期刊文献+
共找到356,040篇文章
< 1 2 250 >
每页显示 20 50 100
Multiobjective particle swarm inversion algorithm for two-dimensional magnetic data 被引量:8
1
作者 熊杰 张涛 《Applied Geophysics》 SCIE CSCD 2015年第2期127-136,273,共11页
Regularization inversion uses constraints and a regularization factor to solve ill- posed inversion problems in geophysics. The choice of the regularization factor and of the initial model is critical in regularizatio... Regularization inversion uses constraints and a regularization factor to solve ill- posed inversion problems in geophysics. The choice of the regularization factor and of the initial model is critical in regularization inversion. To deal with these problems, we propose a multiobjective particle swarm inversion (MOPSOI) algorithm to simultaneously minimize the data misfit and model constraints, and obtain a multiobjective inversion solution set without the gradient information of the objective function and the regularization factor. We then choose the optimum solution from the solution set based on the trade-off between data misfit and constraints that substitute for the regularization factor. The inversion of synthetic two-dimensional magnetic data suggests that the MOPSOI algorithm can obtain as many feasible solutions as possible; thus, deeper insights of the inversion process can be gained and more reasonable solutions can be obtained by balancing the data misfit and constraints. The proposed MOPSOI algorithm can deal with the problems of choosing the right regularization factor and the initial model. 展开更多
关键词 multiobjective inversion particle swarm optimization regularization factor global search magnetic data
在线阅读 下载PDF
Automatic modulation recognition of radiation source signals based on two-dimensional data matrix and improved residual neural network
2
作者 Guanghua Yi Xinhong Hao +3 位作者 Xiaopeng Yan Jian Dai Yangtian Liu Yanwen Han 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期364-373,共10页
Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the ... Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the AMR method of radiation source signals based on two-dimensional data matrix and improved residual neural network is proposed in this paper.First,the time series of the radiation source signals are reconstructed into two-dimensional data matrix,which greatly simplifies the signal preprocessing process.Second,the depthwise convolution and large-size convolutional kernels based residual neural network(DLRNet)is proposed to improve the feature extraction capability of the AMR model.Finally,the model performs feature extraction and classification on the two-dimensional data matrix to obtain the recognition vector that represents the signal modulation type.Theoretical analysis and simulation results show that the AMR method based on two-dimensional data matrix and improved residual network can significantly improve the accuracy of the AMR method.The recognition accuracy of the proposed method maintains a high level greater than 90% even at -14 dB SNR. 展开更多
关键词 Automatic modulation recognition Radiation source signals two-dimensional data matrix Residual neural network Depthwise convolution
在线阅读 下载PDF
CAUCHY PROBLEM FOR LINEARIZED SYSTEM OF TWO-DIMENSIONAL ISENTROPIC FLOW WITH AXISYMMETRICAL INITIAL DATA IN GAS DYNAMICS
3
作者 Zhang Hua Sheng Wancheng 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2006年第1期30-40,共11页
The explicit solution to Cauchy problem for linearized system of two-dimensional isentropic flow with axisymmetrical initial data in gas dynamics is given.
关键词 Cauchy prohlem with axisymmetrical initial data linearized system 2-D isentropic flow explicit solution.
在线阅读 下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
4
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
在线阅读 下载PDF
Image segmentation of exfoliated two-dimensional materials by generative adversarial network-based data augmentation
5
作者 程晓昱 解晨雪 +6 位作者 刘宇伦 白瑞雪 肖南海 任琰博 张喜林 马惠 蒋崇云 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期112-117,共6页
Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have b... Mechanically cleaved two-dimensional materials are random in size and thickness.Recognizing atomically thin flakes by human experts is inefficient and unsuitable for scalable production.Deep learning algorithms have been adopted as an alternative,nevertheless a major challenge is a lack of sufficient actual training images.Here we report the generation of synthetic two-dimensional materials images using StyleGAN3 to complement the dataset.DeepLabv3Plus network is trained with the synthetic images which reduces overfitting and improves recognition accuracy to over 90%.A semi-supervisory technique for labeling images is introduced to reduce manual efforts.The sharper edges recognized by this method facilitate material stacking with precise edge alignment,which benefits exploring novel properties of layered-material devices that crucially depend on the interlayer twist-angle.This feasible and efficient method allows for the rapid and high-quality manufacturing of atomically thin materials and devices. 展开更多
关键词 two-dimensional materials deep learning data augmentation generating adversarial networks
原文传递
A Composite Loss-Based Autoencoder for Accurate and Scalable Missing Data Imputation
6
作者 Thierry Mugenzi Cahit Perkgoz 《Computers, Materials & Continua》 2026年第1期1985-2005,共21页
Missing data presents a crucial challenge in data analysis,especially in high-dimensional datasets,where missing data often leads to biased conclusions and degraded model performance.In this study,we present a novel a... Missing data presents a crucial challenge in data analysis,especially in high-dimensional datasets,where missing data often leads to biased conclusions and degraded model performance.In this study,we present a novel autoencoder-based imputation framework that integrates a composite loss function to enhance robustness and precision.The proposed loss combines(i)a guided,masked mean squared error focusing on missing entries;(ii)a noise-aware regularization term to improve resilience against data corruption;and(iii)a variance penalty to encourage expressive yet stable reconstructions.We evaluate the proposed model across four missingness mechanisms,such as Missing Completely at Random,Missing at Random,Missing Not at Random,and Missing Not at Random with quantile censorship,under systematically varied feature counts,sample sizes,and missingness ratios ranging from 5%to 60%.Four publicly available real-world datasets(Stroke Prediction,Pima Indians Diabetes,Cardiovascular Disease,and Framingham Heart Study)were used,and the obtained results show that our proposed model consistently outperforms baseline methods,including traditional and deep learning-based techniques.An ablation study reveals the additive value of each component in the loss function.Additionally,we assessed the downstream utility of imputed data through classification tasks,where datasets imputed by the proposed method yielded the highest receiver operating characteristic area under the curve scores across all scenarios.The model demonstrates strong scalability and robustness,improving performance with larger datasets and higher feature counts.These results underscore the capacity of the proposed method to produce not only numerically accurate but also semantically useful imputations,making it a promising solution for robust data recovery in clinical applications. 展开更多
关键词 Missing data imputation autoencoder deep learning missing mechanisms
在线阅读 下载PDF
Advances in Machine Learning for Explainable Intrusion Detection Using Imbalance Datasets in Cybersecurity with Harris Hawks Optimization
7
作者 Amjad Rehman Tanzila Saba +2 位作者 Mona M.Jamjoom Shaha Al-Otaibi Muhammad I.Khan 《Computers, Materials & Continua》 2026年第1期1804-1818,共15页
Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness a... Modern intrusion detection systems(MIDS)face persistent challenges in coping with the rapid evolution of cyber threats,high-volume network traffic,and imbalanced datasets.Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively.This study introduces an advanced,explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets,which reflects real-world network behavior through a blend of normal and diverse attack classes.The methodology begins with sophisticated data preprocessing,incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions,ensuring standardized and model-ready inputs.Critical dimensionality reduction is achieved via the Harris Hawks Optimization(HHO)algorithm—a nature-inspired metaheuristic modeled on hawks’hunting strategies.HHO efficiently identifies the most informative features by optimizing a fitness function based on classification performance.Following feature selection,the SMOTE is applied to the training data to resolve class imbalance by synthetically augmenting underrepresented attack types.The stacked architecture is then employed,combining the strengths of XGBoost,SVM,and RF as base learners.This layered approach improves prediction robustness and generalization by balancing bias and variance across diverse classifiers.The model was evaluated using standard classification metrics:precision,recall,F1-score,and overall accuracy.The best overall performance was recorded with an accuracy of 99.44%for UNSW-NB15,demonstrating the model’s effectiveness.After balancing,the model demonstrated a clear improvement in detecting the attacks.We tested the model on four datasets to show the effectiveness of the proposed approach and performed the ablation study to check the effect of each parameter.Also,the proposed model is computationaly efficient.To support transparency and trust in decision-making,explainable AI(XAI)techniques are incorporated that provides both global and local insight into feature contributions,and offers intuitive visualizations for individual predictions.This makes it suitable for practical deployment in cybersecurity environments that demand both precision and accountability. 展开更多
关键词 Intrusion detection XAI machine learning ensemble method CYBERSECURITY imbalance data
在线阅读 下载PDF
Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images
8
作者 Kim Sao Nguyen Ngoc Dung Bui 《Computers, Materials & Continua》 2026年第1期1571-1586,共16页
Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi... Reversible data hiding(RDH)enables secret data embedding while preserving complete cover image recovery,making it crucial for applications requiring image integrity.The pixel value ordering(PVO)technique used in multi-stego images provides good image quality but often results in low embedding capability.To address these challenges,this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image.The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order.Four secret bits are embedded into each block’s maximum pixel value,while three additional bits are embedded into the second-largest value when the pixel difference exceeds a predefined threshold.A similar embedding strategy is also applied to the minimum side of the block,including the second-smallest pixel value.This design enables each block to embed up to 14 bits of secret data.Experimental results demonstrate that the proposed method achieves significantly higher embedding capacity and improved visual quality compared to existing triple-stego RDH approaches,advancing the field of reversible steganography. 展开更多
关键词 RDH reversible data hiding PVO RDH base three stego images
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
9
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Efficient Arabic Essay Scoring with Hybrid Models: Feature Selection, Data Optimization, and Performance Trade-Offs
10
作者 Mohamed Ezz Meshrif Alruily +4 位作者 Ayman Mohamed Mostafa Alaa SAlaerjan Bader Aldughayfiq Hisham Allahem Abdulaziz Shehab 《Computers, Materials & Continua》 2026年第1期2274-2301,共28页
Automated essay scoring(AES)systems have gained significant importance in educational settings,offering a scalable,efficient,and objective method for evaluating student essays.However,developing AES systems for Arabic... Automated essay scoring(AES)systems have gained significant importance in educational settings,offering a scalable,efficient,and objective method for evaluating student essays.However,developing AES systems for Arabic poses distinct challenges due to the language’s complex morphology,diglossia,and the scarcity of annotated datasets.This paper presents a hybrid approach to Arabic AES by combining text-based,vector-based,and embeddingbased similarity measures to improve essay scoring accuracy while minimizing the training data required.Using a large Arabic essay dataset categorized into thematic groups,the study conducted four experiments to evaluate the impact of feature selection,data size,and model performance.Experiment 1 established a baseline using a non-machine learning approach,selecting top-N correlated features to predict essay scores.The subsequent experiments employed 5-fold cross-validation.Experiment 2 showed that combining embedding-based,text-based,and vector-based features in a Random Forest(RF)model achieved an R2 of 88.92%and an accuracy of 83.3%within a 0.5-point tolerance.Experiment 3 further refined the feature selection process,demonstrating that 19 correlated features yielded optimal results,improving R2 to 88.95%.In Experiment 4,an optimal data efficiency training approach was introduced,where training data portions increased from 5%to 50%.The study found that using just 10%of the data achieved near-peak performance,with an R2 of 85.49%,emphasizing an effective trade-off between performance and computational costs.These findings highlight the potential of the hybrid approach for developing scalable Arabic AES systems,especially in low-resource environments,addressing linguistic challenges while ensuring efficient data usage. 展开更多
关键词 Automated essay scoring text-based features vector-based features embedding-based features feature selection optimal data efficiency
在线阅读 下载PDF
Individual Software Expertise Formalization and Assessment from Project Management Tool Databases
11
作者 Traian-Radu Plosca Alexandru-Mihai Pescaru +1 位作者 Bianca-Valeria Rus Daniel-Ioan Curiac 《Computers, Materials & Continua》 2026年第1期389-411,共23页
Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods... Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods,based on reliable existing data stored in project management tools’datasets,automating this evaluation process becomes a natural step forward.In this context,our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems.For this,we mathematically formalize two categories of expertise:technology-specific expertise,which denotes the skills required for a particular technology,and general expertise,which encapsulates overall knowledge in the software industry.Afterward,we automatically classify the zones of expertise associated with each task a developer has worked on using Bidirectional Encoder Representations from Transformers(BERT)-like transformers to handle the unique characteristics of project tool datasets effectively.Finally,our method evaluates the proficiency of each software specialist across already completed projects from both technology-specific and general perspectives.The method was experimentally validated,yielding promising results. 展开更多
关键词 Expertise formalization transformer-based models natural language processing augmented data project management tool skill classification
在线阅读 下载PDF
Research on the Construction of Vital Sign Data Sharing Based on Two-dimensional Code Technology
12
作者 LIU Lihua CAO Yunyun +2 位作者 DONG Yi HU Huahong LIU Zishan 《外文科技期刊数据库(文摘版)医药卫生》 2021年第1期551-553,共3页
Objective: to study and try to apply Internet medical technology to clinical nursing work, so as to improve clinical nursing service. Methods: a total of 100 patients in Department of general surgery and Department of... Objective: to study and try to apply Internet medical technology to clinical nursing work, so as to improve clinical nursing service. Methods: a total of 100 patients in Department of general surgery and Department of orthopedics were collected. The data of temperature, blood pressure, pulse and respiration were collected and uploaded to the cloud database. Make the website QR code as the only identification mark of the patient. The QR code corresponds to the home page of the patient's vital signs browsing, and automatically refresh the home page to search the real-time vital signs data in the cloud. The QR code is posted on the bedside card for scanning or forwarding. Then investigate the satisfaction of family members and medical staff. Results: to realize the integration of Internet technology and clinical nursing service, and make the patient's condition information public to the family members, so as to explore a new model of clinical nursing based on Internet technology. 展开更多
关键词 QR code vital signs NURSING data
在线阅读 下载PDF
A Convolutional Neural Network-Based Deep Support Vector Machine for Parkinson’s Disease Detection with Small-Scale and Imbalanced Datasets
13
作者 Kwok Tai Chui Varsha Arya +2 位作者 Brij B.Gupta Miguel Torres-Ruiz Razaz Waheeb Attar 《Computers, Materials & Continua》 2026年第1期1410-1432,共23页
Parkinson’s disease(PD)is a debilitating neurological disorder affecting over 10 million people worldwide.PD classification models using voice signals as input are common in the literature.It is believed that using d... Parkinson’s disease(PD)is a debilitating neurological disorder affecting over 10 million people worldwide.PD classification models using voice signals as input are common in the literature.It is believed that using deep learning algorithms further enhances performance;nevertheless,it is challenging due to the nature of small-scale and imbalanced PD datasets.This paper proposed a convolutional neural network-based deep support vector machine(CNN-DSVM)to automate the feature extraction process using CNN and extend the conventional SVM to a DSVM for better classification performance in small-scale PD datasets.A customized kernel function reduces the impact of biased classification towards the majority class(healthy candidates in our consideration).An improved generative adversarial network(IGAN)was designed to generate additional training data to enhance the model’s performance.For performance evaluation,the proposed algorithm achieves a sensitivity of 97.6%and a specificity of 97.3%.The performance comparison is evaluated from five perspectives,including comparisons with different data generation algorithms,feature extraction techniques,kernel functions,and existing works.Results reveal the effectiveness of the IGAN algorithm,which improves the sensitivity and specificity by 4.05%–4.72%and 4.96%–5.86%,respectively;and the effectiveness of the CNN-DSVM algorithm,which improves the sensitivity by 1.24%–57.4%and specificity by 1.04%–163%and reduces biased detection towards the majority class.The ablation experiments confirm the effectiveness of individual components.Two future research directions have also been suggested. 展开更多
关键词 Convolutional neural network data generation deep support vector machine feature extraction generative artificial intelligence imbalanced dataset medical diagnosis Parkinson’s disease small-scale dataset
在线阅读 下载PDF
COMPACTLY SUPPORTED NON-TENSOR PRODUCT FORM TWO-DIMENSION WAVELET FINITE ELEMENT 被引量:2
14
作者 金坚明 薛鹏翔 +1 位作者 徐应祥 朱亚莉 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2006年第12期1673-1686,共14页
Some theorems of compactly supported non-tensor product form two-dimension Daubechies wavelet were analysed carefully. Compactly supported non-tensor product form two-dimension wavelet was constructed, then non-tensor... Some theorems of compactly supported non-tensor product form two-dimension Daubechies wavelet were analysed carefully. Compactly supported non-tensor product form two-dimension wavelet was constructed, then non-tensor product form two dimension wavelet finite element was used to solve the deflection problem of elastic thin plate. The error order was researched. A numerical example was given at last. 展开更多
关键词 compactly supported non-tensor product two-dimension wavelet interpolation function elastic thin plate DEFLECTION finite element
在线阅读 下载PDF
Two-Dimensional Euler Adaptive Mesh Method on Detonation 被引量:1
15
作者 郝鹏程 冯其京 姚雯 《Journal of Beijing Institute of Technology》 EI CAS 2009年第2期141-145,共5页
The adaptive mesh refinement (AMR) method is applied in the 2-D Euler multi-component elasticplastic hydrodynamics code (MEPH2Y). It is applied on detonation. Firstly, the AMR method is described, including a cons... The adaptive mesh refinement (AMR) method is applied in the 2-D Euler multi-component elasticplastic hydrodynamics code (MEPH2Y). It is applied on detonation. Firstly, the AMR method is described, including a conservative spatial interpolation, the time integration methodology with the adapitve time increment and an adaptive computational region method. The advantage of AMR technique is exhibited by numerical examples, including the 1-D C-J detonation and the 2-D implosion ignited from a single point. Results show that AMR can promote the computational efficiency, keeping the accuracy in interesting regions. 展开更多
关键词 adaptive mesh refinement (AMR) DETONATION two-dimension EULER numerical simulation
在线阅读 下载PDF
The Synthesis and Structural Characterization of Two-dimensional Coordination Polymer {[Ni(phen)H_2O](μ_4-C_( 10)H_2O_8)_(1/2)}_n 被引量:1
16
作者 YE Ling PAN Cheng-ling +3 位作者 CHU De-qing WANG Li-min MU Zhong-cheng XU Ji-qing 《Chemical Research in Chinese Universities》 SCIE CAS CSCD 2002年第4期474-477,共4页
关键词 two-dimension Hydrothermal synthesis Inorganic-organic hybrid material Crystal structure
在线阅读 下载PDF
Comparison of different inversion methods of D-T_(2)two-dimensional nuclear magnetic resonance logging and applicability analysis 被引量:2
17
作者 Li Cheng-Lin Tan Mao-Jin +4 位作者 Wang Ke-Wen Feng Zhou Liu Ying-Ming Zhang Hai-Tao and Xiao Li-Zhi 《Applied Geophysics》 SCIE CSCD 2022年第2期173-184,306,307,共14页
D-T_(2)two-dimensional nuclear magnetic resonance(2D NMR)logging technology can distinguish pore fluid types intuitively,and it is widely used in oil and gas exploration.Many 2D NMR inversion methods(e.g.,truncated si... D-T_(2)two-dimensional nuclear magnetic resonance(2D NMR)logging technology can distinguish pore fluid types intuitively,and it is widely used in oil and gas exploration.Many 2D NMR inversion methods(e.g.,truncated singular value decomposition(TSVD),Butler-Reds-Dawson(BRD),LM-norm smoothing,and TIST-L1 regularization methods)have been proposed successively,but most are limited to numerical simulations.This study focused on the applicability of different inversion methods for NMR logging data of various acquisition sequences,from which the optimal inversion method was selected based on the comparative analysis.First,the two-dimensional NMR logging principle was studied.Then,these inversion methods were studied in detail,and the precision and computational efficiency of CPMG and diffusion editing(DE)sequences obtained from oil-water and gas-water models were compared,respectively.The inversion results and calculation time of truncated singular value decomposition(TSVD),Butler-Reds-Dawson(BRD),LM-norm smoothing,and TIST-L1 regularization were compared and analyzed through numerical simulations.The inversion method was optimized to process SP mode logging data from the MR Scanner instrument.The results showed that the TIST-regularization and LM-norm smoothing methods were more accurate for the CPMG and DE sequence echo trains of the oil-water and gas-water models.However,the LM-norm smoothing method was less time-consuming,making it more suitable for logging data processing.A case study in well A25 showed that the processing results by the LM-norm smoothing method were consistent with GEOLOG software.This demonstrates that the LM-norm smoothing method is applicable in practical NMR logging processing. 展开更多
关键词 two-dimensional NMR logging D-T_(2)spectrum inversion method diffusion editing sequence data processing
在线阅读 下载PDF
Two-dimensional Parameter Relationships for W UMa-type Systems Revisited 被引量:2
18
作者 Atila Poro Ehsan Paki +6 位作者 Ailar Alizadehsabegh Mehdi Khodadadilori Selda Ranjbar Salehian Mahya Hedayatjoo Fatemeh Hashemi Yasaman Dashti Fatemeh Mohammadizadeh 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2024年第1期51-58,共8页
Reviewing the empirical and theoretical parameter relationships between various parameters is a good way to understand more about contact binary systems.In this investigation,two-dimensional(2D)relationships for P–MV... Reviewing the empirical and theoretical parameter relationships between various parameters is a good way to understand more about contact binary systems.In this investigation,two-dimensional(2D)relationships for P–MV(system),P–L1,2,M1,2–L1,2,and q–Lratiowere revisited.The sample used is related to 118 contact binary systems with an orbital period shorter than 0.6 days whose absolute parameters were estimated based on the Gaia Data Release 3 parallax.We reviewed previous studies on 2D relationships and updated six parameter relationships.Therefore,Markov chain Monte Carlo and Machine Learning methods were used,and the outcomes were compared.We selected 22 contact binary systems from eight previous studies for comparison,which had light curve solutions using spectroscopic data.The results show that the systems are in good agreement with the results of this study. 展开更多
关键词 (stars:)binaries(including multiple):close stars:fundamental parameters methods:data analysis
在线阅读 下载PDF
Fast Two-dimensional Positioning Method of Crab Pulsar Based on Multiple Optimization Algorithms 被引量:1
19
作者 Jianfeng Chen Jin Liu +1 位作者 Xin Ma Xiaolin Ning 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2024年第10期92-103,共12页
In the two-dimensional positioning method of pulsars, the grid method is used to provide non-sensitive direction and positional estimates. However, the grid method has a high computational load and low accuracy due to... In the two-dimensional positioning method of pulsars, the grid method is used to provide non-sensitive direction and positional estimates. However, the grid method has a high computational load and low accuracy due to the interval of the grid. To improve estimation accuracy and reduce the computational load, we propose a fast twodimensional positioning method for the crab pulsar based on multiple optimization algorithms(FTPCO). The FTPCO uses the Levenberg–Marquardt(LM) algorithm, three-point orientation(TPO) method, particle swarm optimization(PSO) and Newton–Raphson-based optimizer(NRBO) to substitute the grid method. First, to avoid the influence of the non-sensitive direction on positioning, we take an orbital error and the distortion of the pulsar profile as optimization objectives and combine the grid method with the LM algorithm or PSO to search for the non-sensitive direction. Then, on the sensitive plane perpendicular to the non-sensitive direction, the TPO method is proposed to fast search the sensitive direction and sub-sensitive direction. Finally, the NRBO is employed on the sensitive and sub-sensitive directions to achieve two-dimensional positioning of the Crab pulsar. The simulation results show that the computational load of the FTPCO is reduced by 89.4% and the positioning accuracy of the FTPCO is improved by approximately 38% compared with the grid method. The FTPCO has the advantage of high real-time accuracy and does not fall into the local optimum. 展开更多
关键词 (stars:)pulsars:individual(Crab pulsar) space vehicles methods:data analysis ASTROMETRY
在线阅读 下载PDF
EFFECT OF SUSPENDED SOLID PARTICLES ON UNSTABILITY OF TWO-DIMENSION MIXING LAYER
20
作者 周泽宣 林建忠 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1997年第6期543-549,共7页
By considering the effect of suspended solid particles in the ordinary equations for two-dimension inviscid incompressible mixing layer, the Rayleigh equation and the modified Rayleigh equation are obtained. And then,... By considering the effect of suspended solid particles in the ordinary equations for two-dimension inviscid incompressible mixing layer, the Rayleigh equation and the modified Rayleigh equation are obtained. And then, by solving the corresponding eigen-value equations with numerical computational method, the relation curves between perturbation frequency and spacial growth rate of the mixing layer for the varying particle loading, ratio of particle velocity to fluid velocity and Stokes number are got. Sever al important conclusions on the effect of suspended solid particles on unstability of the mixing layer are presented in the end by analyzing all the relation curves. 展开更多
关键词 two-dimension mixing layer unstability suspended solid particles numerical computation
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部