期刊文献+
共找到1,154篇文章
< 1 2 58 >
每页显示 20 50 100
Infrared road object detection algorithm based on spatial depth channel attention network and improved YOLOv8
1
作者 LI Song SHI Tao +1 位作者 JING Fangke CUI Jie 《Optoelectronics Letters》 2025年第8期491-498,共8页
Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm f... Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance. 展开更多
关键词 feature pyramid network infrared road object detection infrared imagesf yolov backbone networks channel attention mechanism spatial depth channel attention network object detection improved YOLOv
原文传递
Research of Neural Network Based on Improved PSO Algorithm for Carbonation Depth Prediction of Concrete 被引量:2
2
作者 DAI W SHUI Z H 《武汉理工大学学报》 CAS CSCD 北大核心 2010年第17期170-175,共6页
Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed wi... Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed with consideration of various factors such as unit cement consumption (C),unit water consumption (W),binder material content (B),water binder ratio (W/B ),concrete strength (MPa),rapid carbonization days (D),fly ash consumption of unit volume concrete(FA),fly ash percentage of total cementitious materials (FA%),expansion agent consumption of unit volume concrete(EA),expansion agent percentage of total cementitious materials (FA%).Gaining the data from project-experiment,a model is presented to calculate and forecast carbonation depth using neural network based on improved PSO algorithm. The calculation results indicate that this algorithm accord with the prediction carbonation depth of concrete accuracy requirements and has a better convergence and generalization,worth being popularized. 展开更多
关键词 PSO BP neural network concrete carbonation depth PREDICTION
原文传递
Application of Artificial Neural Network, Kriging, and Inverse Distance Weighting Models for Estimation of Scour Depth around Bridge Pier with Bed Sill 被引量:2
3
作者 Homayoon Seyed Rahman Keshavarzi Alireza Gazni Reza 《Journal of Software Engineering and Applications》 2010年第10期944-964,共21页
This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridg... This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridge piers. As part of this study, bridge piers were installed with bed sills at the bed of an experimental flume. Experimental tests were conducted under different flow conditions and varying distances between bridge pier and bed sill. The ANN, OK and IDW models were applied to the experimental data and it was shown that the artificial neural network model predicts local scour depth more accurately than the kriging and inverse distance weighting models. It was found that the ANN with two hidden layers was the optimum model to predict local scour depth. The results from the sixth test case showed that the ANN with one hidden layer and 17 hidden nodes was the best model to predict local scour depth. Whereas the results from the fifth test case found that the ANN with three hidden layers was the best model to predict local scour depth. 展开更多
关键词 Artificial Neural network SCOUR depth Ordinary KRIGING INVERSE Distance Weighting Bridge PIERS
在线阅读 下载PDF
Nonlinear Correction of Pressure Sensor Based on Depth Neural Network 被引量:1
4
作者 Yanming Wang Kebin Jia Pengyu Liu 《Journal on Internet of Things》 2020年第3期109-120,共12页
With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of... With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of the tested object and the environment under test,and the nonlinear error is generated.Aiming at the difficulty of nonlinear correction of pressure sensor and the low accuracy of correction results,depth neural network model was established based on wavelet function,and Levenberg-Marquardt algorithm is used to update network parameters to realize the nonlinear correction of pressure sensor.The experimental results show that compared with the traditional neural network model,the improved depth neural network not only accelerates the convergence rate,but also improves the correction accuracy,meets the error requirements of upper-air detection,and has a good generalization ability,which can be extended to the nonlinear correction of similar sensors. 展开更多
关键词 depth neural network pressure sensor nonlinearity correction wavelet transform LM algorithm
在线阅读 下载PDF
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth 被引量:2
5
作者 Lance Cleghorn 《Journal of Information Security》 2013年第3期144-149,共6页
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo... The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations. 展开更多
关键词 DEFENSE in depth DEFENSE in BREADTH network DEFENSE SECURITY Architecture DEFENSE METHODOLOGY Information ASSURANCE
暂未订购
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 被引量:1
6
作者 Rodney Alexander 《Journal of Information Security》 2020年第4期261-291,共31页
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th... The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables). 展开更多
关键词 Information Assurance Defense in depth Information Technology network Security CYBERSECURITY Linear Regression Analysis PANDEMIC
在线阅读 下载PDF
Fuzzy neural networks for control of penetration depthduring GTAW
7
作者 高向东 黄石生 余英林 《China Welding》 EI CAS 2000年第1期3-10,共8页
An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this... An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this paper. The discussion is mainly focused on two parts. One is the modeling of the penetration depth with NN. A visual sensor CCD is used to obtain the image of the molten pool. A neural network model is established to estimate the penetration depth from the welding current, pool width and seam gap. It is demonstrated that the proposed neural network can produce highly complex nonlinear multi variable model of the GTAW process that offer the accurate prediction of welding penetration depth. Another is the control for the penetration depth with FC.A self adjusting fuzzy controller is proposed,which used for controlling the penetration depth.The control parameters are adjusted on line automatically according to the controlling errors of penetration and the errors can be decreased sharply. The effectiveness of the proposed intelligent methods is demonstrated by the real experiments and the improved performance results are obtained. 展开更多
关键词 neural network fuzzy controller GTAW penetration depth CCD
在线阅读 下载PDF
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
8
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 Information Assurance Bayesian networks Influence Diagrams Defense in depth Information Technology network Security CYBERSECURITY
在线阅读 下载PDF
LpDepth:基于拉普拉斯金字塔的自监督单目深度估计
9
作者 曹明伟 邢景杰 +1 位作者 程宜风 赵海锋 《计算机科学》 北大核心 2025年第3期33-40,共8页
自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影... 自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影响深度图的精度。针对上述问题,提出一种基于拉普拉斯金字塔的自监督单目深度估计方法(Self-supervised Monocular Depth Estimation Based on the Laplace Pyramid,LpDepth)。此方法的核心思想是:首先,使用拉普拉斯残差图丰富编码特征,以弥补在下采样过程中丢失的特征信息;其次,在下采样过程中使用最大池化层突显和放大特征信息,使编码器在特征提取过程中更容易地提取到训练模型所需要的特征信息;最后,使用残差模块解决过拟合问题,提高解码器对特征的利用效率。在KITTI和Make3D等数据集上对所提方法进行了测试,同时将其与现有经典方法进行了比较。实验结果证明了所提方法的有效性。 展开更多
关键词 单目深度估计 拉普拉斯金字塔 残差网络 深度图
在线阅读 下载PDF
基于深度强化学习决策的雷达干扰抑制方法
10
作者 肖易寒 孟祥乾 陆钱融 《制导与引信》 2026年第1期22-31,共10页
针对目前雷达干扰抑制决策智能化程度低的问题,提出了一种基于双深度优先经验回放和可变贪婪算法改进的双重竞争深度Q网络(double dueling deep Q network,D3QN)决策的雷达干扰抑制方法。首先对雷达目标回波和干扰混合信号进行特征提取... 针对目前雷达干扰抑制决策智能化程度低的问题,提出了一种基于双深度优先经验回放和可变贪婪算法改进的双重竞争深度Q网络(double dueling deep Q network,D3QN)决策的雷达干扰抑制方法。首先对雷达目标回波和干扰混合信号进行特征提取;然后根据信号特征通过可变贪婪算法选择动作作用于干扰,并将动作前后的信号特征存储于双深度优先经验回放池后,经过学习决策出最优的干扰抑制策略;最后使用该策略抑制干扰后输出。实验结果表明,该方法有效改善了信号的脉压结果,显著提升了信号的信干噪比,相较于基于D3QN的传统干扰抑制方法,在策略准确率和收敛速度上分别提升了7.3%和8.7%。 展开更多
关键词 雷达干扰抑制 双重竞争深度Q网络 双深度优先经验回放 可变贪婪算法 脉冲压缩
在线阅读 下载PDF
融合图神经网络和深度图聚类的联邦推荐算法
11
作者 伊华伟 宋仕玺 +1 位作者 王艳飞 白思怡 《应用科学学报》 北大核心 2026年第1期83-96,共14页
联邦学习作为解决推荐系统隐私安全问题的主流框架,在实际应用中却面临推荐精度欠佳、隐私保护力度不足及通信开销过大的问题。针对这些问题,本文提出一种融合图神经网络与深度图聚类的联邦推荐算法。首先,利用图神经网络对复杂的用户-... 联邦学习作为解决推荐系统隐私安全问题的主流框架,在实际应用中却面临推荐精度欠佳、隐私保护力度不足及通信开销过大的问题。针对这些问题,本文提出一种融合图神经网络与深度图聚类的联邦推荐算法。首先,利用图神经网络对复杂的用户-项目的高阶交互关系进行捕捉,以提升推荐系统的推荐精度;其次,在联邦学习客户端与服务器端的通信环节注入差分隐私噪声以模糊真实梯度,进而增强推荐系统的隐私保护能力;最后,通过引入深度图聚类对客户端实施聚类,选取各簇的客户端代表参与训练,并将所得参数在簇内共享,以加快模型收敛速度,降低联邦学习框架下的通信开销。基于真实数据集的实验结果表明,所提算法在提高推荐精度的同时,能够增强系统的隐私保护力度并减少通信开销。 展开更多
关键词 推荐系统 联邦学习 隐私保护 深度图聚类 图神经网络
在线阅读 下载PDF
RTA数字贸易规则深度对数字服务出口的影响研究
12
作者 高越 李昊 《山东理工大学学报(社会科学版)》 2026年第1期5-20,F0002,共17页
基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,... 基于RTA中所包含的数字贸易条款,利用网络分析法对数字贸易规则深度进行量化测算,并基于引力模型探讨其对数字服务出口的影响。研究结果表明:数字贸易规则深度显著促进了数字服务出口,而且在制度兼容性越高、法治环境越健全的国家之间,规则深度的促进效应越明显。此外,数字贸易规则深度对不同国家间数字服务出口的影响存在异质性,在不同签署身份中,规则深度对“组织—国家”间相互出口的促进作用最为显著;对高收入国家间相互出口的促进作用更为显著,而在高收入国家与非高收入国家之间及非高收入国家之间的贸易关系中,其促进效应相对较弱;不同数字服务行业的出口对数字贸易规则深度的依赖程度也存在差异,知识、技术密集型的数字服务行业受到的促进影响最大。建议在制定区域贸易协定时重视规则深度的设计,以更好地推动数字服务出口。 展开更多
关键词 数字贸易规则深度 网络分析法 数字服务出口 区域贸易协定
在线阅读 下载PDF
波、流作用下单桩局部平衡冲刷深度的神经网络预测模型
13
作者 赵辛奥 李岩 +1 位作者 董平 赵笑影 《海洋工程》 北大核心 2026年第1期94-107,共14页
桩柱是浅海和近岸工程结构的重要支撑构件。桩基周围海床在海浪或水流作用下的冲刷深度是一个重要的结构稳定设计参数,对其准确预测具有重要的工程意义和经济价值。目前,局部冲刷深度预测普遍采用经验公式、数学模型及人工智能方法。经... 桩柱是浅海和近岸工程结构的重要支撑构件。桩基周围海床在海浪或水流作用下的冲刷深度是一个重要的结构稳定设计参数,对其准确预测具有重要的工程意义和经济价值。目前,局部冲刷深度预测普遍采用经验公式、数学模型及人工智能方法。经验公式法包含的影响因素不完全,适用范围有限;而数学模型往往需要依赖确定复杂的动力地貌演变过程,计算量大,不便于工程设计使用。近年来,各种人工智能算法,特别是人工神经网络(artificial neural network,简称ANN)方法,已经被应用到桩基周围局部冲刷深度计算,显示出了优越的预测能力。应用多层感知机反向传播算法神经网络方法(MLP/BP)建立了预测波、流分别作用下桩基局部平衡冲刷深度模型。模型比较了采用有量纲和无量纲训练参数数据输入得到的预测精度,并通过系统的敏感性分析,确定了波流参数和泥沙特征对计算结果的影响程度。研究结果不仅证实了无论是对应波浪还是水流作用条件,神经网络模型均优于大多数现有工程使用的经验公式,还证实了采用有量纲参数输入训练的模型可以得到比无量纲输入模型更为准确的预测结果。 展开更多
关键词 局部冲刷 人工神经网络(ANN) MLP/BP 冲刷深度预测
在线阅读 下载PDF
基于卷积网络和深度相机的飞机牵引车防碰撞安全检测系统设计
14
作者 孙丰源 张军 +3 位作者 黄明辉 向富尧 王一旋 刘宇新 《科学技术与工程》 北大核心 2026年第4期1728-1734,共7页
针对飞机牵引作业时的视野盲区大,存在安全隐患的问题,提出以深度相机与卷积神经网络(convolutional neural network,CNN)模型相融合的防碰撞检测方法。采用卷积网络实现环境目标的自动识别,利用深度相机获取目标距离信息,二者联合使用... 针对飞机牵引作业时的视野盲区大,存在安全隐患的问题,提出以深度相机与卷积神经网络(convolutional neural network,CNN)模型相融合的防碰撞检测方法。采用卷积网络实现环境目标的自动识别,利用深度相机获取目标距离信息,二者联合使用实现牵引过程障碍物的定位。将训练的卷积网络模型和ZED2i双目相机部署再飞机牵引车上,通过CAN总线进行通信,在试验场开展了避障实验。结果表明:构建的卷积网络模型识别准确率达到0.911,召回率达到0.803;在10 m测距范围内,测距误差在0.3 m以内,能够为飞机牵引车在牵引作业时的防碰撞安全检测提供技术参考。 展开更多
关键词 飞机牵引车 防碰撞检测 深度相机 卷积神经网络(CNN) 目标定位
在线阅读 下载PDF
基于Vision Transformer的轻量化单目深度估计
15
作者 张凯 唐嘉宁 +2 位作者 李叶嘉 马孟星 周思达 《现代电子技术》 北大核心 2026年第4期64-72,共9页
深度估计能为无人机提供精确的三维环境感知能力,而对边缘设备而言,实时推理与极低的计算资源消耗至关重要。目前大多数单目深度估计网络都侧重于提高在高端GPU上运行时的精度,难以满足边缘设备的实时性要求。为解决该问题,提出一种新... 深度估计能为无人机提供精确的三维环境感知能力,而对边缘设备而言,实时推理与极低的计算资源消耗至关重要。目前大多数单目深度估计网络都侧重于提高在高端GPU上运行时的精度,难以满足边缘设备的实时性要求。为解决该问题,提出一种新型编码器-解码器网络,以实现边缘设备上的实时单目深度估计。所提网络通过一个高效的语义模块合并全局的语义信息,为深度估计提供更多的物体边缘细节;并将基于Transformer的模块集成到编码器-解码器架构的最低分辨率层级,从而大大减少视觉变换器(ViT)的参数。此外,还提出了用于深度解码的Upconv层。该网络在精度和速度之间实现了较好的权衡,通过TensorRT优化,在NVIDIA Jetson Orin设备上具备实时推理性能,优于目前多数先进的实时性算法。 展开更多
关键词 单目深度估计网络 边缘设备 编码器 解码器 Transformer技术 视觉变换器
在线阅读 下载PDF
网络视听新媒体监测监管云平台的安全综合运维探索
16
作者 包力伟 周涛 +2 位作者 殳雯娟 崔议尹 王欣 《广播与电视技术》 2026年第1期84-88,共5页
本文通过分析江苏省网络视听新媒体监测监管平台的网络环境和业务部署,综合评估了平台的网络安全风险,并结合平台的云计算模式,以常规安全运维手段与构建云安全运维管理系统相结合的方式对平台网络安全综合运维进行了探索,以进一步完善... 本文通过分析江苏省网络视听新媒体监测监管平台的网络环境和业务部署,综合评估了平台的网络安全风险,并结合平台的云计算模式,以常规安全运维手段与构建云安全运维管理系统相结合的方式对平台网络安全综合运维进行了探索,以进一步完善网络安全的运维和防护体系。 展开更多
关键词 网络安全 综合运维 纵深防御 云安全
在线阅读 下载PDF
基于深度可分离卷积与注意力的SSD目标检测模型
17
作者 卜子渝 杨哲 刘纯平 《计算机应用与软件》 北大核心 2026年第1期149-157,共9页
SSD是基于深度学习的单阶段目标检测模型,但其特征金字塔中的特征图缺乏多尺度信息融合,导致对中小型目标识别效果不佳。针对该问题,提出一种基于注意力机制与深度可分离卷积的SSD目标检测模型(Attention&DSC Single Shot MultiBox ... SSD是基于深度学习的单阶段目标检测模型,但其特征金字塔中的特征图缺乏多尺度信息融合,导致对中小型目标识别效果不佳。针对该问题,提出一种基于注意力机制与深度可分离卷积的SSD目标检测模型(Attention&DSC Single Shot MultiBox Detector,AD-SSD)。AD-SSD首先归一化融合特征金字塔中的特征图,再引入注意力机制加强对目标信息的表征,并采用深度可分离卷积降低参数量。该方法提高了SSD的检测精度的同时,还加快了检测速度。在PASCAL VOC07+12数据集中,AD-SSD获得了81.7%的平均精度(mAP),小型目标精度提高6.3百分点,中型目标精度提高6.4百分点,检测速度达到55.1 FPS。 展开更多
关键词 目标检测 注意力机制 深度可分离卷积 特征金字塔
在线阅读 下载PDF
埋地纯氢管道多变参数泄漏规律及预测模型研究
18
作者 裴迎举 李世普 +3 位作者 何俊波 邓鹏翼 曾磊 薛喆中 《中国测试》 北大核心 2026年第2期40-51,共12页
为探究埋地纯氢管道在多因素影响下的气体泄漏扩散规律及预测技术,该文采用多维度数值分析及SSAGA-BP神经网络,重点分析泄漏孔径、位置、埋深及土壤渗透特性对氢气扩散的影响。结果显示,氢气扩散速度与泄漏孔径正相关,与管道埋深和土壤... 为探究埋地纯氢管道在多因素影响下的气体泄漏扩散规律及预测技术,该文采用多维度数值分析及SSAGA-BP神经网络,重点分析泄漏孔径、位置、埋深及土壤渗透特性对氢气扩散的影响。结果显示,氢气扩散速度与泄漏孔径正相关,与管道埋深和土壤阻力系数负相关;泄漏点位置显著影响扩散行为,扩散速率表现为上方>右上方>水平方向>下方,45°右上方泄漏时垂直向上速率明显大于水平方向。不同土壤下扩散速率为纯砂土>纯壤土>纯黏土,小孔径与黏土组合会导致高压积聚和氢气缓释。基于SSA-GA-BP神经网络的扩散浓度预测误差低于1.2%。研究表明:土壤渗透特性对埋地纯氢管道泄漏扩散的影响最显著,低渗透性土壤可降低泄漏孔径和埋深的影响;浅埋深+黏土+小孔径是高地表浓度风险工况。该神经网络模型精度优异,可为工程氢气泄漏浓度和达到爆炸下限时间预测提供理论指导。 展开更多
关键词 埋地纯氢管道 泄漏扩散 泄漏位置 管道埋深 土壤性质 神经网络
在线阅读 下载PDF
Hand segmentation from a single depth image based on histogram threshold selection and shallow CNN 被引量:1
19
作者 XU Zhengze ZHANG Wenjun 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2018年第5期675-685,共11页
Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the ha... Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms). 展开更多
关键词 HAND SEGMENTATION HISTOGRAM THRESHOLD selection convolutional neural network(CNN) depth map
在线阅读 下载PDF
Fast Multi-Pattern Matching Algorithm on Compressed Network Traffic 被引量:2
20
作者 Hao Peng Jianxin Li +1 位作者 Bo Li M.Hassan Arif 《China Communications》 SCIE CSCD 2016年第5期141-150,共10页
Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck ... Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck for multi-pattern matching on online compressed network traffic(CNT), this is because malicious and intrusion codes are often embedded into compressed network traffic. In this paper, we propose an online fast and multi-pattern matching algorithm on compressed network traffic(FMMCN). FMMCN employs two types of jumping, i.e. jumping during sliding window and a string jump scanning strategy to skip unnecessary compressed bytes. Moreover, FMMCN has the ability to efficiently process multiple large volume of networks such as HTTP traffic, vehicles traffic, and other Internet-based services. The experimental results show that FMMCN can ignore more than 89.5% of bytes, and its maximum speed reaches 176.470MB/s in a midrange switches device, which is faster than the current fastest algorithm ACCH by almost 73.15 MB/s. 展开更多
关键词 compressed network traffic network security multiple pattern matching skip scanning depth of boundary
在线阅读 下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部