期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine
1
作者 Feisha Hu Qi Wang +2 位作者 Haijian Shao Shang Gao Hualong Yu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2405-2424,共20页
Unmanned Aerial Vehicles(UAVs)are widely used and meet many demands in military and civilian fields.With the continuous enrichment and extensive expansion of application scenarios,the safety of UAVs is constantly bein... Unmanned Aerial Vehicles(UAVs)are widely used and meet many demands in military and civilian fields.With the continuous enrichment and extensive expansion of application scenarios,the safety of UAVs is constantly being challenged.To address this challenge,we propose algorithms to detect anomalous data collected from drones to improve drone safety.We deployed a one-class kernel extreme learning machine(OCKELM)to detect anomalies in drone data.By default,OCKELM uses the radial basis(RBF)kernel function as the kernel function of themodel.To improve the performance ofOCKELM,we choose a TriangularGlobalAlignmentKernel(TGAK)instead of anRBF Kernel and introduce the Fast Independent Component Analysis(FastICA)algorithm to reconstruct UAV data.Based on the above improvements,we create a novel anomaly detection strategy FastICA-TGAK-OCELM.The method is finally validated on the UCI dataset and detected on the Aeronautical Laboratory Failures and Anomalies(ALFA)dataset.The experimental results show that compared with other methods,the accuracy of this method is improved by more than 30%,and point anomalies are effectively detected. 展开更多
关键词 UAV safety kernel extreme learning machine triangular global alignment kernel fast independent component analysis
在线阅读 下载PDF
An Efficient Construction of Secure Network Coding
2
作者 ZHANG Jing-li TANG Ping MA Song-ya 《Chinese Quarterly Journal of Mathematics》 2016年第1期60-68,共9页
Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by... Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q^(-1). They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction. 展开更多
关键词 secure network coding global encoding kernel local encoding kernel WIRETAP block lower triangular matrix
在线阅读 下载PDF
Symmetric jump processes and their heat kernel estimates 被引量:2
3
作者 CHEN Zhen-Qing 《Science China Mathematics》 SCIE 2009年第7期1423-1445,共23页
We survey the recent development of the DeGiorgi-Nash-Moser-Aronson type theory for a class of symmetric jump processes(or equivalently,a class of symmetric integro-differential operators).We focus on the sharp two-si... We survey the recent development of the DeGiorgi-Nash-Moser-Aronson type theory for a class of symmetric jump processes(or equivalently,a class of symmetric integro-differential operators).We focus on the sharp two-sided estimates for the transition density functions(or heat kernels) of the processes,a priori Hlder estimate and parabolic Harnack inequalities for their parabolic functions.In contrast to the second order elliptic differential operator case,the methods to establish these properties for symmetric integro-differential operators are mainly probabilistic. 展开更多
关键词 symmetric jump process diffusion with jumps pseudo-differential operator Dirichlet form a prior Holder estimates parabolic Harnack inequality global and Dirichlet heat kernel estimates Lévy system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部