In recent years,the problem of veterinary drug residues in animal-derived foods has attracted worldwide attention.Developing rapid,simple,highly sensitive,and high-throughput veterinary drug residue detection technolo...In recent years,the problem of veterinary drug residues in animal-derived foods has attracted worldwide attention.Developing rapid,simple,highly sensitive,and high-throughput veterinary drug residue detection technologies has become an urgent need.This paper provides a comprehensive review of the pretreatment and analytical techniques for veterinary drug residue analysis,comparing the detection principles,operational procedures,and respective advantages and disadvantages of various detection technologies.It further explores the future development directions of veterinary drug residue detection technologies.展开更多
This paper reviews the research progress on mold detection technologies in milk and dairy products,including rapid test sheet methods,molecular biological detection techniques,metabolomics detection techniques,enzyme-...This paper reviews the research progress on mold detection technologies in milk and dairy products,including rapid test sheet methods,molecular biological detection techniques,metabolomics detection techniques,enzyme-linked immunosorbent assay(ELISA),and microbial rapid photoelectric detection systems,aiming to provide optimal choices for mold detection.展开更多
A recent study by Nishizawa et al presented significant findings regarding the advantages of next-generation colonoscopes,specifically the CF-XZ1200 and CFEZ1500 models,in enhancing the adenoma and sessile serrated le...A recent study by Nishizawa et al presented significant findings regarding the advantages of next-generation colonoscopes,specifically the CF-XZ1200 and CFEZ1500 models,in enhancing the adenoma and sessile serrated lesion detection rates.As colorectal cancer remains a leading cause of cancer-related mortality globally,the implications of improved detection rates are substantial.This letter advocated the adoption of advanced colonoscopy technology,emphasizing the robust methodology of the study,including propensity score matching,which enhanced the validity of its conclusions.Notable improvements in image quality,facilitated by innovations such as 4 K resolution and texture enhancement imaging,enable endoscopists to identify even the smallest lesions,ultimately leading to improved patient outcomes.Given the compelling evidence presented,it is imperative for healthcare institutions to prioritize the integration of these advanced scopes into routine practice to enhance screening efficacy and reduce the burden of colorectal cancer.展开更多
This paper deeply explores oversampling technology and its applications in biomedical signal detection.It first expounds on the significance of oversampling technology in biomedical signal detection,and then analyzes ...This paper deeply explores oversampling technology and its applications in biomedical signal detection.It first expounds on the significance of oversampling technology in biomedical signal detection,and then analyzes the application strategies of oversampling technology in this field.On this basis,it details the specific applications of oversampling technology in electrophysiological signal detection,biomedical imaging signal processing,and other biomedical signal detections,and verifies its effectiveness through practical case analysis,aiming to provide certain references for relevant researchers.展开更多
With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connectio...With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.展开更多
Pseudomonas aeruginosa is an opportunistic pathogen widely distributed in the natural environment,which can cause a variety of infections,especially in people with low immunity and high pathogenicity.In recent years,s...Pseudomonas aeruginosa is an opportunistic pathogen widely distributed in the natural environment,which can cause a variety of infections,especially in people with low immunity and high pathogenicity.In recent years,significant progress has been made in the detection technology of Pseudomonas aeruginosa,covering traditional methods,molecular biology techniques,immunological methods and automated detection systems.Traditional methods such as the national standard method and the filter membrane method are easy to operate,but have the problems of long time consuming and limited sensitivity.Molecular biological techniques(such as PCR,gene cloning)and immunological methods(such as ELISA,colloidal gold immunochromatography)have significantly improved the sensitivity and specificity of detection,but they require high equipment and technology,and are expensive.Automated detection systems,such as VITEK 2 Compact and AutoMS 1000 mass spectrometry identification system,are excellent in improving detection efficiency and accuracy,but their high cost and complex operation process limit their wide application.In addition,the resistance of Pseudomonas aeruginosa to bacteriostatic agents further increases the difficulty of detection.In this paper,the development and application of immunological detection technology,molecular biological technology and immunological technology of Pseudomonas aeruginosa were reviewed,and the principles,advantages,disadvantages and research progress of various detection technologies of Pseudomonas aeruginosa were described,and the future development trend was prospected,in order to provide reference for the optimization and development of detection methods of Pseudomonas aeruginosa.展开更多
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC...Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.展开更多
An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the ...An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.展开更多
Based on the limitations of traditional plant nutrient solution detection, a ZigBee plant nutrient solution detection system based on CC2530 was developed. This system uses CC2530 as the main control chip, DS18B20 as ...Based on the limitations of traditional plant nutrient solution detection, a ZigBee plant nutrient solution detection system based on CC2530 was developed. This system uses CC2530 as the main control chip, DS18B20 as the temperature sensor for temperature acquisition, PH electrode sensor for PH value acquisition. The experiment shows that this wireless control system equipped with temperature and pH detection sensor collects and samples the main nutrient solution parameters through the main controller, performs wireless communication transmission and terminal communication, and realizes the intelligent detection of plant nutrient solution parameters. This technique of applying wireless sensor network technology to plant factories greatly improves the reliability and stability of the nutrient monitoring system.展开更多
RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In s...RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In simulation analysis,RLS and the LMS blind adaptive multi-user detector were designed and tested for synchronous and asynchronous multi-user communication process.The results of SIR comparison and MMSE comparison show that,both of the two methods can realize blind adaptive detection when any user change in multi-user communication,during this process,the training communication sequences are not needed.The RLS algorithm has about 5 dB higher in SIR compared with LMS algorithm,and the convergence velocity of RLS algorithm is also higher than LMS algorithm when the communication users change.RLS algorithm has better ability in multi-user detection than that of LMS algorithm,and it has great attraction and guiding significance for solving the problem of multiple access interference(MAI) in multi-user communication.展开更多
With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Inter...With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.展开更多
With the rapid development of urban rail transit,passenger traffic is increasing,and obstacle violations are more frequent,and the safety of train operation under high-density traffic conditions is becoming more and m...With the rapid development of urban rail transit,passenger traffic is increasing,and obstacle violations are more frequent,and the safety of train operation under high-density traffic conditions is becoming more and more thought provoking.In order to monitor the train operating environment in real time,this paper first adopts multisensing technology based on machine vision and lidar,which is used to collect video images and ranging data of the track area in real time,and then it performs image preprocessing and division of regions of interest on the collected video.Then,the obstacles in the region of interest are detected to obtain the geometric characteristics and position information of the obstacles.Finally,according to the danger degree of obstacles,determine the degree of impact on the train operation,and use the signal system automatic response ormanual response mode to transmit the detection results to the corresponding train,so as to control the train operation.Through simulation analysis and experimental verification,the detection accuracy and control performance of the detection method are confirmed,which provides safety guarantee for the train operation.展开更多
Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] ...Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] for vehicles with remote signaling using an Arduino controller and radio-frequency technology is proposed in this paper. To address malicious activities on vehicles, two aspects are considered here, namely: notifier and detector. Firstly, an object-oriented C module that puts on and off a controller (installed inside the vehicle) and an anti-theft electronic editing that powered using an alternator and supported by a back-up battery are implemented. Secondly, a magnetic intrusion sensor, controlled by a proximity detector using radio-frequency technology, has been installed on each vehicle door. To enable IDS, a user needs to activate the monitoring system when leaving their vehicle. This is done using a remote system. In case the user does not activate the monitoring system while leaving the vehicle, a 5-meter-proximity detector will automatically lock the system and set off the monitoring system whenever the user is outside the detection zone. The detection zone is a 5-meter radius area centered at the controller. Here, monitoring consists of geolocating any intruders within the detection zone. This means, if any of the vehicle doors is opened while the system is still locked, the controller will activate the vehicle alarm for a few seconds, thereafter send an SMS notification to the owner. The system automatically unlocks as soon as the proximity detector is within the detection zone. The contribution of this paper, as compared to other similar work, is to reinforce the electronic implementation of IDS.展开更多
This article summarizes the present situation of pesticide residue in tobacco, and introduces the extraction methods and detection tech-niques of pesticide residues commonly used in pesticide residue analysis. The adv...This article summarizes the present situation of pesticide residue in tobacco, and introduces the extraction methods and detection tech-niques of pesticide residues commonly used in pesticide residue analysis. The advantages and disadvantages of these methods are reviewed, and the development of pesticide residue analysis technology is prospected.展开更多
This article takes the actual construction project of a certain concrete bridge project as an example to analyze the application of acoustic non-destructive testing technology in its detection.It includes an overview ...This article takes the actual construction project of a certain concrete bridge project as an example to analyze the application of acoustic non-destructive testing technology in its detection.It includes an overview of a certain bridge construction project studied and acoustic non-destructive testing technology and the application of acoustic non-destructive testing technology in actual testing.This analysis hopes to provide some guidelines for acoustic non-destructive testing of modern concrete bridge projects.展开更多
Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework ...Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.展开更多
To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural ...To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.展开更多
A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it ha...A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it has a higher computational complexity but better performance.展开更多
The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the...The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network systems.In this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two stages.The first stage estimates the channel parameters,and the second performsmulti-user detection.The proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural networks.This study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO receivers.The FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate.展开更多
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a...In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.展开更多
基金Supported by Tangshan Science and Technology Planning Project(25150202E).
文摘In recent years,the problem of veterinary drug residues in animal-derived foods has attracted worldwide attention.Developing rapid,simple,highly sensitive,and high-throughput veterinary drug residue detection technologies has become an urgent need.This paper provides a comprehensive review of the pretreatment and analytical techniques for veterinary drug residue analysis,comparing the detection principles,operational procedures,and respective advantages and disadvantages of various detection technologies.It further explores the future development directions of veterinary drug residue detection technologies.
基金Supported by Research Project on Food Detection Technology Innovation and Standard Integration 2024(YNXM-2024-FW-019).
文摘This paper reviews the research progress on mold detection technologies in milk and dairy products,including rapid test sheet methods,molecular biological detection techniques,metabolomics detection techniques,enzyme-linked immunosorbent assay(ELISA),and microbial rapid photoelectric detection systems,aiming to provide optimal choices for mold detection.
文摘A recent study by Nishizawa et al presented significant findings regarding the advantages of next-generation colonoscopes,specifically the CF-XZ1200 and CFEZ1500 models,in enhancing the adenoma and sessile serrated lesion detection rates.As colorectal cancer remains a leading cause of cancer-related mortality globally,the implications of improved detection rates are substantial.This letter advocated the adoption of advanced colonoscopy technology,emphasizing the robust methodology of the study,including propensity score matching,which enhanced the validity of its conclusions.Notable improvements in image quality,facilitated by innovations such as 4 K resolution and texture enhancement imaging,enable endoscopists to identify even the smallest lesions,ultimately leading to improved patient outcomes.Given the compelling evidence presented,it is imperative for healthcare institutions to prioritize the integration of these advanced scopes into routine practice to enhance screening efficacy and reduce the burden of colorectal cancer.
文摘This paper deeply explores oversampling technology and its applications in biomedical signal detection.It first expounds on the significance of oversampling technology in biomedical signal detection,and then analyzes the application strategies of oversampling technology in this field.On this basis,it details the specific applications of oversampling technology in electrophysiological signal detection,biomedical imaging signal processing,and other biomedical signal detections,and verifies its effectiveness through practical case analysis,aiming to provide certain references for relevant researchers.
基金the research result of the 2022 Municipal Education Commission Science and Technology Research Plan Project“Research on the Technology of Detecting Double-Surface Cracks in Concrete Lining of Highway Tunnels Based on Image Blast”(KJQN02202403)the first batch of school-level classroom teaching reform projects“Principles Applications of Embedded Systems”(23JG2166)the school-level reform research project“Continuous Results-Oriented Practice Research Based on BOPPPS Teaching Model-Taking the‘Programming Fundamentals’Course as an Example”(22JG332).
文摘With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.
基金College Students’Innovation and Entrepreneurship Training Program Project(X202511049398)College Students’Innovation and Entrepreneurship Training Program Project(X202511049201)+1 种基金College Students’Innovation and Entrepreneurship Training Program Project(D202504071303298456)Hainan Vocational University of Science and Technology University-Level Scientific Research Funding Project(HKKY2024-87).
文摘Pseudomonas aeruginosa is an opportunistic pathogen widely distributed in the natural environment,which can cause a variety of infections,especially in people with low immunity and high pathogenicity.In recent years,significant progress has been made in the detection technology of Pseudomonas aeruginosa,covering traditional methods,molecular biology techniques,immunological methods and automated detection systems.Traditional methods such as the national standard method and the filter membrane method are easy to operate,but have the problems of long time consuming and limited sensitivity.Molecular biological techniques(such as PCR,gene cloning)and immunological methods(such as ELISA,colloidal gold immunochromatography)have significantly improved the sensitivity and specificity of detection,but they require high equipment and technology,and are expensive.Automated detection systems,such as VITEK 2 Compact and AutoMS 1000 mass spectrometry identification system,are excellent in improving detection efficiency and accuracy,but their high cost and complex operation process limit their wide application.In addition,the resistance of Pseudomonas aeruginosa to bacteriostatic agents further increases the difficulty of detection.In this paper,the development and application of immunological detection technology,molecular biological technology and immunological technology of Pseudomonas aeruginosa were reviewed,and the principles,advantages,disadvantages and research progress of various detection technologies of Pseudomonas aeruginosa were described,and the future development trend was prospected,in order to provide reference for the optimization and development of detection methods of Pseudomonas aeruginosa.
基金supported by the National Natural Science Foundation of China(6104000561001126+5 种基金61271262)the China Postdoctoral Science Foundation Funded Project(201104916382012T50789)the Natural Science Foundation of Shannxi Province of China(2011JQ8036)the Special Fund for Basic Scientific Research of Central Colleges (CHD2012ZD005)the Research Fund of Zhejiang University of Technology(20100244)
文摘Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.
基金Sponsored by the National"863"Program Projects (2007AA012293)
文摘An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.
文摘Based on the limitations of traditional plant nutrient solution detection, a ZigBee plant nutrient solution detection system based on CC2530 was developed. This system uses CC2530 as the main control chip, DS18B20 as the temperature sensor for temperature acquisition, PH electrode sensor for PH value acquisition. The experiment shows that this wireless control system equipped with temperature and pH detection sensor collects and samples the main nutrient solution parameters through the main controller, performs wireless communication transmission and terminal communication, and realizes the intelligent detection of plant nutrient solution parameters. This technique of applying wireless sensor network technology to plant factories greatly improves the reliability and stability of the nutrient monitoring system.
基金financially supported by Key Technologies R&D Program of Shandong Province(2015GSF115018)Natural Science Foundation of Shandong Province(ZR2013FL027+1 种基金ZR2013DM 014)Youth Foundation of Shandong Academy of Science(2013QN030)
文摘RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In simulation analysis,RLS and the LMS blind adaptive multi-user detector were designed and tested for synchronous and asynchronous multi-user communication process.The results of SIR comparison and MMSE comparison show that,both of the two methods can realize blind adaptive detection when any user change in multi-user communication,during this process,the training communication sequences are not needed.The RLS algorithm has about 5 dB higher in SIR compared with LMS algorithm,and the convergence velocity of RLS algorithm is also higher than LMS algorithm when the communication users change.RLS algorithm has better ability in multi-user detection than that of LMS algorithm,and it has great attraction and guiding significance for solving the problem of multiple access interference(MAI) in multi-user communication.
文摘With the economic development and the popularity of application of electronic computer, electronic commerce has rapid development. More and more commerce and key business has been carried on the lnternet because Internet has the features of interaction, openness, sharing and so on. However, during the daily commerce, people worry about the security of the network system. So a new technology which can detect the unusual behavior in time has been invented in order to protect the security of network system. The system of intrusion detection needs a lot of new technology to protect the data of the network system. The application of data mining technology in the system of intrusion detection can provide a better assistant to the users to analyze the data and improve the accuracy of the checking system.
基金supported by The National Natural Science Foundation of China(52072214)the Independent Research Fund for the Central Universities(XJ2020004701)。
文摘With the rapid development of urban rail transit,passenger traffic is increasing,and obstacle violations are more frequent,and the safety of train operation under high-density traffic conditions is becoming more and more thought provoking.In order to monitor the train operating environment in real time,this paper first adopts multisensing technology based on machine vision and lidar,which is used to collect video images and ranging data of the track area in real time,and then it performs image preprocessing and division of regions of interest on the collected video.Then,the obstacles in the region of interest are detected to obtain the geometric characteristics and position information of the obstacles.Finally,according to the danger degree of obstacles,determine the degree of impact on the train operation,and use the signal system automatic response ormanual response mode to transmit the detection results to the corresponding train,so as to control the train operation.Through simulation analysis and experimental verification,the detection accuracy and control performance of the detection method are confirmed,which provides safety guarantee for the train operation.
文摘Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] for vehicles with remote signaling using an Arduino controller and radio-frequency technology is proposed in this paper. To address malicious activities on vehicles, two aspects are considered here, namely: notifier and detector. Firstly, an object-oriented C module that puts on and off a controller (installed inside the vehicle) and an anti-theft electronic editing that powered using an alternator and supported by a back-up battery are implemented. Secondly, a magnetic intrusion sensor, controlled by a proximity detector using radio-frequency technology, has been installed on each vehicle door. To enable IDS, a user needs to activate the monitoring system when leaving their vehicle. This is done using a remote system. In case the user does not activate the monitoring system while leaving the vehicle, a 5-meter-proximity detector will automatically lock the system and set off the monitoring system whenever the user is outside the detection zone. The detection zone is a 5-meter radius area centered at the controller. Here, monitoring consists of geolocating any intruders within the detection zone. This means, if any of the vehicle doors is opened while the system is still locked, the controller will activate the vehicle alarm for a few seconds, thereafter send an SMS notification to the owner. The system automatically unlocks as soon as the proximity detector is within the detection zone. The contribution of this paper, as compared to other similar work, is to reinforce the electronic implementation of IDS.
文摘This article summarizes the present situation of pesticide residue in tobacco, and introduces the extraction methods and detection tech-niques of pesticide residues commonly used in pesticide residue analysis. The advantages and disadvantages of these methods are reviewed, and the development of pesticide residue analysis technology is prospected.
文摘This article takes the actual construction project of a certain concrete bridge project as an example to analyze the application of acoustic non-destructive testing technology in its detection.It includes an overview of a certain bridge construction project studied and acoustic non-destructive testing technology and the application of acoustic non-destructive testing technology in actual testing.This analysis hopes to provide some guidelines for acoustic non-destructive testing of modern concrete bridge projects.
文摘Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.
文摘To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.
文摘A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it has a higher computational complexity but better performance.
文摘The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network systems.In this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two stages.The first stage estimates the channel parameters,and the second performsmulti-user detection.The proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural networks.This study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO receivers.The FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate.
基金Supported by the National Natural Science Foundation of China(No.62001001)。
文摘In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.