期刊文献+
共找到3,586篇文章
< 1 2 180 >
每页显示 20 50 100
Design and Development an Interactive On-the-Job Training Monitoring and Help Desk System with SMS for College of Information and Communication Technology
1
作者 Apple Grace G. Oliveros 《Journal of Computer and Communications》 2022年第7期72-89,共18页
This study aimed to develop An Interactive On-the-Job Training Monitoring and Help Desk System with SMS for the College of Information and Communication Technology Nueva Ecija University of Science and Technology. The... This study aimed to develop An Interactive On-the-Job Training Monitoring and Help Desk System with SMS for the College of Information and Communication Technology Nueva Ecija University of Science and Technology. The system made the OJT course procedure trouble-free by emerging a system accessible through the internet. Students have a user account, which gives them the aptitude to upload document files of their reports, thereby minimizing the time and energy spent traveling from the company’s location to the university and the other way around. Similarly, the OJT coordinators of the college are given their accounts to access and check the reports submitted by the students. The system is capable of generating reports and requirements in real-time, as long as all data is stored within the database and, therefore, the process is completed online. In addition, the system provides an interactive website that might help both students and coordinators to communicate instantaneously by having an online help desk where the students can ask related questions on their OJT course that the OJT coordinator and other students will answer. The coordinators can send a brief message service to the students enrolled within the OJT course through the utilization of the proposed system - this can be for the students who aren’t capable of opening their account more often, in order that they are still informed of the announcements they need to understand immediately. The interactive OJT help desk system with SMS can be used as a tool to help the students of the College of Information and Communication Technology (CICT) and the OJT coordinators in their tasks more conveniently. 展开更多
关键词 Short Message Service (SMS) Application Program Interface (API) On-the-Job Training PHP BOOTSTRAP MYSQL
下载PDF
Information-Theoretic Limits on Compression of Semantic Information
2
作者 Tang Jiancheng Yang Qianqian Zhang Zhaoyang 《China Communications》 SCIE CSCD 2024年第7期1-16,共16页
As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communi... As conventional communication systems based on classic information theory have closely approached Shannon capacity,semantic communication is emerging as a key enabling technology for the further improvement of communication performance.However,it is still unsettled on how to represent semantic information and characterise the theoretical limits of semantic-oriented compression and transmission.In this paper,we consider a semantic source which is characterised by a set of correlated random variables whose joint probabilistic distribution can be described by a Bayesian network.We give the information-theoretic limit on the lossless compression of the semantic source and introduce a low complexity encoding method by exploiting the conditional independence.We further characterise the limits on lossy compression of the semantic source and the upper and lower bounds of the rate-distortion function.We also investigate the lossy compression of the semantic source with two-sided information at the encoder and decoder,and obtain the corresponding rate distortion function.We prove that the optimal code of the semantic source is the combination of the optimal codes of each conditional independent set given the side information. 展开更多
关键词 rate distortion semantic communication semantic compression
下载PDF
Intelligent recognition and information extraction of radar complex jamming based on time-frequency features
3
作者 PENG Ruihui WU Xingrui +3 位作者 WANG Guohong SUN Dianxing YANG Zhong LI Hongwen 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1148-1166,共19页
In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise p... In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results. 展开更多
关键词 complex jamming recognition time frequency feature convolutional neural network(CNN) parameter estimation
下载PDF
Discussion on the Status Quo of Vocational College Students’Self-Image and its Improvement Strategies
4
作者 Qian Shi 《Journal of Contemporary Educational Research》 2024年第1期121-126,共6页
An individual’s self-image is a multi-dimensional and multi-structural concept.Its internal dimensions include ability,knowledge,values,personality,and temperament,and its external dimensions are physical appearance,... An individual’s self-image is a multi-dimensional and multi-structural concept.Its internal dimensions include ability,knowledge,values,personality,and temperament,and its external dimensions are physical appearance,behavior,and clothing.A good image will have a positive impact both in life and at work.We will choose appropriate clothing and makeup to modify the external image and cultivate positive qualities such as correct values and an optimistic attitude towards life to enhance internal dimensions.Among them,“personality”and“ability”mostly belong to the research category of mental health education,and“values”fit in the research field of ideological and political education.Ideological and political education and mental health education are both important components of higher education,which show similarities between them.Ideological and political education and mental health education can complement each other in many ways to enhance students’self-image. 展开更多
关键词 SELF-IMAGE Ideological and political education Mental health education Multi-channel improvement
下载PDF
Intelligent Small Sample Defect Detection of Concrete Surface Using Novel Deep Learning Integrating Improved YOLOv5 被引量:2
5
作者 Yongming Han Lei Wang +1 位作者 Youqing Wang Zhiqiang Geng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期545-547,共3页
Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The p... Dear Editor,This letter presents an intelligent small sample defect detection of concrete surface using novel deep learning integrating the improved YOLOv5 based on the Wasserstein GAN(WGAN)enhancement algorithm.The proposed method is capable of producing top-notch data sets to address the issues of insufficient samples and substandard quality. 展开更多
关键词 CONCRETE integrating ALGORITHM
下载PDF
Design and Implementation of Secure and Reliable Information Interaction Architecture for Digital Twins
6
作者 Qian Wang Wanwan Wu +3 位作者 Liping Qian Yiming Cai Jiang Qian Limin Meng 《China Communications》 SCIE CSCD 2023年第2期79-93,共15页
In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and... In order to improve the comprehensive defense capability of data security in digital twins(DTs),an information security interaction architecture is proposed in this paper to solve the inadequacy of data protection and transmission mechanism at present.Firstly,based on the advanced encryption standard(AES)encryption,we use the keystore to expand the traditional key,and use the digital pointer to avoid the key transmission in a wireless channel.Secondly,the identity authentication technology is adopted to ensure the data integrity,and an automatic retransmission mechanism is added for the endogenous properties of the wireless channel.Finally,the software defined radio(SDR)platform composed of universal software radio peripheral(USRP)and GNU radio is used to simulate the data interaction between the physical entity and the virtual entity.The numerical results show that the DTs architecture can guarantee the encrypted data transmitted completely and decrypted accurately with high efficiency and reliability,thus providing a basis for intelligent and secure information interaction for DTs in the future. 展开更多
关键词 digital twins AES encryption digital pointer identity authentication automatic retransmission SDR
下载PDF
Quantum correlation enhanced bound of the information exclusion principle
7
作者 张钧 贺衎 +1 位作者 张昊 于长水 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期137-143,共7页
We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables&... We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory. 展开更多
关键词 quantum correlation information exclusion principle entropic uncertainty relation
下载PDF
The Journey/DAO/TAO of Embodied Intelligence: From Large Models to Foundation Intelligence and Parallel Intelligence 被引量:1
8
作者 Tianyu Shen Jinlin Sun +4 位作者 Shihan Kong Yutong Wang Juanjuan Li Xuan Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1313-1316,共4页
THE tremendous impact of large models represented by ChatGPT[1]-[3]makes it necessary to con-sider the practical applications of such models[4].However,for an artificial intelligence(AI)to truly evolve,it needs to pos... THE tremendous impact of large models represented by ChatGPT[1]-[3]makes it necessary to con-sider the practical applications of such models[4].However,for an artificial intelligence(AI)to truly evolve,it needs to possess a physical“body”to transition from the virtual world to the real world and evolve through interaction with the real environments.In this context,“embodied intelligence”has sparked a new wave of research and technology,leading AI beyond the digital realm into a new paradigm that can actively act and perceive in a physical environment through tangible entities such as robots and automated devices[5]. 展开更多
关键词 INTELLIGENCE DAO TAO
下载PDF
Direction finding of bistatic MIMO radar in strong impulse noise
9
作者 CHEN Menghan GAO Hongyuan +2 位作者 DU Yanan CHENG Jianhua ZHANG Yuze 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期888-898,共11页
For bistatic multiple-input multiple-output(MIMO)radar,this paper presents a robust and direction finding method in strong impulse noise environment.By means of a new lower order covariance,the method is effective in ... For bistatic multiple-input multiple-output(MIMO)radar,this paper presents a robust and direction finding method in strong impulse noise environment.By means of a new lower order covariance,the method is effective in suppressing impulse noise and achieving superior direction finding performance using the maximum likelihood(ML)estimation method.A quantum equilibrium optimizer algorithm(QEOA)is devised to resolve the corresponding objective function for efficient and accurate direc-tion finding.The results of simulation reveal the capability of the presented method in success rate and root mean square error over existing direction-finding methods in different application situations,e.g.,locating coherent signal sources with very few snapshots in strong impulse noise.Other than that,the Cramér-Rao bound(CRB)under impulse noise environment has been drawn to test the capability of the presented method. 展开更多
关键词 bistatic multiple-input multiple-output(MIMO)radar impulse noise direction finding lower order covariance quan-tum equilibrium optimizer algorithm(QEOA) maximum likeli-hood estimation method Cramér-Rao bound(CRB)
下载PDF
Adaptive Event-Triggered Time-Varying Output Group Formation Containment Control of Heterogeneous Multiagent Systems
10
作者 Lihong Feng Bonan Huang +2 位作者 Jiayue Sun Qiuye Sun Xiangpeng Xie 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1398-1409,共12页
In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number... In this paper,a class of time-varying output group formation containment control problem of general linear hetero-geneous multiagent systems(MASs)is investigated under directed topology.The MAS is composed of a number of tracking leaders,formation leaders and followers,where two different types of leaders are used to provide reference trajectories for movement and to achieve certain formations,respectively.Firstly,compen-sators are designed whose states are estimations of tracking lead-ers,based on which,a controller is developed for each formation leader to accomplish the expected formation.Secondly,two event-triggered compensators are proposed for each follower to evalu-ate the state and formation information of the formation leaders in the same group,respectively.Subsequently,a control protocol is designed for each follower,utilizing the output information,to guide the output towards the convex hull generated by the forma-tion leaders within the group.Next,the triggering sequence in this paper is decomposed into two sequences,and the inter-event intervals of these two triggering conditions are provided to rule out the Zeno behavior.Finally,a numerical simulation is intro-duced to confirm the validity of the proposed results. 展开更多
关键词 Adaptive control event-triggered mechanisms for-mation containment(FC) heterogeneous multiagent systems time-varying group formation.
下载PDF
Magneto-optical Kerr Effect of Mono-layer NiX_(2)(X=Cl,Br,I):A Density Functional Theory Study
11
作者 FAN Qingqian DU Chaochao 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第5期1121-1128,共8页
The full-potential linearized augmented plane wave plus local orbital method is utilized for exploring the electronic,magnetic,and magneto-optical properties of the NiX_(2)(X=Cl,Br,and I)single layer.The first-princip... The full-potential linearized augmented plane wave plus local orbital method is utilized for exploring the electronic,magnetic,and magneto-optical properties of the NiX_(2)(X=Cl,Br,and I)single layer.The first-principles calculation demonstrates that these compounds are ferromagnetic indirect semiconductors,and the energy band gaps of NiX_(2)for X=Cl,Br,and I are 3.888,3.134,and 2.157 eV,respectively.The magnetic moments of Ni atoms in NiX_(2)monolayer are 1.656,1.588,1.449μB,and their magneto-crystalline anisotropy energies are 0.167,0.029,0.090 meV,respectively.Based on the macro-linear response theory,we systematically studied the influences of the external magnetic field and out-of-plane strain on the magneto-optical Kerr effect(MOKE)spectrum of the NiX_(2)single layer.It is found that,when the external magnetic field is perpendicular to the sample plane,the value of the Kerr rotation angle reaches the maximum,and the single-layer NiI_(2)material has a Kerr rotation angle of 1.89°at the photon energy of 1.986 eV.Besides,the Kerr rotation spectrum of NiCl_(2)and NiBr_(2)monolayers redshift as the out-of-plane strain increases,while NiI_(2)monolayer blueshifts.Accurate computation of the MOKE spectrum of NiX_(2)materials provides an opportunity for applications of 2D magnetic material ranging from sensing to data storing. 展开更多
关键词 magneto-optical Kerr effect(MOKE) first-principles calculations external magnetic field out-of-plane strain
下载PDF
Phenotypic Image Recognition of Asparagus Stem Blight Based on Improved YOLOv8
12
作者 Shunshun Ji Jiajun Sun Chao Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第9期4017-4029,共13页
Asparagus stem blight,also known as“asparagus cancer”,is a serious plant disease with a regional distribution.The widespread occurrence of the disease has had a negative impact on the yield and quality of asparagus ... Asparagus stem blight,also known as“asparagus cancer”,is a serious plant disease with a regional distribution.The widespread occurrence of the disease has had a negative impact on the yield and quality of asparagus and has become one of the main problems threatening asparagus production.To improve the ability to accurately identify and localize phenotypic lesions of stem blight in asparagus and to enhance the accuracy of the test,a YOLOv8-CBAM detection algorithm for asparagus stem blight based on YOLOv8 was proposed.The algorithm aims to achieve rapid detection of phenotypic images of asparagus stem blight and to provide effective assistance in the control of asparagus stem blight.To enhance the model’s capacity to capture subtle lesion features,the Convolutional Block AttentionModule(CBAM)is added after C2f in the head.Simultaneously,the original CIoU loss function in YOLOv8 was replaced with the Focal-EIoU loss function,ensuring that the updated loss function emphasizes higher-quality bounding boxes.The YOLOv8-CBAM algorithm can effectively detect asparagus stem blight phenotypic images with a mean average precision(mAP)of 95.51%,which is 0.22%,14.99%,1.77%,and 5.71%higher than the YOLOv5,YOLOv7,YOLOv8,and Mask R-CNN models,respectively.This greatly enhances the efficiency of asparagus growers in identifying asparagus stem blight,aids in improving the prevention and control of asparagus stem blight,and is crucial for the application of computer vision in agriculture. 展开更多
关键词 YOLOv8 asparagus stem blight image recognition PEST
下载PDF
Operational optimization of copper flotation process based on the weighted Gaussian process regression and index-oriented adaptive differential evolution algorithm
13
作者 Zhiqiang Wang Dakuo He Haotian Nie 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第2期167-179,共13页
Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation indust... Concentrate copper grade(CCG)is one of the important production indicators of copper flotation processes,and keeping the CCG at the set value is of great significance to the economic benefit of copper flotation industrial processes.This paper addresses the fluctuation problem of CCG through an operational optimization method.Firstly,a density-based affinity propagationalgorithm is proposed so that more ideal working condition categories can be obtained for the complex raw ore properties.Next,a Bayesian network(BN)is applied to explore the relationship between the operational variables and the CCG.Based on the analysis results of BN,a weighted Gaussian process regression model is constructed to predict the CCG that a higher prediction accuracy can be obtained.To ensure the predicted CCG is close to the set value with a smaller magnitude of the operation adjustments and a smaller uncertainty of the prediction results,an index-oriented adaptive differential evolution(IOADE)algorithm is proposed,and the convergence performance of IOADE is superior to the traditional differential evolution and adaptive differential evolution methods.Finally,the effectiveness and feasibility of the proposed methods are verified by the experiments on a copper flotation industrial process. 展开更多
关键词 Weighted Gaussian process regression Index-oriented adaptive differential evolution Operational optimization Copper flotation process
下载PDF
Chimera states of phase oscillator populations with nonlocal higher-order couplings
14
作者 伍勇刚 余华健 +1 位作者 郑志刚 徐灿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期402-407,共6页
The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order... The chimera states underlying many realistic dynamical processes have attracted ample attention in the area of dynamical systems.Here, we generalize the Kuramoto model with nonlocal coupling incorporating higher-order interactions encoded with simplicial complexes.Previous works have shown that higher-order interactions promote coherent states.However, we uncover the fact that the introduced higher-order couplings can significantly enhance the emergence of the incoherent state.Remarkably, we identify that the chimera states arise as a result of multi-attractors in dynamic states.Importantly, we review that the increasing higher-order interactions can significantly shape the emergent probability of chimera states.All the observed results can be well described in terms of the dimension reduction method.This study is a step forward in highlighting the importance of nonlocal higher-order couplings, which might provide control strategies for the occurrence of spatial-temporal patterns in networked systems. 展开更多
关键词 synchronization complex system coupled oscillators phase transition
下载PDF
OFDM with Generalized Cascade Index Modulation for Secure Communications
15
作者 Hu Zeng Jin Xiaopin +3 位作者 Yao Yudong Chen Fangjiong Wan Dehuan Liu Yun 《China Communications》 SCIE CSCD 2024年第10期210-225,共16页
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM ope... Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM. 展开更多
关键词 cascade index modulation low-complexity detector maximum likelihood OFDM physical layer security
下载PDF
THE LONG TIME BEHAVIOR OF THE FRACTIONAL ORNSTEIN-UHLENBECK PROCESS WITH LINEAR SELF-REPELLING DRIFT
16
作者 夏晓宇 闫理坦 杨晴 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期671-685,共15页
Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)... Let B^(H) be a fractional Brownian motion with Hurst index 1/2≤H<1.In this paper,we consider the equation(called the Ornstein-Uhlenbeck process with a linear self-repelling drift)dX_(t)^(H)=dB_(t)^(H)+σ X_(t)^(H)dt+vdt-θ(∫_(0)^(t)(X_(t)^(H)-X_(s)^(H))ds)dt,whereθ<0,σ,v∈ℝ.The process is an analogue of self-attracting diffusion(Cranston,Le Jan.Math Ann,1995,303:87–93).Our main aim is to study the large time behaviors of the process.We show that the solution X^(H)diverges to infinity as t tends to infinity,and obtain the speed at which the process X^(H)diverges to infinity. 展开更多
关键词 fractional Brownian motion stochastic difference equations rate of convergence ASYMPTOTIC
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
17
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
Detection of fusarium head blight using a YOLOv5s-based method improved by attention mechanism
18
作者 Lei Shi Chengkai Yang +4 位作者 Xiaoyun Sun Jiayue Sun Ping Dong Shufeng Xiong Jian Wang 《International Journal of Agricultural and Biological Engineering》 SCIE 2024年第5期247-254,共8页
Fusarium head blight (FHB) is one of the most destructive diseases in global wheat production. In order to count the FHB-infected wheat ears under field conditions, this study proposed an algorithm for diseased wheat ... Fusarium head blight (FHB) is one of the most destructive diseases in global wheat production. In order to count the FHB-infected wheat ears under field conditions, this study proposed an algorithm for diseased wheat ear detection based on improved YOLOv5s (Tr-YOLOv5s). The Swin Transformer was used to replace the CSPDarknet backbone network to enhance the extraction of characteristic information of the population wheat ears of FHB in the field background. The convolutional block attention module (CBAM) attention mechanism was added to improve the detection effect of target wheat ears, subsequently improving the overall accuracy of the model. The original loss function complete intersection over union (CIoU) was replaced by Scylla intersection over union (SIoU) loss to accelerate the model convergence and decrease the loss value. The results showed that the mean average precision (mAP) of the Tr-YOLOv5s model reached 90.64%, making a 4.63% improvement compared to the original YOLOv5s model. The improved model could quickly detect and count wheat FHB ear in the field environment, which laid a foundation for the subsequent automatic disease identification and grading of wheat FHB under field conditions. 展开更多
关键词 fusarium head blight YOLOv5s attention mechanism Swin Transformer loss function
原文传递
An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
19
作者 Linlin Yuan Tiantian Zhang +2 位作者 Yuling Chen Yuxiang Yang Huang Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1561-1579,共19页
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff... The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss. 展开更多
关键词 Blockchain big data K-ANONYMITY 2-means clustering greedy algorithm mean-center method
下载PDF
An anti-aliasing filtering of quantum images in spatial domain using a pyramid structure
20
作者 吴凯 周日贵 罗佳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期223-237,共15页
As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most q... As a part of quantum image processing,quantum image filtering is a crucial technology in the development of quantum computing.Low-pass filtering can effectively achieve anti-aliasing effects on images.Currently,most quantum image filterings are based on classical domains and grayscale images,and there are relatively fewer studies on anti-aliasing in the quantum domain.This paper proposes a scheme for anti-aliasing filtering based on quantum grayscale and color image scaling in the spatial domain.It achieves the effect of anti-aliasing filtering on quantum images during the scaling process.First,we use the novel enhanced quantum representation(NEQR)and the improved quantum representation of color images(INCQI)to represent classical images.Since aliasing phenomena are more pronounced when images are scaled down,this paper focuses only on the anti-aliasing effects in the case of reduction.Subsequently,we perform anti-aliasing filtering on the quantum representation of the original image and then use bilinear interpolation to scale down the image,achieving the anti-aliasing effect.The constructed pyramid model is then used to select an appropriate image for upscaling to the original image size.Finally,the complexity of the circuit is analyzed.Compared to the images experiencing aliasing effects solely due to scaling,applying anti-aliasing filtering to the images results in smoother and clearer outputs.Additionally,the anti-aliasing filtering allows for manual intervention to select the desired level of image smoothness. 展开更多
关键词 quantum color image processing anti-aliasing filtering algorithm quantum multiplier pyramid model
下载PDF
上一页 1 2 180 下一页 到第
使用帮助 返回顶部