期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
An automatic detection of green tide using multi-windows with their adaptive threshold from Landsat TM/ETM plus image 被引量:4
1
作者 WANG Changying CHU Jialan +3 位作者 TAN Meng SHAO Fengjing SUI Yi LI Shujing 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第11期106-114,共9页
Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of... Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of green tide is presented from Landsat TM/ETM plus image which needs not the atmospheric correction. In order to achieve an automatic detection of green tide, a linear relationship(y =0.723 x+0.504) between detection threshold y and subtraction x(x=λnir–λred) is found from the comparing Landsat TM/ETM plus image with the field surveys.Using this relationship, green tide patches can be detected automatically from Landsat TM/ETM plus image.Considering there is brightness difference between different regions in an image, the image will be divided into a plurality of windows(sub-images) with a same size firstly, and then each window will be detected using an adaptive detection threshold determined according to the discovered linear relationship. It is found that big errors will appear in some windows, such as those covered by clouds seriously. To solve this problem, the moving step k of windows is proposed to be less than the window width n. Using this mechanism, most pixels will be detected[n/k]×[n/k] times except the boundary pixels, then every pixel will be assigned the final class(green tide or sea water) according to majority rule voting strategy. It can be seen from the experiments, the proposed detection method using multi-windows and their adaptive thresholds can detect green tide from Landsat TM/ETM plus image automatically. Meanwhile, it avoids the reliance on the accurate atmospheric correction. 展开更多
关键词 automatic detection green tide adaptive threshold Landsat TM/ETM plus image
在线阅读 下载PDF
Semantics Analytics of Origin-Destination Flows from Crowd Sensed Big Data 被引量:1
2
作者 Ning Cao Shengfang Li +6 位作者 Keyong Shen Sheng Bin Gengxin Sun Dongjie Zhu Xiuli Han Guangsheng Cao Abraham Campbell 《Computers, Materials & Continua》 SCIE EI 2019年第7期227-241,共15页
Monitoring,understanding and predicting Origin-destination(OD)flows in a city is an important problem for city planning and human activity.Taxi-GPS traces,acted as one kind of typical crowd sensed data,it can be used ... Monitoring,understanding and predicting Origin-destination(OD)flows in a city is an important problem for city planning and human activity.Taxi-GPS traces,acted as one kind of typical crowd sensed data,it can be used to mine the semantics of OD flows.In this paper,we firstly construct and analyze a complex network of OD flows based on large-scale GPS taxi traces of a city in China.The spatiotemporal analysis for the OD flows complex network showed that there were distinctive patterns in OD flows.Then based on a novel complex network model,a semantics mining method of OD flows is proposed through compounding Points of Interests(POI)network and public transport network to the OD flows network.The propose method would offer a novel way to predict the location characteristic and future traffic conditions accurately. 展开更多
关键词 Origin-destination(OD)flows semantics analytics complex network big data analysis
在线阅读 下载PDF
Principle and Experimental Verification of Flexible Caudal Fin Based on Active Torsion Propulsion Mode
3
作者 Guan Yuanlin Li Huafeng +1 位作者 Yang Xixin Di Sisi 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2016年第5期595-601,共7页
The active torsion propulsion mode of a caudal fin,composed of macro fiber composites(MFC)and carbon fiber orthotropic composite material is proposed.The caudal fin is excited by the piezoelectric structure to vibrate... The active torsion propulsion mode of a caudal fin,composed of macro fiber composites(MFC)and carbon fiber orthotropic composite material is proposed.The caudal fin is excited by the piezoelectric structure to vibrate flexibly.The work principle is firstly analyzed by finite element method(FEM)and experiments.Then the caudal fin is optimized to increase the torque and improve the streamline,and the added mass effect from the water is discussed in terms of the frequency of the structure.The torsion resonance frequency is around 103 Hz in the air and decreased by 75%to 25 Hz in the water.Finally,the mean thrust is discussed and measured to be 11 mN at900V(Peak to peak)driving voltage.A flexible micro robot is developed and tested.The locomotion velocity and flow velocity is 320mm/s and 268mm/s,respectively.The results of the simulation and experiments indicate that the locomotion of the biomimetic aquatic robot has fast movement characteristics. 展开更多
关键词 macro fiber composite torsion vibration mode local travelling wave micro robot
在线阅读 下载PDF
A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine 被引量:12
4
作者 Hao Zhang Yongdan Li +2 位作者 Zhihan Lv Arun Kumar Sangaiah Tao Huang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期790-799,共10页
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network... In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions. 展开更多
关键词 DEEP BELIEF network(DBN) flow calculation frequent pattern INTRUSION detection SLIDING WINDOW support vector machine(SVM)
在线阅读 下载PDF
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing 被引量:2
5
作者 Jiabao Wen Jiachen Yang +2 位作者 Tianying Wang Yang Li Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2023年第2期473-482,共10页
To efficiently complete a complex computation task,the complex task should be decomposed into subcomputation tasks that run parallel in edge computing.Wireless Sensor Network(WSN)is a typical application of parallel c... To efficiently complete a complex computation task,the complex task should be decomposed into subcomputation tasks that run parallel in edge computing.Wireless Sensor Network(WSN)is a typical application of parallel computation.To achieve highly reliable parallel computation for wireless sensor network,the network's lifetime needs to be extended.Therefore,a proper task allocation strategy is needed to reduce the energy consumption and balance the load of the network.This paper proposes a task model and a cluster-based WSN model in edge computing.In our model,different tasks require different types of resources and different sensors provide different types of resources,so our model is heterogeneous,which makes the model more practical.Then we propose a task allocation algorithm that combines the Genetic Algorithm(GA)and the Ant Colony Optimization(ACO)algorithm.The algorithm concentrates on energy conservation and load balancing so that the lifetime of the network can be extended.The experimental result shows the algorithm's effectiveness and advantages in energy conservation and load balancing. 展开更多
关键词 Wireless sensor network Parallel computation Task allocation Genetic algorithm Ant colony optimization algorithm ENERGY-EFFICIENT Load balancing
在线阅读 下载PDF
On Two Classes of Extended 3-Lie Algebras
6
作者 Yu Cheng Yansha Gao 《Journal of Applied Mathematics and Physics》 2021年第4期834-845,共12页
In this paper, based on the existing research results, we obtain the unary extension 3-Lie algebras by one-dimensional extension of the known Lie algebra L. For two known 3-Lie algebras <em>H</em>, <em&... In this paper, based on the existing research results, we obtain the unary extension 3-Lie algebras by one-dimensional extension of the known Lie algebra L. For two known 3-Lie algebras <em>H</em>, <em>M</em>, the (<i>μ</i>, <i>ρ</i>, <i>β</i>)-extension of <em>H</em> through <em>M</em> is given, and the necessary and sufficient conditions for the (<i>μ</i>, <i>ρ</i>, <i>β</i>)-extension algebra of <em>H</em> through <em>M</em> being 3-Lie algebra are obtained, and the structural characteristics and properties of these two kinds of extended 3-Lie algebras are given. 展开更多
关键词 The Unary Extension 3-Lie Algebras Lie Algebra (μ ρ β)-Extension
在线阅读 下载PDF
Research on Factors of Linear Algebra Learning Effect
7
作者 Xin Wang Chong Hu Yunhui Wang 《Journal of Applied Mathematics and Physics》 2020年第7期1362-1373,共12页
Linear algebra has a very important application in physics and technical disciplines. This article conducted a questionnaire survey on the factors that affect the effect of linear algebra learning;the questionnaire co... Linear algebra has a very important application in physics and technical disciplines. This article conducted a questionnaire survey on the factors that affect the effect of linear algebra learning;the questionnaire contains several aspects of learning attitude, learning interest, learning methods, teaching methods, etc.;based on recycling data, cross chi-square test and multiple logistic regression analysis </span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">are </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">us</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ed</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> to obtain the factors that affect the effect of linear algebra learning. The research results show that: learning methods, learning attitudes, teaching methods and elementary algebra basics are the main factors that affect the learning effect of linear algebra;among them, there are positive correlations between teaching methods, learning methods, learning attitudes and learning effects;teaching methods, learning methods 3. The three principal components of learning attitude are positively correlated. Based on the research and analysis, the following conclusions are drawn: finding a suitable learning method for the college students and maintaining a positive learning attitude are effective means to improve the linear algebra learning effect of the college students;in teaching, it is recommended to advance with the times, the teaching content and teaching methods innovate to stimulate students’ interest in learning</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> thus improv</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ing</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the learning effect of college students’ linear algebra courses. 展开更多
关键词 Linear Algebra Learning Effect Influencing Factors
在线阅读 下载PDF
About the Optimized Design of the Parking Space on the Campus of a College
8
作者 Xin Wang Yunhui Wang Chong Hu 《American Journal of Computational Mathematics》 2020年第2期221-229,共9页
In recent years, with the large increase in the number of motor vehicles in colleges and universities and the lag in campus planning, the relative shortage of parking spaces on campus has become increasingly serious. ... In recent years, with the large increase in the number of motor vehicles in colleges and universities and the lag in campus planning, the relative shortage of parking spaces on campus has become increasingly serious. Taking Baoding College as an example, this article analyzes the current situation of static traffic on campus and finds out the problem of parking on campus through questionnaire surveys and field surveys. Analyze the growth trend of the number of motor vehicles based on the data, use the GM (1, 1) model and the linear fitting model to predict the number of motor vehicles in the future, and determine the size and layout of the parking lot based on the campus size, functional zoning, and road layout. The big campus-based parking system planning method based on big data can effectively solve the problems of small sample data, low accuracy, and poor timeliness of traditional methods, which improves the practicability and scientificity of planning results. 展开更多
关键词 Static Traffic Parking Space Planning GM (1 1) Linear Fitting
在线阅读 下载PDF
Integration of A Deep Learning Classifier with A Random Forest Approach for Predicting Malonylation Sites 被引量:5
9
作者 Zhen Chen Ningning He +3 位作者 Yu Huang Wen Tao Qin Xuhan Liu Lei Li 《Genomics, Proteomics & Bioinformatics》 SCIE CAS CSCD 2018年第6期451-459,共9页
As a newly-identified protein post-translational modification, malonylation is involved in a variety of biological functions. Recognizing malonylation sites in substrates represents an initial but crucial step in eluc... As a newly-identified protein post-translational modification, malonylation is involved in a variety of biological functions. Recognizing malonylation sites in substrates represents an initial but crucial step in elucidating the molecular mechanisms underlying protein malonylation. In this study, we constructed a deep learning(DL) network classifier based on long short-term memory(LSTM) with word embedding(LSTMWE) for the prediction of mammalian malonylation sites.LSTMWEperforms better than traditional classifiers developed with common pre-defined feature encodings or a DL classifier based on LSTM with a one-hot vector. The performance of LSTMWE is sensitive to the size of the training set, but this limitation can be overcome by integration with a traditional machine learning(ML) classifier. Accordingly, an integrated approach called LEMP was developed, which includes LSTMWEand the random forest classifier with a novel encoding of enhanced amino acid content. LEMP performs not only better than the individual classifiers but also superior to the currently-available malonylation predictors. Additionally, it demonstrates a promising performance with a low false positive rate, which is highly useful in the prediction application. Overall, LEMP is a useful tool for easily identifying malonylation sites with high confidence.LEMP is available at http://www.bioinfogo.org/lemp. 展开更多
关键词 Deep learning Recurrent neural network LSTM Malonylation Random forest
原文传递
Game theory in network security for digital twins in industry 被引量:2
10
作者 Hailin Feng Dongliang Chen +1 位作者 Haibin Lv Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1068-1078,共11页
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ... To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry. 展开更多
关键词 Digital twins Industrial internet of things Network security Game theory Attack and defense
在线阅读 下载PDF
Reinforcement learning based edge computing in B5G 被引量:1
11
作者 Jiachen Yang Yiwen Sun +4 位作者 Yutian Lei Zhuo Zhang Yang Li Yongjun Bao Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2024年第1期1-6,共6页
The development of communication technology will promote the application of Internet of Things,and Beyond 5G will become a new technology promoter.At the same time,Beyond 5G will become one of the important supports f... The development of communication technology will promote the application of Internet of Things,and Beyond 5G will become a new technology promoter.At the same time,Beyond 5G will become one of the important supports for the development of edge computing technology.This paper proposes a communication task allocation algorithm based on deep reinforcement learning for vehicle-to-pedestrian communication scenarios in edge computing.Through trial and error learning of agent,the optimal spectrum and power can be determined for transmission without global information,so as to balance the communication between vehicle-to-pedestrian and vehicle-to-infrastructure.The results show that the agent can effectively improve vehicle-to-infrastructure communication rate as well as meeting the delay constraints on the vehicle-to-pedestrian link. 展开更多
关键词 Reinforcement learning Edge computing Beyond 5G Vehicle-to-pedestrian
在线阅读 下载PDF
Research on Equipment Management System Based on Robot Laboratory
12
作者 Chong Hu Xin Wang Yunhui Wang 《Journal of Computer and Communications》 2020年第7期23-31,共9页
With the expansion of the scale of our hospital robot laboratory, equipment use, reserves are increasing, manual management equipment information has been unable to adapt to daily management, such as data record error... With the expansion of the scale of our hospital robot laboratory, equipment use, reserves are increasing, manual management equipment information has been unable to adapt to daily management, such as data record error rate increased, the number of experiments increased, equipment loss and maintenance is not clearly defined. In order to ensure the safety and accuracy of the equipment, a system of equipment management systems was developed as a result of the conversion to the use of management systems for the recording and storage of information. The design of this system is a perfect robot laboratory equipment management system based on the development of web framework technology for equipment management functions. The back end of this system uses the Java language, the SSM framework as the main body, the database is built by MySQL relational database, the front-end page uses JSP, Bootstrap, jQuery and other technologies, and uses Eclipse project construction tools for system development. After a period of trial operation, the level of laboratory equipment management has been significantly improved. 展开更多
关键词 Device Management JAVA SPRING SPRINGMVC MyBatis
在线阅读 下载PDF
3D Face Similarity Measure by Frechet Distances of Geodesics 被引量:2
13
作者 Jun-Li Zhao Zhong-Ke Wu +5 位作者 Zhen-Kuan Pan Fu-Qing Duana Jin-Hua Li Zhi-Han Lv Kang Wang Yu-Cong Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第1期207-222,共16页
3D face similarity is a critical issue in computer vision, computer graphics and face recognition and so on. Since Fr@chet distance is an effective metric for measuring curve similarity, a novel 3D face similarity mea... 3D face similarity is a critical issue in computer vision, computer graphics and face recognition and so on. Since Fr@chet distance is an effective metric for measuring curve similarity, a novel 3D face similarity measure method based on Fr^chet distances of geodesics is proposed in this paper. In our method, the surface similarity between two 3D faces is measured by the similarity between two sets of 3D curves on them. Due to the intrinsic property of geodesics, we select geodesics as the comparison curves. Firstly, the geodesics on each 3D facial model emanating from the nose tip point are extracted in the same initial direction with equal angular increment. Secondly, the Fr@chet distances between the two sets of geodesics on the two compared facial models are computed. At last, the similarity between the two facial models is computed based on the Fr6chet distances of the geodesics obtained in the second step. We verify our method both theoretically and practically. In theory, we prove that the similarity of our method satisfies three properties: reflexivity, symmetry, and triangle inequality. And in practice, experiments are conducted on the open 3D face database GavaDB, Texas 3D Face Recognition database, and our 3D face database. After the comparison with iso-geodesic and Hausdorff distance method, the results illustrate that our method has good discrimination ability and can not only identify the facial models of the same person, but also distinguish the facial models of any two different persons. 展开更多
关键词 3D face similarity measure Frechet distance GEODESIC
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部