期刊文献+
共找到1,146篇文章
< 1 2 58 >
每页显示 20 50 100
AI Chain-Driven Control Flow Graph Generation for Multiple Programming Language 被引量:1
1
作者 ZOU Zhou ZUO Zhengkang HUANG Qing 《Wuhan University Journal of Natural Sciences》 2025年第3期222-230,共9页
Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysi... Control Flow Graphs(CFGs)are essential for understanding the execution and data flow within software,serving as foundational structures in program analysis.Traditional CFG construction methods,such as bytecode analysis and Abstract Syntax Trees(ASTs),often face challenges due to the complex syntax of programming languages like Java and Python.This paper introduces a novel approach that leverages Large Language Models(LLMs)to generate CFGs through a methodical Chain of Thought(CoT)process.By employing CoT,the proposed approach systematically interprets code semantics directly from natural language,enhancing the adaptability across various programming languages and simplifying the CFG construction process.By implementing a modular AI chain strategy that adheres to the single responsibility principle,our approach breaks down CFG generation into distinct,manageable steps handled by separate AI and non-AI units,which can significantly improve the precision and coverage of CFG nodes and edges.The experiments with 245 Java and 281 Python code snippets from Stack Overflow demonstrate that our method achieves efficient performance on different programming languages and exhibits strong robustness. 展开更多
关键词 Control flow graph Large Language Model Chain of Thought AI chain
原文传递
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
2
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control flow graph VULNERABILITY detection algorithm
原文传递
Totally Coded Method for Signal Flow Graph Algorithm 被引量:2
3
作者 徐静波 周美华 《Journal of Donghua University(English Edition)》 EI CAS 2002年第2期63-68,共6页
After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algo... After a code-table has been established by means of node association information from signal flow graph, the totally coded method (TCM) is applied merely in the domain of code operation beyond any figure-earching algorithm. The code-series (CS) have the holo-information nature, so that both the content and the sign of each gain-term can be determined via the coded method. The principle of this method is simple and it is suited for computer programming. The capability of the computer-aided analysis for switched current network (SIN) can be enhanced. 展开更多
关键词 SIGNAL flow graph algorithm CODED method SIN.
在线阅读 下载PDF
RECONSTRUCTION OF ONE DIMENSIONAL MULTI-LAYERED MEDIA BY USING A TIME DOMAIN SIGNAL FLOW GRAPH TECHNIQUE 被引量:1
4
作者 崔铁军 梁昌洪 《Journal of Electronics(China)》 1993年第2期162-169,共8页
A novel inverse scattering method to reconstruct the permittivity profile of one-dimensional multi-layered media is proposed in this paper.Based on the equivalent network ofthe medium,a concept of time domain signal f... A novel inverse scattering method to reconstruct the permittivity profile of one-dimensional multi-layered media is proposed in this paper.Based on the equivalent network ofthe medium,a concept of time domain signal flow graph and its basic principles are introduced,from which the reflection coefficient of the medium in time domain can be shown to be a series ofDirac δ-functions(pulse responses).In terms of the pulse responses,we will reconstruct both thepermittivity and the thickness of each layer will accurately be reconstructed.Numerical examplesverify the applicability of this 展开更多
关键词 Multi-layered MEDIUM Reconstruct PERMITTIVITY profile INVERSE SCATTERING Time DOMAIN signal flow graph
在线阅读 下载PDF
Development of an Improved GUI Automation Test System Based on Event-Flow Graph 被引量:2
5
作者 Yongzhong Lu Danping Yan +1 位作者 Songlin Nie Chun Wang 《Journal of Software Engineering and Applications》 2008年第1期38-43,共6页
A more automated graphic user interface (GUI) test model, which is based on the event-flow graph, is proposed. In the model, a user interface automation API tool is first used to carry out reverse engineering for a GU... A more automated graphic user interface (GUI) test model, which is based on the event-flow graph, is proposed. In the model, a user interface automation API tool is first used to carry out reverse engineering for a GUI test sample so as to obtain the event-flow graph. Then two approaches are adopted to create GUI test sample cases. That is to say, an improved ant colony optimization (ACO) algorithm is employed to establish a sequence of testing cases in the course of the daily smoke test. The sequence goes through all object event points in the event-flow graph. On the other hand, the spanning tree obtained by deep breadth-first search (BFS) approach is utilized to obtain the testing cases from goal point to outset point in the course of the deep regression test. Finally, these cases are applied to test the new GUI. Moreover, according to the above-mentioned model, a corresponding prototype system based on Microsoft UI automation framework is developed, thus giving a more effective way to improve the GUI automation test in Windows OS. 展开更多
关键词 Automated Software TESTING graphIC User Interface Event-flow graph Regression TESTING ANT COLONY Optimization UI AUTOMATION
暂未订购
Analysis of Electronic Circuits with the Signal Flow Graph Method
6
作者 Feim Ridvan Rasim Sebastian M. Sattler 《Circuits and Systems》 2017年第11期261-274,共14页
In this work a method called “signal flow graph (SFG)” is presented. A signal-flow graph describes a system by its signal flow by directed and weighted graph;the signals are applied to nodes and functions on edges. ... In this work a method called “signal flow graph (SFG)” is presented. A signal-flow graph describes a system by its signal flow by directed and weighted graph;the signals are applied to nodes and functions on edges. The edges of the signal flow graph are small processing units, through which the incoming signals are processed in a certain form. In this case, the result is sent to the outgoing node. The SFG allows a good visual inspection into complex feedback problems. Furthermore such a presentation allows for a clear and unambiguous description of a generating system, for example, a netview. A Signal Flow Graph (SFG) allows a fast and practical network analysis based on a clear data presentation in graphic format of the mathematical linear equations of the circuit. During creation of a SFG the Direct Current-Case (DC-Case) was observed since the correct current and voltage directions was drawn from zero frequency. In addition, the mathematical axioms, which are based on field algebra, are declared. In this work we show you in addition: How we check our SFG whether it is a consistent system or not. A signal flow graph can be verified by generating the identity of the signal flow graph itself, illustrated by the inverse signal flow graph (SFG&minus;1). Two signal flow graphs are always generated from one circuit, so that the signal flow diagram already presented in previous sections corresponds to only half of the solution. The other half of the solution is the so-called identity, which represents the (SFG&minus;1). If these two graphs are superposed with one another, so called 1-edges are created at the node points. In Boolean algebra, these 1-edges are given the value 1, whereas this value can be identified with a zero in the field algebra. 展开更多
关键词 ANALOG FEEDBACK Network Theory SYMBOLIC ANALYSIS Signal flow graph TRANSFER Function
在线阅读 下载PDF
基于LA-GraphCAN的甘肃省泥石流易发性评价
7
作者 郭玲 薛晔 孙鹏翔 《地质科技通报》 北大核心 2026年第1期212-224,共13页
目前对泥石流灾害易发性相关研究尚未考虑泥石流灾害的地理位置关系以及空间依赖性。本研究构建了包含4286个正样本点和5912个负样本点的甘肃省泥石流数据集,提出了一种基于LA-GraphCAN(local augmentation graph convolutional and att... 目前对泥石流灾害易发性相关研究尚未考虑泥石流灾害的地理位置关系以及空间依赖性。本研究构建了包含4286个正样本点和5912个负样本点的甘肃省泥石流数据集,提出了一种基于LA-GraphCAN(local augmentation graph convolutional and attention network)的泥石流易发性评价方法。首先,以样本点的经纬度投影坐标为基础,利用KNN(K-nearest neighbors)构建最近邻图,捕捉泥石流灾害点之间的复杂地理位置关系;其次,使用GCN(graph convolutional network)高效聚合局部邻域信息,提取关键地理和环境特征,不仅关注单个栅格所包含的信息,还深入探讨了相邻栅格之间空间结构的相互关系,从而使模型能够更精准地识别和理解样本中的局部空间特征。同时,引入GAT(graph attention network)添加动态注意力机制,细化特征表示;再次,验证所提方法的有效性,并从不同角度对比分析;最后,对甘肃省泥石流易发性进行评价。结果表明,考虑了泥石流灾害地理位置关系的LA-GraphCAN的ROC曲线下面积(AUC)、准确率、精确率、召回率以及F1分数分别为0.9868,0.9458,0.9436,0.9228和0.9331,与主流机器学习模型CNN(convolutional neural networks)、Decision tree等相比最优。基于LA-GraphCAN评价的甘肃省泥石流极高易发区中历史泥石流灾害点数量为4055个,占甘肃省历史泥石流总数的95%,与历史灾害分布基本一致。性能评估和甘肃省泥石流易发性评价结果均表明考虑泥石流灾害空间依赖性的LA-GraphCAN方法的评价结果更优,在泥石流易发性评价研究中有较好的适用性。 展开更多
关键词 LA-graphCAN 泥石流易发性评价 GCN GAT 甘肃省
在线阅读 下载PDF
A Survey of Malware Classification Methods Based on Data Flow Graph
8
作者 Tingting Jiang Lingling Cui +1 位作者 Zedong Lin Faming Lu 《国际计算机前沿大会会议论文集》 2022年第1期80-93,共14页
Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the o... Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the obfuscation problem to a certain extent.Many malware classification methods based on data flow graphs have been proposed.Some of them are based on userdefined features or graph similarity of data flow graphs.Graph neural networks have also recently been used to implement malware classification recently.This paper provides an overview of current data flow graph-based malware classification methods.Their respective advantages and disadvantages are summarized as well.In addition,the future trend of the data flow graph-based malware classification method is analyzed,which is of great significance for promoting the development of malware detection technology. 展开更多
关键词 Malware detection Malware classification Data flow graph graph neural network
原文传递
Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2
9
作者 Wang Honghao Wang Huiquan Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页
Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced contr... Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. 展开更多
关键词 Bipartite graph Control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
原文传递
Graph-tree-based software control flow checking for COTS processors on pico-satellites 被引量:1
10
作者 Yang Mu Wang Hao +1 位作者 Zheng Yangming Jin Zhonghe 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期413-422,共10页
This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processo... This paper proposes a generic high-performance and low-time-overhead software control flow checking solution, graph-tree-based control flow checking (GTCFC) for space-borne commercial-off-the-shelf (COTS) processors. A graph tree data structure with a topology similar to common trees is introduced to transform the control flow graphs of target programs. This together with design of IDs and signatures of its vertices and edges allows for an easy check of legality of actual branching during target program execution. As a result, the algorithm not only is capable of detecting all single and multiple branching errors with low latency and time overheads along with a linear-complexity space overhead, but also remains generic among arbitrary instruction sets and independent of any specific hardware. Tests of the algorithm using a COTS-processor-based onboard computer (OBC) of in-service ZDPS-1A pico-satellite products show that GTCFC can detect over 90% of the randomly injected and all-pattern-covering branching errors for different types of target programs, with performance and overheads consistent with the theoretical analysis; and beats well-established preeminent control flow checking algorithms in these dimensions. Furthermore, it is validated that GTCGC not only can be accommodated in pico-satellites conveniently with still sufficient system margins left, but also has the ability to minimize the risk of control flow errors being undetected in their space missions. Therefore, due to its effectiveness, efficiency, and compatibility, the GTCFC solution is ready for applications on COTS processors on pico-satellites in their real space missions. 展开更多
关键词 Branching error Commercial-off-the-shelf (COTS) Control flow checking Error injection graph tree On-board computer Pico-satellite
原文传递
Cyclic Reconfigurable Flow Shop under Different Configurations Modeling and Optimization Based on Timed Event Graph
11
作者 REN Si-Cheng XU De WANG Fang TAN Min 《自动化学报》 EI CSCD 北大核心 2006年第1期15-20,共6页
Based on the idea that modules are independent of machines, different combinations of modules and machines result in different configurations and the system performances differ under different configurations, a kind o... Based on the idea that modules are independent of machines, different combinations of modules and machines result in different configurations and the system performances differ under different configurations, a kind of cyclic reconfigurable flow shops are proposed for the new manufacturing paradigm-reconfigurable manufacturing system. The cyclic reconfigurable flow shop is modeled as a timed event graph. The optimal configuration is defined as the one under which the cyclic reconfigurable flow shop functions with the minimum cycle time and the minimum number of pallets. The optimal configuration, the minimum cycle time and the minimum number of pallets can be obtained in two steps. 展开更多
关键词 循环流程 制造业 时间事件 建模 优化设计
在线阅读 下载PDF
基于时空动态约束图反馈的交通流预测
12
作者 侯越 张鑫 武月 《吉林大学学报(工学版)》 北大核心 2026年第1期183-198,共16页
针对现有交通流预测研究中对路网节点隐藏空间关联时变特性考虑不充分的问题,提出了一种基于时空动态约束图反馈的交通流预测模型。首先,通过门控循环单元(GRU)提取时序特征,在STC-GCL组件内,利用时空图生成器和时空融合约束矩阵生成表... 针对现有交通流预测研究中对路网节点隐藏空间关联时变特性考虑不充分的问题,提出了一种基于时空动态约束图反馈的交通流预测模型。首先,通过门控循环单元(GRU)提取时序特征,在STC-GCL组件内,利用时空图生成器和时空融合约束矩阵生成表征当前时刻路网邻域关系的动态约束图,再利用多层图结构卷积操作实现空间特征提取。其次,利用多尺度门控卷积单元动态调整重要特征信息流,完成对关键特征的精细化筛选。最后,通过将STCGCL嵌入GRU的方式,实现时空特征的一致性提取。试验在高速路网PeMSD4、PeMSD8、成都-滴滴公开数据集上进行测试,结果表明:与当前主流交通流时空预测方法FGI相比,本文模型的MAE在3个数据集上分别降低了2.69%、1.88%、0.92%。 展开更多
关键词 交通流预测 时空性 动态性 图卷积神经网络
原文传递
最小割问题的算法研究综述
13
作者 胡思敏 王晓峰 +2 位作者 宋家欢 锁小娜 颜冬 《计算机工程与应用》 北大核心 2026年第3期40-56,共17页
最小割问题是图论中的经典NP-难问题,广泛应用于数字医学图像视差处理、图像分割等方面。最小割问题在不同模型下展现出多样的复杂性特征,近年来针对其求解的算法研究不断推进,主要包括基于流的算法、基于树结构的算法、基于收缩的算法... 最小割问题是图论中的经典NP-难问题,广泛应用于数字医学图像视差处理、图像分割等方面。最小割问题在不同模型下展现出多样的复杂性特征,近年来针对其求解的算法研究不断推进,主要包括基于流的算法、基于树结构的算法、基于收缩的算法、分布式与并行环境下的算法以及其他组合优化策略在最小割问题中的应用等。系统梳理了最小割问题的研究现状与算法发展脉络,从算法设计原理、结构适应性、性能对比等方面展开综述。总结各类算法的优势与局限,归纳适用场景与发展趋势,并展望最小割问题在复杂图结构下的研究方向,旨在为相关研究提供理论支持与方法指导。 展开更多
关键词 最小割问题 最大流问题 图算法
在线阅读 下载PDF
基于多信息注意力对抗图卷积的公交车客流预测
14
作者 颜建强 赵仁琪 +1 位作者 高原 曲博婷 《郑州大学学报(理学版)》 北大核心 2026年第2期17-24,共8页
针对公交车客流预测中时空依赖关系难以有效利用的问题,提出一种基于多信息注意力机制的动态自适应对抗图卷积网络客流预测模型。首先,利用时间特征编码器捕获不同时段客流之间的相似性,引入公交车站点的兴趣点(point of interest,POI)... 针对公交车客流预测中时空依赖关系难以有效利用的问题,提出一种基于多信息注意力机制的动态自适应对抗图卷积网络客流预测模型。首先,利用时间特征编码器捕获不同时段客流之间的相似性,引入公交车站点的兴趣点(point of interest,POI)信息以辅助模型捕捉更多的节点特征。其次,采用动态建模时空依赖关系的方法完成对非欧几里得关系的建模,利用SimAM注意力模块捕获不同站点客流数据之间的整体差异性。在真实公交车客流数据集上的实验结果表明,相比最优基线模型,所提模型在预测未来12个时间步时的平均MAE和RMSE分别降低了0.34和0.33,展现了其在公交车客流预测中的有效性和优越性。 展开更多
关键词 智能公交 客流预测 图卷积网络 注意力机制 时空依赖
在线阅读 下载PDF
一种基于图同构时空网络的交通流预测模型
15
作者 张伟阳 陈宏敏 林兵 《福建师范大学学报(自然科学版)》 北大核心 2026年第1期1-9,共9页
准确的交通流预测对于智能交通系统的有效运作至关重要,为此提出了图同构时空网络(graph isomorphism spatio-temporal network,GISTN)模型,旨在提高交通流预测的准确性。GISTN将图同构网络应用于交通流预测任务,并创新性地与双尺度时... 准确的交通流预测对于智能交通系统的有效运作至关重要,为此提出了图同构时空网络(graph isomorphism spatio-temporal network,GISTN)模型,旨在提高交通流预测的准确性。GISTN将图同构网络应用于交通流预测任务,并创新性地与双尺度时间卷积网络和门控循环单元相结合,有效捕捉了交通数据中的复杂非线性空间依赖关系和不同尺度时间特征。基于3个公开数据集上的实验结果表明,GISTN在不同预测时间尺度下的性能均优于经典基线模型。GISTN为交通流预测提供了一个新颖且高效的解决方案,对于提高智能交通系统的性能和效率具有重要意义。 展开更多
关键词 交通流预测 图神经网络 图同构网络 时空建模 智能交通系统
在线阅读 下载PDF
基于分段函数的不透明谓词
16
作者 陈沈杰 王智昊 吴彪 《电子科技》 2026年第2期45-53,共9页
作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号... 作为一种软件保护技术,代码混淆在保证程序语义不变的前提下通过增强程序的复杂性来对抗逆向工程。不透明谓词技术通过构造虚假控制流在不增加原程序时空开销的前提下隐藏程序真实的执行逻辑。针对当前不透明谓词技术无法对抗动态符号执行技术以及混淆后程序控制流较简单问题,文中提出了一种基于分段函数的不透明谓词。攻击动态符号执行存在的缺陷,利用分段函数使引入的变量收敛于设定值,以此构造不透明谓词,隐藏程序真实控制流。基于LLVM(Low Level Virtual Machine)框架实现了所提混淆系统,并进行了实验检测。实验结果表明,所提混淆方法有效增加了程序控制流的复杂度,能够抵御动态符号执行技术。相较于现有混淆系统,所提方法使程序的可维护度平均下降23.8%,具有更高的混淆强度。 展开更多
关键词 代码混淆系统 不透明谓词 虚假控制流 符号执行 静态分析 LLVM 逆向工程 控制流图
在线阅读 下载PDF
基于多维特征融合与残差增强的交通流量预测
17
作者 张振琳 郭慧洁 +4 位作者 窦天凤 亓开元 吴栋 曲志坚 任崇广 《计算机应用研究》 北大核心 2026年第1期161-169,共9页
交通流量预测在智能交通系统中占据核心地位。针对当前交通流量预测方法在特征利用和时空依赖建模方面的不足,提出了一种新的基于多维特征融合与残差增强的交通流量预测模型MFRGCRN(multi-dimensional feature fusion and residual-enha... 交通流量预测在智能交通系统中占据核心地位。针对当前交通流量预测方法在特征利用和时空依赖建模方面的不足,提出了一种新的基于多维特征融合与残差增强的交通流量预测模型MFRGCRN(multi-dimensional feature fusion and residual-enhanced graph convolutional recurrent network)。该模型通过结合自编码器、深度可分离卷积及时间卷积全方位挖掘时空相关性,使用门控循环单元与多尺度卷积注意力结合学习数据的关联关系,同时利用多尺度残差增强机制实现对复杂模式的逐步建模。在四个真实数据集上的实验结果表明,所提出的模型在预测性能上优于对比的基线模型,尤其在PEMS08数据集的12步预测任务中,MAE、RMSE和MAPE分别降低约7.7%、2.9%和4.5%,展现出优异的长期预测能力。模型在准确性、稳定性和鲁棒性方面均表现出较强优势,为智能交通系统中的复杂交通流建模提供了有效解决方案。 展开更多
关键词 交通流量预测 动态图卷积网络 特征融合 残差建模 注意力机制
在线阅读 下载PDF
融合自适应图与时空Transformer的交通流预测模型
18
作者 殷炽磊 林之喆 +2 位作者 周腾 谢海 曹春杰 《交通运输工程与信息学报》 2026年第1期90-101,共12页
【背景】随着城市现代化进程的推进,智能交通系统已成为其必不可少的一部分,而通过使用准确的交通流预测来降低城市道路的拥堵则是智能交通系统发挥效能的关键所在。【目标】综合考虑交通数据的时空特性,动态捕获交通数据复杂的空间相... 【背景】随着城市现代化进程的推进,智能交通系统已成为其必不可少的一部分,而通过使用准确的交通流预测来降低城市道路的拥堵则是智能交通系统发挥效能的关键所在。【目标】综合考虑交通数据的时空特性,动态捕获交通数据复杂的空间相关性以及时间相关性,有效提高交通预测任务的准确性。【方法】通过分析交通流数据时间和空间信息的相关性,实现时空特征的融合和交互,本文提出一种融合自适应图(DGC)与Transformer的预测模型,旨在动态捕获交通数据的时空相关性。模型首先利用多层感知机(MLP)投影和时间嵌入来捕捉周期性时间模式。在Sandwich块中,一个Transformer编码器负责捕捉长距离时间依赖性;随后,DGC模块捕捉数据驱动的隐藏空间依赖性;接着,图卷积网络(GCN)模块利用自适应邻接矩阵聚合空间信息;最后,第二个Transformer模块对融合了空间上下文的特征进行再次时间建模。整个架构堆叠两个Sandwich块,通过残差连接增强模型表达能力并确保训练稳定性,最后通过MLP投影层输出预测结果。【数据】加州交通局性能测量系统(PeMS)收集的四个广泛使用的交通预测数据集。【结果】在四个公开的数据集上,DGC-Transformer模型的平均绝对误差(MAE)、均方根误差(RMSE)和平均绝对百分比误差(MAPE)几乎全面优于所对比的五个基线以及十个模型,表明动态捕获交通数据时空相关性的重要性,使交通流预测效果得到显著提升。 展开更多
关键词 智能交通 交通流预测 注意力机制 图卷积神经网络
在线阅读 下载PDF
基于改进交互式动态图卷积网络的交通流预测模型
19
作者 胡旭东 吴宝文 +1 位作者 彭来湖 齐育宝 《软件工程》 2026年第1期67-71,78,共6页
准确快速的交通预测对于城市交通调控、路线规划和交通信号实时控制至关重要。目前提出的许多时空方法忽略了道路网络节点之间随着时间推移而产生变化的空间关联性。为解决这些问题,提出了一种基于改进交互式动态图卷积网络的交通流预... 准确快速的交通预测对于城市交通调控、路线规划和交通信号实时控制至关重要。目前提出的许多时空方法忽略了道路网络节点之间随着时间推移而产生变化的空间关联性。为解决这些问题,提出了一种基于改进交互式动态图卷积网络的交通流预测模型(I-IDGPSA)。该模型将交通数据划分为周期项和趋势项,通过交互式学习策略同步捕捉划分交通数据的时空相关性,并在后续步骤中加入概率稀疏自注意力机制,使得I-IDGPSA相较于其他预测准确率相近模型的训练效率提升了9.07%,预测效率提升了52.13%。在Pe MS数据集上进行的大量实验结果表明,I-IDGPSA的性能优于最先进的基线方法。 展开更多
关键词 交互式学习 动态图卷积 时空相关性 概率稀疏自注意力机制 交通流预测
在线阅读 下载PDF
基于多组件和时空图卷积网络的交通流预测方法
20
作者 孙焕中 唐向红 陆见光 《电子科技》 2026年第3期24-31,共8页
准确的交通流预测可以减轻交通拥堵,有利于制定更合理的出行决策。现行交通流预测方法对交通流时间依赖性和空间依赖性的提取不充分,文中提出了一种基于多组件和时空图卷积网络(Multi-Component and Spatio-Temporal Graph Convolution ... 准确的交通流预测可以减轻交通拥堵,有利于制定更合理的出行决策。现行交通流预测方法对交通流时间依赖性和空间依赖性的提取不充分,文中提出了一种基于多组件和时空图卷积网络(Multi-Component and Spatio-Temporal Graph Convolution Network, MCSTG)的交通流预测方法。MCSTG在门控时间卷积网络中融入周期信息以此深入捕获时间依赖性,并利用图重构结合空间自注意力方法来生成节点关联性强的邻接矩阵,从而捕获空间依赖性。MCSTG通过并行处理和结果融合的多预测组件架构进一步优化交通流预测性能。在两个真实数据集上的6项预测结果指标中,MCSTG的5项指标预测精度优于基线模型。实验结果表明,MCSTG具有较好的时空建模能力。消融实验验证了MCSTG设计的合理性。 展开更多
关键词 深度学习 时空数据 交通流预测 图卷积网络 注意力机制 扩张因果卷积 数据挖掘 神经网络 交通拥堵
在线阅读 下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部