期刊文献+
共找到10,859篇文章
< 1 2 250 >
每页显示 20 50 100
Secformer:Privacy-preserving atomic-level componentized transformer-like model with MPC
1
作者 Chi Zhang Tao Shen +3 位作者 Fenhua Bai Kai Zeng Xiaohui Zhang Bin Cao 《Digital Communications and Networks》 2026年第1期86-100,共15页
The global surge in Artificial Intelligence(AI)has been triggered by the impressive performance of deep-learning models based on the Transformer architecture.However,the efficacy of such models is increasingly depende... The global surge in Artificial Intelligence(AI)has been triggered by the impressive performance of deep-learning models based on the Transformer architecture.However,the efficacy of such models is increasingly dependent on the volume and quality of data.Data are often distributed across institutions and companies,making cross-organizational data transfer vulnerable to privacy breaches and subject to privacy laws and trade secret regulations.These privacy and security concerns continue to pose major challenges to collaborative training and inference in multi-source data environments.These challenges are particularly significant for Transformer models,where the complex internal encryption computations drastically reduce computational efficiency,ultimately threatening the model's practical applicability.We hence introduce Secformer,an innovative architecture specifically designed to protect the privacy of Transformer-like models.Secformer separates the encoder and decoder modules,enabling the decomposition of computation flows in Transformer-like models and their efficient mapping to Multi-Party Computation(MPC)protocols.This design effectively addresses privacy leakage issues during the collaborative computation process of Transformer models.To prevent performance degradation caused by encrypted attention modules,we propose a modular design strategy that optimizes high-level components by reconstructing low-level operators.We further analyze the security of Secformer's core components,presenting security definitions and formal proofs.We construct a library of fundamental operators and core modules using atomic-level component designs as the basic building blocks for encoders and decoders.Moreover,these components can serve as foundational operators for other Transformer-like models.Extensive experimental evaluations demonstrate Secformer's excellent performance while preserving privacy and offering universal adaptability for Transformer-like models. 展开更多
关键词 privacy-preserving computation Deep learning Multi-party computation Data sharing
在线阅读 下载PDF
A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications
2
作者 Haoran Wang Shuhong Yang +2 位作者 Kuan Shao Tao Xiao Zhenyong Zhang 《Computers, Materials & Continua》 2026年第1期1354-1371,共18页
With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performan... With the rapid development of the Artificial Intelligence of Things(AIoT),convolutional neural networks(CNNs)have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks.However,the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices.Therefore,this paper proposes an efficient privacy-preserving CNN framework(i.e.,EPPA)based on the Fully Homomorphic Encryption(FHE)scheme for AIoT application scenarios.In the plaintext domain,we verify schemes with different activation structures to determine the actual activation functions applicable to the corresponding ciphertext domain.Within the encryption domain,we integrate batch normalization(BN)into the convolutional layers to simplify the computation process.For nonlinear activation functions,we use composite polynomials for approximate calculation.Regarding the noise accumulation caused by homomorphic multiplication operations,we realize the refreshment of ciphertext noise through minimal“decryption-encryption”interactions,instead of adopting bootstrapping operations.Additionally,in practical implementation,we convert three-dimensional convolution into two-dimensional convolution to reduce the amount of computation in the encryption domain.Finally,we conduct extensive experiments on four IoT datasets,different CNN architectures,and two platforms with different resource configurations to evaluate the performance of EPPA in detail. 展开更多
关键词 Artificial Intelligence of Things(AIoT) convolutional neural network privacy-preserving fully homomorphic encryption
在线阅读 下载PDF
In-Mig:Geographically Dispersed Agentic LLMs for Privacy-Preserving Artificial Intelligence
3
作者 Mohammad Nauman 《Computers, Materials & Continua》 2026年第5期1101-1115,共15页
Large LanguageModels(LLMs)are increasingly utilized for semantic understanding and reasoning,yet their use in sensitive settings is limited by privacy concerns.This paper presents In-Mig,a mobile-agent architecture th... Large LanguageModels(LLMs)are increasingly utilized for semantic understanding and reasoning,yet their use in sensitive settings is limited by privacy concerns.This paper presents In-Mig,a mobile-agent architecture that integrates LLM reasoning within agents that can migrate across organizational venues.Unlike centralized approaches,In-Mig performs reasoning in situ,ensuring that raw data remains within institutional boundaries while allowing for cross-venue synthesis.The architecture features a policy-scoped memory model,utility-driven route planning,and cryptographic trust enforcement.Aprototype using JADE for mobility and quantizedMistral-7B demonstrates practical feasibility.Evaluation across various scenarios shows that In-Mig achieves 92%similarity to centralized baselines,confirming its utility and strong privacy guarantees.These results suggest that migrating,privacy-preserving LLM agents can effectively support decentralized reasoning in trust-sensitive domains. 展开更多
关键词 Mobile agents large language models(LLMs) privacy-preserving AI decentralized reasoning trust and security
在线阅读 下载PDF
Privacy-Preserving Gender-Based Customer Behavior Analytics in Retail Spaces Using Computer Vision
4
作者 Ginanjar Suwasono Adi Samsul Huda +4 位作者 Griffani Megiyanto Rahmatullah Dodit Suprianto Dinda Qurrota Aini Al-Sefy Ivon Sandya Sari Putri Lalu Tri Wijaya Nata Kusuma 《Computers, Materials & Continua》 2026年第1期1839-1861,共23页
In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and ta... In the competitive retail industry of the digital era,data-driven insights into gender-specific customer behavior are essential.They support the optimization of store performance,layout design,product placement,and targeted marketing.However,existing computer vision solutions often rely on facial recognition to gather such insights,raising significant privacy and ethical concerns.To address these issues,this paper presents a privacypreserving customer analytics system through two key strategies.First,we deploy a deep learning framework using YOLOv9s,trained on the RCA-TVGender dataset.Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate gender classification.Second,we apply AES-128 encryption to customer position data,ensuring secure access and regulatory compliance.Our system achieved overall performance,with 81.5%mAP@50,77.7%precision,and 75.7%recall.Moreover,a 90-min observational study confirmed the system’s ability to generate privacy-protected heatmaps revealing distinct behavioral patterns between male and female customers.For instance,women spent more time in certain areas and showed interest in different products.These results confirm the system’s effectiveness in enabling personalized layout and marketing strategies without compromising privacy. 展开更多
关键词 Business intelligence customer behavior privacy-preserving analytics computer vision deep learning smart retail gender recognition heatmap privacy RCA-TVGender dataset
在线阅读 下载PDF
Overexpression of mitofusin 2 ameliorates inflammation and oxidative stress in lipopolysaccharide-induced mastitis model by regulating phosphofurin acidic cluster sorting protein 2
5
作者 Xiechen Zhou Yufei Zhang +5 位作者 He Ma Shoupeng Fu Juxiong Liu Wenjin Guo Xiaofeng Tian Bingxu Huang 《Animal Models and Experimental Medicine》 2026年第1期154-167,共14页
Background:Mastitis seriously affects the mammary health of humans and animals.Studies have found that inflammation and oxidative stress play key roles in the occur-rence and development of mastitis.Therefore,in-depth... Background:Mastitis seriously affects the mammary health of humans and animals.Studies have found that inflammation and oxidative stress play key roles in the occur-rence and development of mastitis.Therefore,in-depth research on related molecular mechanisms is of great significance.Methods:Postpartum mice were anesthetized with pentobarbital and administered lipopolysaccharide to develop the mouse mastitis model.Proteomic analysis was per-formed to compare protein expression in mitochondria-associated endoplasmic retic-ulum membranes(MAM)from two mouse mammary gland groups.Western blot was used to detect the expression of MAM-related proteins in mitochondria.AlphaFold3 was used to predict the molecular structures of phosphofurin acidic cluster sorting protein 2(PACS2)and mitofusin 2(MFN2)and their interaction levels.The MFN2-PACS2 interaction was investigated using co-immunoprecipitation and small interfer-ing RNA.Results:The results showed that the inflammation level in the mammary gland tissue of mice with mastitis significantly increased,the total antioxidant capacity decreased,and the expression of MAM-related proteins MFN2 and PACS2 was significantly downregulated.In cell experiments,overexpression of MFN2 can inhibit inflamma-tion and oxidative stress responses,and promote the interaction between MFN2 and PACS2 to affect the formation of MAMs.Conclusion:In summary,this study suggests that mastitis can alter the expression of MAM-related proteins in mouse breast tissue.The interaction between MFN2 and PACS2 regulates the formation of MAMs.Overexpression of MFN2 can promote the formation of MAMs and inhibit inflammation and oxidative stress response in mam-mary epithelial cells.Our results provided a new theoretical basis and potential thera-peutic targets for the prevention and treatment of mastitis. 展开更多
关键词 MASTITIS mitochondria-associated endoplasmic reticulum membranes(MAM) mitofusin 2(MFN2) phosphofurin acidic cluster sorting protein 2(PACS2)
在线阅读 下载PDF
基于神经网络和抛物特征的改进MOG-SORT高空抛物检测算法
6
作者 陈卫东 刘萌 武文龙 《燕山大学学报》 北大核心 2026年第1期68-75,共8页
随着高楼的不断增多,高空抛物事件日益增加,给个人安全和公共安全都带来了挑战。高空抛物检测过程中存在背景复杂、抛物目标小、抛物外观特征不明显、抛物跟踪易丢失等问题。本文使用神经网络对混合高斯背景建模算法进行扩展,并根据抛... 随着高楼的不断增多,高空抛物事件日益增加,给个人安全和公共安全都带来了挑战。高空抛物检测过程中存在背景复杂、抛物目标小、抛物外观特征不明显、抛物跟踪易丢失等问题。本文使用神经网络对混合高斯背景建模算法进行扩展,并根据抛物特征改进简单在线实时跟踪(SORT)算法解决上述高空抛物问题。首先,为解决小目标抛物及复杂背景问题,引入区域条件滤波减少前景检测中的非抛物前景;其次,为解决抛物外观特征不明显的问题,使用多帧融合技术增强运动特征并设计轻量级分类网络来区分抛物物体:最后,为解决抛物跟踪易丢失的问题,根据抛物特征改进了SORT的状态空间和匹配度量。实验结果表明:改进后的混合高斯背景建模算法,在召回率下降6.50%的情况下,检测数量减少97.14%;改进后的SORT算法,ID切换数量减少51.61%,MOTA指标提升8.74%,TIOU指标提升8.02%. 展开更多
关键词 高空抛物检测 运动小目标检测 混合高斯背景建模 sort
在线阅读 下载PDF
Secure and Privacy-Preserving Cross-Departmental Computation Framework Based on BFV and Blockchain
7
作者 Peng Zhao Yu Du 《Journal of Electronic Research and Application》 2025年第6期207-217,共11页
As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-... As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-preserving computation framework based on BFV homomorphic encryption,threshold decryption,and blockchain technology.The proposed scheme leverages homomorphic encryption to enable secure computations between sales,finance,and taxation departments,ensuring that sensitive data remains encrypted throughout the entire process.A threshold decryption mechanism is employed to prevent single-point data leakage,while blockchain and IPFS are integrated to ensure verifiability and tamper-proof storage of computation results.Experimental results demonstrate that with 5,000 sample data entries,the framework performs efficiently and is highly scalable in key stages such as sales encryption,cost calculation,and tax assessment,thereby validating its practical feasibility and security. 展开更多
关键词 Homomorphic encryption Zero-knowledge proof Blockchain Cross-departmental privacy-preserving computation
在线阅读 下载PDF
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
8
作者 Ke Zhijie Xie Yong +1 位作者 Syed Hamad Shirazi Li Haifeng 《China Communications》 2025年第4期202-222,共21页
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machin... Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency. 展开更多
关键词 federated learning fog computing internet of things privacy-preserving ROBUSTNESS
在线阅读 下载PDF
Securing Internet of Things Devices with Federated Learning:A Privacy-Preserving Approach for Distributed Intrusion Detection
9
作者 Sulaiman Al Amro 《Computers, Materials & Continua》 2025年第6期4623-4658,共36页
The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Syst... The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments. 展开更多
关键词 Federated learning internet of things intrusion detection privacy-preserving distributed security
在线阅读 下载PDF
Privacy-preserving computation meets quantum computing:A scoping review
10
作者 Aitor Gómez-Goiri Iñaki Seco-Aguirre +1 位作者 Oscar Lage Alejandra Ruiz 《Digital Communications and Networks》 2025年第6期1707-1721,共15页
Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely... Privacy-Preserving Computation(PPC)comprises the techniques,schemes and protocols which ensure privacy and confidentiality in the context of secure computation and data analysis.Most of the current PPC techniques rely on the complexity of cryptographic operations,which are expected to be efficiently solved by quantum computers soon.This review explores how PPC can be built on top of quantum computing itself to alleviate these future threats.We analyze quantum proposals for Secure Multi-party Computation,Oblivious Transfer and Homomorphic Encryption from the last decade focusing on their maturity and the challenges they currently face.Our findings show a strong focus on purely theoretical works,but a rise on the experimental consideration of these techniques in the last 5 years.The applicability of these techniques to actual use cases is an underexplored aspect which could lead to the practical assessment of these techniques. 展开更多
关键词 Quantum computing privacy-preserving computation Oblivious transfer Secure multi-party computation Homomorphic encryption Scoping review
在线阅读 下载PDF
VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server
11
作者 Peizheng Lai Minqing Zhang +2 位作者 Yixin Tang Ya Yue Fuqiang Di 《Computers, Materials & Continua》 2025年第8期2935-2957,共23页
Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server i... Federated Learning(FL)has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing.However,its reliance on a server introduces critical security vulnerabilities:malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results.Consequently,achieving verifiable aggregation without compromising client privacy remains a critical challenge.To address these problem,we propose a reversible data hiding in encrypted domains(RDHED)scheme,which designs joint secret message embedding and extraction mechanism.This approach enables clients to embed secret messages into ciphertext redundancy spaces generated during model encryption.During the server aggregation process,the embedded messages from all clients fuse within the ciphertext space to form a joint embedding message.Subsequently,clients can decrypt the aggregated results and extract this joint embedding message for verification purposes.Building upon this foundation,we integrate the proposed RDHED scheme with linear homomorphic hash and digital signatures to design a verifiable privacy-preserving aggregation protocol for single-server architectures(VPAFL).Theoretical proofs and experimental analyses show that VPAFL can effectively protect user privacy,achieve lightweight computational and communication overhead of users for verification,and present significant advantages with increasing model dimension. 展开更多
关键词 Verifiable federated learning privacy-preserving homomorphic encryption reversible data hiding in encrypted domain secret sharing
在线阅读 下载PDF
Joint Flow Splitting,Sorting and Selecting for CQF Scheduling in TSN
12
作者 Ma Tao Zhou Feifei +2 位作者 Guan Ti Jiang Qinru Yu Yang 《China Communications》 2025年第4期268-280,共13页
The progress of modern industry has given rise to great requirements for network transmission latency and reliability in domains such as smart grid and intelligent driving.To address these challenges,the concept of Ti... The progress of modern industry has given rise to great requirements for network transmission latency and reliability in domains such as smart grid and intelligent driving.To address these challenges,the concept of Time-sensitive networking(TSN)is proposed by IEEE 802.1TSN working group.In order to achieve low latency,Cyclic queuing and forwarding(CQF)mechanism is introduced to schedule Timetriggered(TT)flows.In this paper,we construct a TSN model based on CQF and formulate the flow scheduling problem as an optimization problem aimed at maximizing the success rate of flow scheduling.The problem is tackled by a novel algorithm that makes full use of the characteristics and the relationship between the flows.Firstly,by K-means algorithm,the flows are initially partitioned into subsets based on their correlations.Subsequently,the flows within each subset are sorted by a new special criteria extracted from multiple features of flow.Finally,a flow offset selecting method based on load balance is used for resource mapping,so as to complete the process of flow scheduling.Experimental results demonstrate that the proposed algorithm exhibits significant advantages in terms of scheduling success rate and time efficiency. 展开更多
关键词 cyclic queuing and forwarding model joint flow splitting sorting and selecting timesensitive networking
在线阅读 下载PDF
The Paraventricular Hypothalamus: A Sorting Center for Visceral and Somatic Pain
13
作者 Li Sun Shumin Duan 《Neuroscience Bulletin》 2025年第4期731-733,共3页
The somatotopic representation of specific body parts is a well-established spatial organizational principle in the primary somatosensory and motor cortices.
关键词 somatic pain sorting center somatotopic representation somatosensory motor cortices body parts visceral pain spatial organizational principle paraventricular hypothalamus
原文传递
基于改进SORT算法的耙吸船挖掘土壤粒径参数测量研究
14
作者 史誉州 谢云飞 +1 位作者 刘雅奇 王栋臣 《中国水运》 2026年第3期77-81,共5页
为了提高耙吸船的挖掘效率与施工质量,研究提出一种土壤粒径参数模型,借助改进的在线跟踪算法和目标检测算法提升粒径识别精度。实验证明,研究所提算法最终多目标跟踪精度稳定在64.85%,每秒传输帧数稳定在16.23帧/s,且当图像出现遮挡时... 为了提高耙吸船的挖掘效率与施工质量,研究提出一种土壤粒径参数模型,借助改进的在线跟踪算法和目标检测算法提升粒径识别精度。实验证明,研究所提算法最终多目标跟踪精度稳定在64.85%,每秒传输帧数稳定在16.23帧/s,且当图像出现遮挡时或更改数据集时对算法预测指标影响程度不大。在实际土壤粒径测量中,研究模型的平均均方根误差仅为0.0354mm。该模型的动态跟踪能力、测量精度和效率都很优越,能精准实时地测量土壤粒径参数,助力耙吸船智能化施工,推动疏浚行业高质量发展。 展开更多
关键词 sort YOLOv8 耙吸船 土壤粒径 EMA
在线阅读 下载PDF
基于Quick Sorting的快速分页排序算法 被引量:1
15
作者 杨建武 刘缙 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期82-84,共3页
提出了分页排序的概念和基于Quick Sorting的快速分页排序算法(Quick Page Sorting) 以及基于Hint缓存机制的算法实现技术。实验表明,在数万至数百万数据总量情况下,Quick Page Soring的速度比Quick Sorting快10倍左右,大大提高了应用... 提出了分页排序的概念和基于Quick Sorting的快速分页排序算法(Quick Page Sorting) 以及基于Hint缓存机制的算法实现技术。实验表明,在数万至数百万数据总量情况下,Quick Page Soring的速度比Quick Sorting快10倍左右,大大提高了应用系统的响应速度。 展开更多
关键词 排序 分页排序 算法 快速分页排序
在线阅读 下载PDF
Sorting radar signal from symmetry clustering perspective 被引量:13
16
作者 Mohaned Giess Shokrallah Ahmed Bin Tang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第4期690-696,共7页
The main function of electronic support measure system is to detect threating signals in order to take countermeasures against them. To accomplish this objective, a process of associating each interleaved pulse with i... The main function of electronic support measure system is to detect threating signals in order to take countermeasures against them. To accomplish this objective, a process of associating each interleaved pulse with its emitter must be done. This process is termed sorting or de-interleaving. A novel point symmetry based radar sorting (PSBRS) algorithm is addressed. In order to deal with all kinds of radar signals, the symmetry measure distance is used to cluster pulses instead of the conventional Euclidean distance. The reference points of the symmetrical clusters are initialized by the alternative fuzzy c-means (AFCM) algorithm to ameliorate the effects of noise and the false sorting. Besides, the density filtering (DF) algorithm is proposed to discard the noise pulses or clutter. The performance of the algorithm is evaluated under the effects of noise and missing pulses. It has been observed that the PSBRS algorithm can cope with a large number of noise pulses and it is completely independent of missing pulses. Finally, PSBRS is compared with some benchmark algorithms, and the simulation results reveal the feasibility and efficiency of the algorithm. 展开更多
关键词 sorting radar pulse SYMMETRY alternative fuzzy c-means noise missing pulse
在线阅读 下载PDF
Improved non-dominated sorting genetic algorithm (NSGA)-II in multi-objective optimization studies of wind turbine blades 被引量:30
17
作者 王珑 王同光 罗源 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2011年第6期739-748,共10页
The non-dominated sorting genetic algorithm (NSGA) is improved with the controlled elitism and dynamic crowding distance. A novel multi-objective optimization algorithm is obtained for wind turbine blades. As an exa... The non-dominated sorting genetic algorithm (NSGA) is improved with the controlled elitism and dynamic crowding distance. A novel multi-objective optimization algorithm is obtained for wind turbine blades. As an example, a 5 MW wind turbine blade design is presented by taking the maximum power coefficient and the minimum blade mass as the optimization objectives. The optimal results show that this algorithm has good performance in handling the multi-objective optimization of wind turbines, and it gives a Pareto-optimal solution set rather than the optimum solutions to the conventional multi objective optimization problems. The wind turbine blade optimization method presented in this paper provides a new and general algorithm for the multi-objective optimization of wind turbines. 展开更多
关键词 wind turbine multi-objective optimization Pareto-optimal solution non-dominated sorting genetic algorithm (NSGA)-II
在线阅读 下载PDF
基于轻量化YOLO v8和BoT-SORT的石斑鱼跟踪方法
18
作者 段青玲 乔雅琪 +3 位作者 刘怡然 冯晓晓 冉逊 刘春红 《农业机械学报》 北大核心 2025年第9期667-676,共10页
水产养殖中,鱼类跟踪是实现鱼类行为监测、水质异常报警、鱼类生长状况评估的基础,但现有方法存在计算耗时长、模型占用空间大、在边缘端设备部署困难等问题。针对上述问题,本文以石斑鱼为研究对象,提出一种基于轻量化YOLO v8与BoT-SOR... 水产养殖中,鱼类跟踪是实现鱼类行为监测、水质异常报警、鱼类生长状况评估的基础,但现有方法存在计算耗时长、模型占用空间大、在边缘端设备部署困难等问题。针对上述问题,本文以石斑鱼为研究对象,提出一种基于轻量化YOLO v8与BoT-SORT的石斑鱼跟踪方法,该方法包括目标检测和目标跟踪两个阶段。在目标检测中,采用YOLO v8m作为基线网络,引入卷积模块FasterConv以减少参数量;加入EMA(Excitation and modulation attention)机制以保持模型精度;使用多尺度特征融合模块Fusion并调整Neck网络结构以提高模型的特征融合能力。在目标跟踪部分,BoT-SORT算法简化了鱼体的运动状态变量,加入相机运动补偿(Camera motion compensation,CMC)以应对鱼体外观剧烈变化,最后利用ResNeST50网络提取较高置信度检测框内鱼体的外观特征,实现了鱼体跟踪。在自建的石斑鱼数据集上进行了训练和验证,目标检测模型mAP@0.5为95.80%;其模型内存占用量为23.7 MB,相较原始YOLO v8m模型降低54.42%;将本文的轻量化目标检测模型应用到BoT-SORT算法,MOTA为78.774%,FPS达到28.20 f/s,在对比实验中综合性能大幅超过SORT、DeepMoT等算法。本方法可以实现石斑鱼的检测与跟踪,为石斑鱼的养殖提供技术支撑。 展开更多
关键词 石斑鱼 目标检测 目标跟踪 YOLO v8 BoT-sort 轻量化
在线阅读 下载PDF
A review of intelligent ore sorting technology and equipment development 被引量:12
19
作者 Xianping Luo Kunzhong He +2 位作者 Yan Zhang Pengyu He Yongbing Zhang 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2022年第9期1647-1655,共9页
Under the background of increasingly scarce ore worldwide and increasingly fierce market competition,developing the mining industry could be strongly restricted.Intelligent ore sorting equipment not only improves ore ... Under the background of increasingly scarce ore worldwide and increasingly fierce market competition,developing the mining industry could be strongly restricted.Intelligent ore sorting equipment not only improves ore use and enhances the economic benefits of enterprises but also increases the ore grade and lessens the grinding cost and tailings production.However,long-term research on intelligent ore sorting equipment found that the factors affecting sorting efficiency mainly include ore information identification technology,equipment sorting actuator,and information processing algorithm.The high precision,strong anti-interference capability,and high speed of these factors guarantee the separation efficiency of intelligent ore sorting equipment.Color ore sorter,X-ray ore transmission sorter,dual-energy X-ray transmission ore sorter,X-ray fluorescence ore sorter,and near-infrared ore sorter have been successfully developed in accordance with the different characteristics of minerals while ensuring the accuracy of equipment sorting and improving the equipment sorting efficiency.With the continuous improvement of mine automation level,the application of online element rapid analysis technology with high speed,high precision,and strong anti-interference capability in intelligent ore sorting equipment will become an inevitable trend of equipment development in the future.Laser-induced breakdown spectroscopy,transientγneutron activation analysis,online Fourier transform infrared spectroscopy,and nuclear magnetic resonance techniques will promote the development of ore sorting equipment.In addition,the improvement and joint application of additional high-speed and high-precision operation algorithms(such as peak area,principal component analysis,artificial neural network,partial least squares,and Monte Carlo library least squares methods)are an essential part of the development of intelligent ore sorting equipment in the future. 展开更多
关键词 intelligent ore sorting technology sorting equipment separation efficiency online element rapid analysis technology
在线阅读 下载PDF
Pulse-to-pulse periodic signal sorting features and feature extraction in radar emitter pulse sequences 被引量:5
20
作者 Qiang Guo Zhenshen Qu Changhong Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期382-389,共8页
A novel class of periodically changing features hidden in radar pulse sequence environment,named G features,is proposed.Combining fractal theory and Hilbert-Huang transform,the features are extracted using changing ch... A novel class of periodically changing features hidden in radar pulse sequence environment,named G features,is proposed.Combining fractal theory and Hilbert-Huang transform,the features are extracted using changing characteristics of pulse parameters in radar emitter signals.The features can be applied in modern complex electronic warfare environment to address the issue of signal sorting when radar emitter pulse signal parameters severely or even completely overlap.Experiment results show that the proposed feature class and feature extraction method can discriminate periodically changing pulse sequence signal sorting features from radar pulse signal flow with complex variant features,therefore provide a new methodology for signal sorting. 展开更多
关键词 signal sorting fractal geometry Hilbert-Huang transform(HHT) G feature extraction.
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部