain objects. Therefore,a populated-cells list(PC-list) approach of outlier detection is proposed. Using the PC-list, the proposed top-k outlier detection algorithm needs to consider only a fraction of dataset objects and hence quickly identifies candidate objects for top-k outliers. Two approximate top-k outlier detection algorithms are presented to further increase the efficiency of the top-k outlier detection algorithm.An extensive empirical study on synthetic and real datasets is also presented to prove the accuracy, efficiency and scalability of the proposed algorithms. 展开更多
关键词 Top-k distance-based outlier detection uncertain data Gaussian uncertainty cell-based approach PC-list based approach
原文传递
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
15
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
LMMSE-based SAGE channel estimation and data detection joint algorithm for MIMO-OFDM system 被引量:1
16
作者 申京 Wu Muqing 《High Technology Letters》 EI CAS 2012年第2期195-201,共7页
A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE... A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance. 展开更多
关键词 multi-input multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) linear minimum mean square error (LMMSE) space-alternating generalized expectation-maximization (SAGE) ITERATION channel estimation data detection joint algorithm.
在线阅读 下载PDF
Application of Data Mining Technology to Intrusion Detection System 被引量:1
17
作者 XIA Hongxia SHEN Qi HAO Rui 《通讯和计算机(中英文版)》 2005年第3期29-33,55,共6页
关键词 侦察技术 数据库 信息技术 计算机技术
在线阅读 下载PDF
Temporal-spatial dynamic characteristics of vehicle emissions on intercity roads in Guangdong Province based on vehicle identity detection data
18
作者 Hui Ding Yongming Zhao +2 位作者 Shenhua Miao Tong Chen Yonghong Liu 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2023年第8期126-138,共13页
Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics ... Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics of air pollutants(CO,HC,NO_(X),PM_(2.5))on the intercity road network of Guangdong Province by vehicle categories and road links were revealed based on vehicle identity detection data in real-life traffic for each hour in July 2018.The results showed that the spatial diversity of emissions caused by the unbalanced economywas obvious.The vehicle emissions in the Pearl River Delta region(PRD)with a higher economic level were approximately 1–2 times those in the non-Pearl RiverDelta region(non-PRD).Provincial roads with high loads became potential sources of high emissions.Therefore,emission control policies must emphasize the PRD and key roads by travel guidance to achieve greater reduction.Gasoline passenger cars with a large proportion of traffic dominated morning and evening peaks in the 24-hour period and were the dominant contributors to CO and HC emissions,contributing more than 50%in the daytime(7:00–23:00)and higher than 26%at night(0:00–6:00).Diesel trucks made up 10%of traffic,but were the dominant player at night,contributed 50%–90%to NO_(X) and PM_(2.5) emissions,with amarked 24-hour change rule of more than 80%at night(23:00–5:00)and less than 60%during daytime.Therefore,targeted control measures by time-section should be set up on collaborative control.These findings provide time-varying decision support for variable vehicle emission control on a large scale. 展开更多
关键词 Intercity roads Dynamic vehicle emissions Vehicle identity detection data Diesel trucks
原文传递
Sequence detection data fusion with distributed multisensor
19
作者 王祁 聂伟 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1999年第3期57-60,共4页
This Paper presents a data fusion method with distributed sequence detection for on hypothasis testingtheory including the data fusion algorithm of sequence detection based on least error probability rule, the decisio... This Paper presents a data fusion method with distributed sequence detection for on hypothasis testingtheory including the data fusion algorithm of sequence detection based on least error probability rule, the decision ruleand the calcation formula of the detction times and the simulation result of system performance as well. 展开更多
关键词 DISTRIBUTED SEQUENCE detection data FUSION hypotheses TESTING THEORY
在线阅读 下载PDF
MA-IDS: A Distributed Intrusion Detection System Based on Data Mining
20
作者 SUNJian-hua JINHai CHENHao HANZong-fen 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期111-114,共4页
Aiming at the shortcomings in intrusion detection systems (IDSs) used incommercial and research fields, we propose the MA-IDS system, a distributed intrusion detectionsystem based on data mining. In this model, misuse... Aiming at the shortcomings in intrusion detection systems (IDSs) used incommercial and research fields, we propose the MA-IDS system, a distributed intrusion detectionsystem based on data mining. In this model, misuse intrusion detection system CM1DS) and anomalyintrusion de-lection system (AIDS) are combined. Data mining is applied to raise detectionperformance, and distributed mechanism is employed to increase the scalability and efficiency. Host-and network-based mining algorithms employ an improved. Bayes-ian decision theorem that suits forreal security environment to minimize the risks incurred by false decisions. We describe the overallarchitecture of the MA-IDS system, and discuss specific design and implementation issue. 展开更多
关键词 intrusion detection data mining distributed system
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部