期刊文献+
共找到1,156篇文章
< 1 2 58 >
每页显示 20 50 100
Infrared road object detection algorithm based on spatial depth channel attention network and improved YOLOv8
1
作者 LI Song SHI Tao +1 位作者 JING Fangke CUI Jie 《Optoelectronics Letters》 2025年第8期491-498,共8页
Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm f... Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance. 展开更多
关键词 feature pyramid network infrared road object detection infrared imagesf yolov backbone networks channel attention mechanism spatial depth channel attention network object detection improved YOLOv
原文传递
Nonlinear Correction of Pressure Sensor Based on Depth Neural Network 被引量:1
2
作者 Yanming Wang Kebin Jia Pengyu Liu 《Journal on Internet of Things》 2020年第3期109-120,共12页
With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of... With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of the tested object and the environment under test,and the nonlinear error is generated.Aiming at the difficulty of nonlinear correction of pressure sensor and the low accuracy of correction results,depth neural network model was established based on wavelet function,and Levenberg-Marquardt algorithm is used to update network parameters to realize the nonlinear correction of pressure sensor.The experimental results show that compared with the traditional neural network model,the improved depth neural network not only accelerates the convergence rate,but also improves the correction accuracy,meets the error requirements of upper-air detection,and has a good generalization ability,which can be extended to the nonlinear correction of similar sensors. 展开更多
关键词 depth neural network pressure sensor nonlinearity correction wavelet transform LM algorithm
在线阅读 下载PDF
Research of Neural Network Based on Improved PSO Algorithm for Carbonation Depth Prediction of Concrete 被引量:2
3
作者 DAI W SHUI Z H 《武汉理工大学学报》 CAS CSCD 北大核心 2010年第17期170-175,共6页
Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed wi... Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed with consideration of various factors such as unit cement consumption (C),unit water consumption (W),binder material content (B),water binder ratio (W/B ),concrete strength (MPa),rapid carbonization days (D),fly ash consumption of unit volume concrete(FA),fly ash percentage of total cementitious materials (FA%),expansion agent consumption of unit volume concrete(EA),expansion agent percentage of total cementitious materials (FA%).Gaining the data from project-experiment,a model is presented to calculate and forecast carbonation depth using neural network based on improved PSO algorithm. The calculation results indicate that this algorithm accord with the prediction carbonation depth of concrete accuracy requirements and has a better convergence and generalization,worth being popularized. 展开更多
关键词 PSO BP neural network concrete carbonation depth PREDICTION
原文传递
Application of Artificial Neural Network, Kriging, and Inverse Distance Weighting Models for Estimation of Scour Depth around Bridge Pier with Bed Sill 被引量:2
4
作者 Homayoon Seyed Rahman Keshavarzi Alireza Gazni Reza 《Journal of Software Engineering and Applications》 2010年第10期944-964,共21页
This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridg... This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridge piers. As part of this study, bridge piers were installed with bed sills at the bed of an experimental flume. Experimental tests were conducted under different flow conditions and varying distances between bridge pier and bed sill. The ANN, OK and IDW models were applied to the experimental data and it was shown that the artificial neural network model predicts local scour depth more accurately than the kriging and inverse distance weighting models. It was found that the ANN with two hidden layers was the optimum model to predict local scour depth. The results from the sixth test case showed that the ANN with one hidden layer and 17 hidden nodes was the best model to predict local scour depth. Whereas the results from the fifth test case found that the ANN with three hidden layers was the best model to predict local scour depth. 展开更多
关键词 Artificial Neural network SCOUR depth Ordinary KRIGING INVERSE Distance Weighting Bridge PIERS
在线阅读 下载PDF
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 被引量:1
5
作者 Rodney Alexander 《Journal of Information Security》 2020年第4期261-291,共31页
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th... The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables). 展开更多
关键词 Information Assurance Defense in depth Information Technology network Security CYBERSECURITY Linear Regression Analysis PANDEMIC
在线阅读 下载PDF
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth 被引量:2
6
作者 Lance Cleghorn 《Journal of Information Security》 2013年第3期144-149,共6页
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo... The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations. 展开更多
关键词 DEFENSE in depth DEFENSE in BREADTH network DEFENSE SECURITY Architecture DEFENSE METHODOLOGY Information ASSURANCE
暂未订购
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
7
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 Information Assurance Bayesian networks Influence Diagrams Defense in depth Information Technology network Security CYBERSECURITY
在线阅读 下载PDF
LpDepth:基于拉普拉斯金字塔的自监督单目深度估计
8
作者 曹明伟 邢景杰 +1 位作者 程宜风 赵海锋 《计算机科学》 北大核心 2025年第3期33-40,共8页
自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影... 自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影响深度图的精度。针对上述问题,提出一种基于拉普拉斯金字塔的自监督单目深度估计方法(Self-supervised Monocular Depth Estimation Based on the Laplace Pyramid,LpDepth)。此方法的核心思想是:首先,使用拉普拉斯残差图丰富编码特征,以弥补在下采样过程中丢失的特征信息;其次,在下采样过程中使用最大池化层突显和放大特征信息,使编码器在特征提取过程中更容易地提取到训练模型所需要的特征信息;最后,使用残差模块解决过拟合问题,提高解码器对特征的利用效率。在KITTI和Make3D等数据集上对所提方法进行了测试,同时将其与现有经典方法进行了比较。实验结果证明了所提方法的有效性。 展开更多
关键词 单目深度估计 拉普拉斯金字塔 残差网络 深度图
在线阅读 下载PDF
Fuzzy neural networks for control of penetration depthduring GTAW
9
作者 高向东 黄石生 余英林 《China Welding》 EI CAS 2000年第1期3-10,共8页
An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this... An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this paper. The discussion is mainly focused on two parts. One is the modeling of the penetration depth with NN. A visual sensor CCD is used to obtain the image of the molten pool. A neural network model is established to estimate the penetration depth from the welding current, pool width and seam gap. It is demonstrated that the proposed neural network can produce highly complex nonlinear multi variable model of the GTAW process that offer the accurate prediction of welding penetration depth. Another is the control for the penetration depth with FC.A self adjusting fuzzy controller is proposed,which used for controlling the penetration depth.The control parameters are adjusted on line automatically according to the controlling errors of penetration and the errors can be decreased sharply. The effectiveness of the proposed intelligent methods is demonstrated by the real experiments and the improved performance results are obtained. 展开更多
关键词 neural network fuzzy controller GTAW penetration depth CCD
在线阅读 下载PDF
Hand segmentation from a single depth image based on histogram threshold selection and shallow CNN 被引量:1
10
作者 XU Zhengze ZHANG Wenjun 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2018年第5期675-685,共11页
Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the ha... Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms). 展开更多
关键词 HAND SEGMENTATION HISTOGRAM THRESHOLD selection convolutional neural network(CNN) depth map
在线阅读 下载PDF
Fast Multi-Pattern Matching Algorithm on Compressed Network Traffic 被引量:2
11
作者 Hao Peng Jianxin Li +1 位作者 Bo Li M.Hassan Arif 《China Communications》 SCIE CSCD 2016年第5期141-150,共10页
Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck ... Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck for multi-pattern matching on online compressed network traffic(CNT), this is because malicious and intrusion codes are often embedded into compressed network traffic. In this paper, we propose an online fast and multi-pattern matching algorithm on compressed network traffic(FMMCN). FMMCN employs two types of jumping, i.e. jumping during sliding window and a string jump scanning strategy to skip unnecessary compressed bytes. Moreover, FMMCN has the ability to efficiently process multiple large volume of networks such as HTTP traffic, vehicles traffic, and other Internet-based services. The experimental results show that FMMCN can ignore more than 89.5% of bytes, and its maximum speed reaches 176.470MB/s in a midrange switches device, which is faster than the current fastest algorithm ACCH by almost 73.15 MB/s. 展开更多
关键词 compressed network traffic network security multiple pattern matching skip scanning depth of boundary
在线阅读 下载PDF
A Solution for Scalable Routing in Depth Divisions-Based DUSNs via Adding a Scalable Parameter to Control Depth Clusters: Creating an Energy Efficient and Low Delay NI-Independent Communication Protocol 被引量:3
12
作者 Mohammad Reza Khosravi Reza Salari Habib Rostami 《Journal of Computer and Communications》 2016年第7期55-61,共7页
Due to effectiveness of network layer on general performance of networks, designing routing protocols is very important for lifetime and traffic efficiency in wireless sensor networks. So in this paper, we are going t... Due to effectiveness of network layer on general performance of networks, designing routing protocols is very important for lifetime and traffic efficiency in wireless sensor networks. So in this paper, we are going to represent an efficient and scalable version of depth-based routing (DBR) protocol that is limited by depth divisions-policy. In fact the new version is a network information independent routing protocol for acoustic communications. Proposed method by use of depth clustering is able to reduce consumed energy and end-to-end delay in dense underwater sensor networks (DUSNs) and this issue is proved by simulation. 展开更多
关键词 network Information (NI) depth-Based Routing (DBR) Dense Underwater Sensor networks (DUSNs) Energy Efficient and Low Delay-DBR (EELD-DBR)
在线阅读 下载PDF
The integrated intelligent system for welding seam error and penetration depth identification
13
作者 张华 胡静 +1 位作者 彭绍彬 邹春华 《China Welding》 EI CAS 2003年第1期24-28,共5页
A integrated intelligent system for seam tracking and penetration control is given. The system received information of welding seam error and penetration depth from only one sensor, then, it realized seam tracking and... A integrated intelligent system for seam tracking and penetration control is given. The system received information of welding seam error and penetration depth from only one sensor, then, it realized seam tracking and penetration control simultaneously. This paper introduces constitution of the system, methods of information recognition, design of the neural fuzzy controller and results practically. 展开更多
关键词 seam tracking penetration depth identification neural network fuzzy control
在线阅读 下载PDF
ARTIFICIAL NEURAL NETWORK AND FUZZY LOGIC CONTROLLER FOR GTAW MODELING AND CONTROL 被引量:3
14
作者 Gao Xiangdong Faculty of Mechanical and Electrical Engineering,Guangdong University of Technology, Guangzhou 510090,China Huang Shisheng South China University of Technology 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2002年第1期53-56,共4页
An artificial neural network(ANN) and a self-adjusting fuzzy logiccontroller(FLC) for modeling and control of gas tungsten arc welding(GTAW) process are presented.The discussion is mainly focused on the modeling and c... An artificial neural network(ANN) and a self-adjusting fuzzy logiccontroller(FLC) for modeling and control of gas tungsten arc welding(GTAW) process are presented.The discussion is mainly focused on the modeling and control of the weld pool depth with ANN and theintelligent control for weld seam tracking with FLC. The proposed neural network can produce highlycomplex nonlinear multi-variable model of the GTAW process that offers the accurate prediction ofwelding penetration depth. A self-adjusting fuzzy controller used for seam tracking adjusts thecontrol parameters on-line automatically according to the tracking errors so that the torch positioncan be controlled accurately. 展开更多
关键词 Artificial neural network Fuzzy logic control Weld pool depth Seamtracking
在线阅读 下载PDF
基于自注意力机制和多尺度代价聚合的双目深度估计方法 被引量:1
15
作者 李恒宇 许晓俊 +2 位作者 杨小康 刘军 刘靖逸 《中国测试》 北大核心 2025年第8期122-130,共9页
针对无人系统在室外场景中细长、弱纹理等物体的深度估计困难问题,提出一种基于自注意力机制和多尺度代价聚合的双目深度估计方法。首先,利用可变形卷积和空洞金字塔卷积,改善特征提取模块的特征提取能力;其次,采用多尺度的匹配代价计算... 针对无人系统在室外场景中细长、弱纹理等物体的深度估计困难问题,提出一种基于自注意力机制和多尺度代价聚合的双目深度估计方法。首先,利用可变形卷积和空洞金字塔卷积,改善特征提取模块的特征提取能力;其次,采用多尺度的匹配代价计算,兼顾视差估计的全局连续性和细节信息;然后,匹配代价聚合模块引入自注意力机制,以解决代价体值分布不均的问题;之后,通过视差回归获得最终估计视差。最终,通过消融实验和对比实验对深度估计方法的性能进行验证。实验结果表明,在满足无人系统基本实时性的条件下,该方法使D1指标降低至1.28%,EPE指标降低至0.614像素,有效提升视差估计的精度。此外,定性评估显示,该方法在细长和低纹理物体的深度估计上取得不错的效果。 展开更多
关键词 深度估计 卷积网络 代价计算 自注意力
在线阅读 下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
16
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 INFORMATION ASSURANCE LATIN SQUARE Design Model DEFENSE in depth INFORMATION Technology network Security CYBERSECURITY
在线阅读 下载PDF
基于YOLOv8改进的跌倒检测算法:CASL-YOLO 被引量:1
17
作者 徐慧英 赵蕊 +1 位作者 朱信忠 黄晓 《浙江师范大学学报(自然科学版)》 CAS 2025年第1期36-44,共9页
跌倒对老年人危害极大,是我国65岁以上老年人致残和伤害死亡的首要原因.然而,目前主流的跌倒检测技术受环境的干扰较大,在物体遮挡、光照变化等复杂场景下的检测准确率较低,且模型的参数量和计算量较高,导致成本居高不下,不能很好地部... 跌倒对老年人危害极大,是我国65岁以上老年人致残和伤害死亡的首要原因.然而,目前主流的跌倒检测技术受环境的干扰较大,在物体遮挡、光照变化等复杂场景下的检测准确率较低,且模型的参数量和计算量较高,导致成本居高不下,不能很好地部署应用于实际生活场景.针对上述问题,提出了一种在复杂环境下轻量级的基于YOLOv8模型改进的跌倒检测算法:CASL-YOLO.首先,该模型引入空间深度卷积(SPD-Conv)模块替代传统卷积模块,通过对每个特征映射进行卷积操作,保留通道维度中的全部信息,从而提高模型在低分辨率图像和小物体检测方面的性能;其次,引入基于位置信息的注意力机制,以捕获跨通道、方向和位置感知的信息,从而更准确地定位和识别人体目标;最后,在特征提取模块中引入选择性大卷积核(LSKNet)动态调整感受野,以有效处理跌倒检测场景中的复杂环境信息,提高网络的感知能力和检测精度.实验结果表明,在公开的Human Fall数据集上,CASL-YOLO的mAP@0.5达到96.8%,优于基线YOLOv8n,同时模型仅有3.4×MiB的参数量和11.7×10^(9)的计算量.相比其他检测算法,CASL-YOLO在参数量和计算量小幅增加的情况下,实现了更高的精度和性能,同时满足实际场景的部署要求. 展开更多
关键词 跌倒检测 YOLOv8 注意力机制 空间深度卷积 选择性大卷积核
在线阅读 下载PDF
融合灰度和深度特征的钢管表面缺陷检测方法 被引量:1
18
作者 石杰 吴昆鹏 +3 位作者 杨朝霖 邓能辉 王少聪 苏成 《机械工程学报》 北大核心 2025年第4期32-43,共12页
无缝钢管的表面缺陷检测与量化对于质量判定至关重要。然而,现有的检测方法主要依赖于灰度图像分析,缺乏对缺陷深度的综合判断,因此检测结果往往片面且不准确。为解决该问题,设计采用3D相机采集钢管表面的数据,能够同步获取到具备相同... 无缝钢管的表面缺陷检测与量化对于质量判定至关重要。然而,现有的检测方法主要依赖于灰度图像分析,缺乏对缺陷深度的综合判断,因此检测结果往往片面且不准确。为解决该问题,设计采用3D相机采集钢管表面的数据,能够同步获取到具备相同尺寸的灰度图像和点云数据,通过对点云数据的处理,可以计算出缺陷相对于基准表面的深度,并进一步量化得到伪彩色深度图像,能够直观地展示缺陷的深度信息。为了提升缺陷检测能力,在Yolov5模型的基础上添加双边网络结构,将灰度图像和伪彩色深度图像分别输入到细节分支和语义分支中提取特征,融合两分支的数据得到新的中间特征用于目标检测。试验结果表明,利用相对深度测量方法生成的伪彩色深度图像可以有效地消除抖动、扭转等情况的干扰,深度测量误差小于0.1 mm。此外,与传统的灰度图像检测模式相比,添加了双边网络结构的Yolov5模型在m AP指标上提升了4.7%,并且以108帧/s的速率满足了实时检测的要求。最终在缺陷定性分析的基础上,通过增加深度方向维度,实现了对缺陷的定量分析,不仅提升了检测的全面性,也显著提高了检测的准确度。 展开更多
关键词 缺陷检测 轮廓拟合 伪彩色深度图像 Yolov5 双边网络
原文传递
Research on Behaviour Recognition Method for Moving Target Based on Deep Convolutional Neural Network
19
作者 Jianfang Liu Hao Zheng Mengyi Liao 《Journal of Computer and Communications》 2020年第9期54-66,共13页
Aiming at the problem that the average recognition degree of the moving target line is low with the traditional motion target behaviour recognition method, a motion recognition method based on deep convolutional neura... Aiming at the problem that the average recognition degree of the moving target line is low with the traditional motion target behaviour recognition method, a motion recognition method based on deep convolutional neural network is proposed in this paper. A target model of deep convolutional neural network is constructed and the basic unit of the network is designed by using the model. By setting the unit, the returned unit is calculated into the standard density diagram, and the position of the moving target is determined by the local maximum method to realize the behavior identification of the moving target. The experimental results show that the multi-parameter SICNN256 model is slightly better than other model structures. The average recognition rate and recognition rate of the moving target behavior recognition method based on deep convolutional neural network are higher than those of the traditional method, which proves its effectiveness. Since the frequency of single target is higher than that of multiple recognition and there is no target similarity recognition, similar target error detection cannot be excluded. 展开更多
关键词 Convolutional Neural network Moving Target RECOGNITION depth
在线阅读 下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
20
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks Ad HOC security
在线阅读 下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部