期刊文献+
共找到1,457篇文章
< 1 2 73 >
每页显示 20 50 100
Hyperparameter on-line learning of stochastic resonance based threshold networks
1
作者 Weijin Li Yuhao Ren Fabing Duan 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第8期289-295,共7页
Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optim... Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optimized by various gradientbased optimizers. The introduction of injected noise extends the noise level into the parameter space of the designed threshold network, but leads to a highly non-convex optimization landscape of the loss function. Thus, the hyperparameter on-line learning procedure with respective to network weights and noise levels becomes of challenge. It is shown that the Adam optimizer, as an adaptive variant of stochastic gradient descent, manifests its superior learning ability in training the stochastic resonance based threshold network effectively. Experimental results demonstrate the significant improvement of performance of the designed threshold network trained by the Adam optimizer for function approximation and image classification. 展开更多
关键词 noise injection adaptive stochastic resonance threshold neural network hyperparameter learning
原文传递
APPLICATION OF NOISE REDUCTION METHOD BASED ON CURVELET THRESHOLDING NEURAL NETWORK FOR POLAR ICE RADAR DATA PROCESSING 被引量:1
2
作者 Wang Wenpeng Zhao Bo Liu Xiaojun 《Journal of Electronics(China)》 2013年第4期377-383,共7页
Due to the demand of data processing for polar ice radar in our laboratory, a Curvelet Thresholding Neural Network (TNN) noise reduction method is proposed, and a new threshold function with infinite-order continuous ... Due to the demand of data processing for polar ice radar in our laboratory, a Curvelet Thresholding Neural Network (TNN) noise reduction method is proposed, and a new threshold function with infinite-order continuous derivative is constructed. The method is based on TNN model. In the learning process of TNN, the gradient descent method is adopted to solve the adaptive optimal thresholds of different scales and directions in Curvelet domain, and to achieve an optimal mean square error performance. In this paper, the specific implementation steps are presented, and the superiority of this method is verified by simulation. Finally, the proposed method is used to process the ice radar data obtained during the 28th Chinese National Antarctic Research Expedition in the region of Zhongshan Station, Antarctica. Experimental results show that the proposed method can reduce the noise effectively, while preserving the edge of the ice layers. 展开更多
关键词 Radar data processing thresholding Neural network (TNN) CURVELET Ice radar
在线阅读 下载PDF
Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks
3
作者 Hao Niu Taiyi Zhang Li Sun 《Communications and Network》 2010年第2期87-92,共6页
Relay selection is an effective method to realize the cooperative diversity gain in wireless networks. In this paper, we study a threshold-based single relay selection algorithm. A reasonable threshold value is set at... Relay selection is an effective method to realize the cooperative diversity gain in wireless networks. In this paper, we study a threshold-based single relay selection algorithm. A reasonable threshold value is set at each relay node, and the first relay with the instantaneous channel gain larger than the threshold will be se-lected to cooperate with the source. The exact and closed form expression for its outage probability is de-rived over independent, non-identically distributed (i. n. i. d) Rayleigh channels. The complexity of the algo-rithm is also analyzed in detail. Simulation results are presented to verify our theoretical analysis. 展开更多
关键词 RELAY Selection OUTAGE PROBABILITY threshold Wireless networks
在线阅读 下载PDF
A New Communication Scheme for Threshold Certificate Authority in Ad Hoc Networks
4
作者 LiGuang-song LIHong RANWen-bao 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期123-126,共4页
We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactiv... We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast. 展开更多
关键词 Ad hoc networks key management threshold cryptography CA (certificateauthority) MULTICAST
在线阅读 下载PDF
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks 被引量:1
5
作者 陈曦 田有亮 +1 位作者 李兴华 马建峰 《China Communications》 SCIE CSCD 2011年第4期132-140,共9页
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-... In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. 展开更多
关键词 opportunistic networks social context-based routing identity-based signature threshold cryptography
在线阅读 下载PDF
Quantitative evaluation of extrinsic factors influencing electrical excitability in neuronal networks: Voltage Threshold Measurement Method(VTMM)
6
作者 Shuai An Yong-Fang Zhao +1 位作者 Xiao-Ying Lu Zhi-Gong Wang 《Neural Regeneration Research》 SCIE CAS CSCD 2018年第6期1026-1035,共10页
The electrical excitability of neural networks is influenced by different environmental factors. Effective and simple methods are required to objectively and quantitatively evaluate the influence of such factors, incl... The electrical excitability of neural networks is influenced by different environmental factors. Effective and simple methods are required to objectively and quantitatively evaluate the influence of such factors, including variations in temperature and pharmaceutical dosage. The aim of this paper was to introduce ‘the voltage threshold measurement method', which is a new method using microelectrode arrays that can quantitatively evaluate the influence of different factors on the electrical excitability of neural networks. We sought to verify the feasibility and efficacy of the method by studying the effects of acetylcholine, ethanol, and temperature on hippocampal neuronal networks and hippocampal brain slices. First, we determined the voltage of the stimulation pulse signal that elicited action potentials in the two types of neural networks under normal conditions. Second, we obtained the voltage thresholds for the two types of neural networks under different concentrations of acetylcholine, ethanol, and different temperatures. Finally, we obtained the relationship between voltage threshold and the three influential factors. Our results indicated that the normal voltage thresholds of the hippocampal neuronal network and hippocampal slice preparation were 56 and 31 m V, respectively. The voltage thresholds of the two types of neural networks were inversely proportional to acetylcholine concentration, and had an exponential dependency on ethanol concentration. The curves of the voltage threshold and the temperature of the medium for the two types of neural networks were U-shaped. The hippocampal neuronal network and hippocampal slice preparations lost their excitability when the temperature of the medium decreased below 34 and 33°C or increased above 42 and 43°C, respectively. These results demonstrate that the voltage threshold measurement method is effective and simple for examining the performance/excitability of neuronal networks. 展开更多
关键词 nerve regeneration threshold voltage microelectrode array electrical excitability of neural networks ACETYLCHOLINE ALCOHOL temperature hippocampal neuronal network hippocampal slice electrical stimulation action potentials neural regeneration
暂未订购
考虑列车运行位置的动态充放电阈值控制策略
7
作者 于金海 王欣 郭云龙 《湖南工业大学学报》 2026年第1期24-32,共9页
针对列车在多客运站运行过程中,牵引网电压波动剧烈、再生制动能量浪费严重以及线路损耗过高的问题,提出了一种基于列车运行位置和车载超级电容荷电状态的动态调整充放电阈值方法。通过能量优先原则,对系统的运行工况进行精确划分,以实... 针对列车在多客运站运行过程中,牵引网电压波动剧烈、再生制动能量浪费严重以及线路损耗过高的问题,提出了一种基于列车运行位置和车载超级电容荷电状态的动态调整充放电阈值方法。通过能量优先原则,对系统的运行工况进行精确划分,以实现稳定牵引网电压。此外,为进一步减少牵引网的“阶跃”现象,将一种基于SOC状态的电压阈值变化率策略,与固定电压阈值变化率相比,得出该策略能更有效地减少线路损耗。最后,采用动态权重因子的粒子群对控制参数进行优化,并由长沙列车数据求解得到帕累托最优解集。结果表明,在相同控制参数下,与其他控制策略相比,该策略有效提高了系统的节能率和稳压性。 展开更多
关键词 再生制动能量 列车运行位置 荷电状态 牵引网阶跃 电压阈值变化率
在线阅读 下载PDF
Traffic dynamics considering packet loss in finite buffer networks 被引量:2
8
作者 Jie Chen Jin-Yong Chen +1 位作者 Ming Li Mao-Bin Hu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第4期433-438,共6页
In real complex systems, the limited storage capacity of physical devices often results in the loss of data. We study the effect of buffer size on packet loss threshold in scale-free networks. A new order parameter is... In real complex systems, the limited storage capacity of physical devices often results in the loss of data. We study the effect of buffer size on packet loss threshold in scale-free networks. A new order parameter is proposed to characterize the packet loss threshold. Our results show that the packet loss threshold can be optimized with a relative small buffer size. Meanwhile, a large buffer size will increase the travel time. Furthermore, we propose a Buffered-Shortest-Path-First(BSPF) queuing strategy. Compared to the traditional First-In-First-Out(FIFO) strategy, BSPF can not only increase the packet loss threshold but can also significantly decrease the travel length and travel time in both identical and heterogeneous node capacity cases. Our study will help to improve the traffic performance in finite buffer networks. 展开更多
关键词 FINITE BUFFER networkS LOSS threshold QUEUING strategy
原文传递
An efficient proactive RSA scheme for large-scale ad hoc networks 被引量:1
9
作者 张瑞山 陈克非 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期64-67,共4页
A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key dis... A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient. 展开更多
关键词 ad hoc networks threshold signature proactive secret sharing RSA
在线阅读 下载PDF
Epidemic thresholds in a heterogenous population with competing strains 被引量:1
10
作者 吴庆初 傅新楚 杨孟 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期384-390,共7页
Among many epidemic models, one epidemic disease may transmit with the existence of other pathogens or other strains from the same pathogen. In this paper, we consider the case where all of the strains obey the suscep... Among many epidemic models, one epidemic disease may transmit with the existence of other pathogens or other strains from the same pathogen. In this paper, we consider the case where all of the strains obey the susceptible-infected- susceptible mechanism and compete with each other at the expense of common susceptible individuals. By using the heterogenous mean-field approach, we discuss the epidemic threshold for one of two strains. We confirm the existence of epidemic threshold in both finite and infinite populations subject to underlying epidemic transmission. Simulations in the Barabasi-Albert (BA) scale-free networks are in good agreement with the analytical results. 展开更多
关键词 complex network epidemic threshold epidemic dynamics
原文传递
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
11
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
在线阅读 下载PDF
Dynamical behaviour of an epidemic on complex networks with population mobility 被引量:2
12
作者 张海峰 Small Michael +1 位作者 傅新楚 汪秉宏 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第9期3639-3646,共8页
In this paper, we study the dynamical behaviour of an epidemic on complex networks with population mobility. In our model, the number of people on each node is unrestricted as the nodes of the network are considered a... In this paper, we study the dynamical behaviour of an epidemic on complex networks with population mobility. In our model, the number of people on each node is unrestricted as the nodes of the network are considered as cities, communities, and so on. Because people can travel between different cities, we study the effect of a population's mobility on the epidemic spreading. In view of the population's mobility, we suppose that the susceptible individual can be infected by an infected individual in the same city or other connected cities. Simulations are presented to verify our analysis. 展开更多
关键词 complex network MOBILITY HETEROGENEITY epidemic threshold
原文传递
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
13
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION threshold CRYPTOGRAPHY threshold DECRYPTION ASYNCHRONOUS networks
暂未订购
Hand segmentation from a single depth image based on histogram threshold selection and shallow CNN 被引量:1
14
作者 XU Zhengze ZHANG Wenjun 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2018年第5期675-685,共11页
Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the ha... Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms). 展开更多
关键词 HAND SEGMENTATION HISTOGRAM threshold selection convolutional neural network(CNN) depth map
在线阅读 下载PDF
Epidemic spreading on a scale-free network with awareness 被引量:1
15
作者 鲁延玲 蒋国平 宋玉蓉 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期44-48,共5页
This paper presents a modified susceptible-infected-recovered(SIR) model with the effects of awareness and vaccination to study the epidemic spreading on scale-free networks based on the mean-field theory.In this mo... This paper presents a modified susceptible-infected-recovered(SIR) model with the effects of awareness and vaccination to study the epidemic spreading on scale-free networks based on the mean-field theory.In this model,when susceptible individuals receive awareness from their infected neighbor nodes,they will take vaccination measures.The theoretical analysis and the numerical simulations show that the existence of awareness and vaccination can significantly improve the epidemic threshold and reduce the risk of virus outbreaks.In addition,regardless of the existence of vaccination,the awareness can increase the spreading threshold and slow the spreading speed effectively.For a given awareness and a certain spreading rate,the total number of infections reduces with the increasing vaccination rate. 展开更多
关键词 scale-free network AWARENESS VACCINATION epidemic threshold
原文传递
Threshold Determination and Analysis of Laser Pulse Range Finder
16
作者 殷聪 韩绍坤 +2 位作者 刘巽亮 张化朋 赵跃进 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期236-239,共4页
Under different conditions, the highest detection probability should be acquired while receiving laser echo during laser pulse range finding. The threshold voltage of the signal detection can be set corresponding ... Under different conditions, the highest detection probability should be acquired while receiving laser echo during laser pulse range finding. The threshold voltage of the signal detection can be set corresponding to different conditions by using resistor network. As a feedback loop, automatic noise threshold circuit could change the threshold voltage following the noise level. The threshold can track the noise closely, rapidly and accurately by adopting this combination. Therefore, the receiving capability of laser echo receiving system will be maximized, and it can detect weaker laser pulse from noise. 展开更多
关键词 signal detection threshold resistor network automatic noise threshold circuit
在线阅读 下载PDF
An Efcient Hop Count Routing Protocol for Wireless Ad Hoc Networks 被引量:3
17
作者 Xu Zhang Zhi-Hong Qian +1 位作者 Yu-Qi Guo Xue Wang 《International Journal of Automation and computing》 EI CSCD 2014年第1期93-99,共7页
An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networ... An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay. 展开更多
关键词 Wireless ad hoc networks routing protocol hop count threshold transmission power
原文传递
Adaptive Threshold Estimation of Open Set Voiceprint Recognition Based on OTSU and Deep Learning 被引量:1
18
作者 Xudong Li Xinjia Yang Linhua Zhou 《Journal of Applied Mathematics and Physics》 2020年第11期2671-2682,共12页
Aiming at the problem of open set voiceprint recognition, this paper proposes an adaptive threshold algorithm based on OTSU and deep learning. The bottleneck technology of open set voiceprint recognition lies in the c... Aiming at the problem of open set voiceprint recognition, this paper proposes an adaptive threshold algorithm based on OTSU and deep learning. The bottleneck technology of open set voiceprint recognition lies in the calculation of similarity values and thresholds of speakers inside and outside the set. This paper combines deep learning and machine learning methods, and uses a Deep Belief Network stacked with three layers of Restricted Boltzmann Machines to extract deep voice features from basic acoustic features. And by training the Gaussian Mixture Model, this paper calculates the similarity value of the feature, and further determines the threshold of the similarity value of the feature through OTSU. After experimental testing, the algorithm in this paper has a false rejection rate of 3.00% for specific speakers, a false acceptance rate of 0.35% for internal speakers, and a false acceptance rate of 0 for external speakers. This improves the accuracy of traditional methods in open set voiceprint recognition. This proves that the method is feasible and good recognition effect. 展开更多
关键词 Voiceprint Recognition Deep Neural network (DNN) OTSU Adaptive threshold
在线阅读 下载PDF
Empirical Study of "Double Threshold" Modified Model on New Product Diffusion
19
作者 LIU Dan SHENG Qiran XIN Zhanhong CAO Jiantong 《China Communications》 SCIE CSCD 2014年第12期44-53,共10页
The innovations actually diffuse among social network nowadays.Individual heterogeneity,interactions between individuals and network topology influence a lot.We established a "double threshold" modified mode... The innovations actually diffuse among social network nowadays.Individual heterogeneity,interactions between individuals and network topology influence a lot.We established a "double threshold" modified model and took the number of neighbors,neighbors' adoption and the cost-benefit parameters as crucial influencing factors.The diffusion of DaLingTong(CDMA450)products in MeiShan city of SiChuan province during 2004 to 2007 has been used to verity the model on Matlab.The validation results fit the actual diffusion pattern of DaLingTong(CDMA450) products very well.The results indicate that there exists a "tipping point(threshold)" in the process of innovation diffusion.If the initial adoption quantity is larger than the tipping point,then the product will spread to a large portion of people,otherwise is will collapse to zero.The model can effectively predict the diffusion of new products,and can influence the diffusion process by changing the value of the parameters. 展开更多
关键词 innovation diffusion threshold innovation model empirical study social network
在线阅读 下载PDF
A dynamic epidemic control model on uncorrelated complex networks 被引量:4
20
作者 裴伟东 陈增强 袁著社 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期373-379,共7页
In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptib... In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptible-infectedrecovered (SIR) model on the above networks, but it can reduce the prevalence of the infected individuals remarkably. This result may help us understand epidemic spreading phenomena on real networks and design appropriate strategies to control infections. 展开更多
关键词 complex networks dynamic quarantining mechanism QSIR model epidemic threshold
原文传递
上一页 1 2 73 下一页 到第
使用帮助 返回顶部