期刊文献+
共找到8,630篇文章
< 1 2 250 >
每页显示 20 50 100
Industrial shape detecting system of cold rolling strip 被引量:9
1
作者 杨利坡 于丙强 +1 位作者 丁栋 刘宏民 《Journal of Central South University》 SCIE EI CAS 2012年第4期994-1001,共8页
A high-precision shape detecting system of cold rolling strip is developed to meet industrial application, which mainly consists of the shape detecting roller, the collecting ring, the digital signal processing (DSP... A high-precision shape detecting system of cold rolling strip is developed to meet industrial application, which mainly consists of the shape detecting roller, the collecting ring, the digital signal processing (DSP) shape signal processing board and the shape control model. Based on the shape detecting principle, the shape detecting roller is designed with a new integral structure for improving the precision of shape detecting and avoiding scratching strip surface. Based on the DSP technology, the DSP shape signal processing circuit board is designed and embedded in the shape detecting system for the reliability and stability of shape signal processing. The shape detecting system was successfully used in Angang 1 250 mm HC 6-high reversible cold rolling mill. The precision of shape detecting is 0.2 I and the shape deviation is controlled within 6 1 after the close loop shape control is input. 展开更多
关键词 shape detecting digital signal processing (DSP) shape signal processing close loop shape control cold rolling strip
下载PDF
Spectral Target-Detecting System Using Sine-Wave Modulation 被引量:1
2
作者 DENG Wei ZHAO Chun-jiang +2 位作者 ZHANG Lu-da CHENG Li-ping Andrew Landers 《光谱学与光谱分析》 SCIE EI CAS CSCD 北大核心 2011年第10期2771-2777,共7页
Target detection is one of the key technology of precision chemical application.Previously the digital coding modulation technique was commonly used to emit and receive the optical signal in the target detection syste... Target detection is one of the key technology of precision chemical application.Previously the digital coding modulation technique was commonly used to emit and receive the optical signal in the target detection systems previously in China.It was difficult to adjust the output power,and the anti-interference ability was weak in these systems.In order to resolve these problems,the target detection method based on analog sine-wave modulation was studied.The spectral detecting system was set up in the aspects of working principle,electric circuit,and optical path.Lab testing was performed.The results showed that the reflected signal from the target varied inversely with detection distances.It indicated that it was feasible to establish the target detection system using analog sine-wave modulation technology.Furthermore,quantitative measurement of the reflected optical signal for near-infrared and visible light could be achieved by using this system.The research laid the foundation for the future development of the corresponding instrument. 展开更多
关键词 Sine-wave modulation ANALOG Target detection Optical spectrum
下载PDF
Optoelectronic Detecting System for Inner Walls of Pipes 被引量:1
3
作者 BAIBaoxing MAHong 《Semiconductor Photonics and Technology》 CAS 1998年第2期104-108,共5页
This paper is concerned with a high characteristic image processing and recognition system that is used for inspecting real-time blemishes, streaks and cracks on the inner walls of high accuracy pipes. As a regular de... This paper is concerned with a high characteristic image processing and recognition system that is used for inspecting real-time blemishes, streaks and cracks on the inner walls of high accuracy pipes. As a regular detector, the BP neural network is used for extracting features of the image inspected and classifying these images, it takes fully advantage of the function of artificial neural network, such as the information distributed memory, large scale self-adapting parallel processing, high fault-tolerant ability and so forth. Besides, an improved BP algorithm is used in the system for training the network, and making the learning procedure of the net converges to the minimum of overall situation at high rate. 展开更多
关键词 Feature Extraction Image Recognition Neural Network Optoelectronic Detection
下载PDF
INDUCTION OF CYTOCHROME P450 ISOZYMES IN FL CELLS AND ITS USE IN BIOLOGICAL DETECTING SYSTEMS FOR MUTAGENS
4
《癌变.畸变.突变》 CAS CSCD 1991年第S1期237-237,共1页
Using arylhydrocarbon hydroxylase (AHH),ethoxyre-sorufin-O-deethylase,ethoxycoumarin-O-deethylase andaminopyrine-N-demethylase as marker enzymes and 3-methylcholanthrene (3-MC),-naphthof1avon,norepine-phrine (NE) and ... Using arylhydrocarbon hydroxylase (AHH),ethoxyre-sorufin-O-deethylase,ethoxycoumarin-O-deethylase andaminopyrine-N-demethylase as marker enzymes and 3-methylcholanthrene (3-MC),-naphthof1avon,norepine-phrine (NE) and phenobarbita1 as inducers,it is con-firmed that there are inducib1e Cyt P450 IA and 展开更多
关键词 HYDROXYLASE marker enzymes INDUCER BIOLOGIC served OXYGENASE detecting constitutive INDUCTION
下载PDF
THE PARALLEL CONFOCAL DETECTING SYSTEM USING OPTICAL FIBER PLATE
5
作者 朱升成 王昭 赵宏 《Journal of Pharmaceutical Analysis》 SCIE CAS 2005年第2期37-40,共4页
Objective Focusing on the problem such as slow scanning speed, complex system design and low light efficiency, a new parallel confocal 3D profile detecting method based on optical fiber technology, which realizes whol... Objective Focusing on the problem such as slow scanning speed, complex system design and low light efficiency, a new parallel confocal 3D profile detecting method based on optical fiber technology, which realizes whole-field confocal detecting, is proposed. Methods The optical fiber plate generates an 2D point light source array, which splits one light beam into N2 subbeams and act the role of pinholes as point source and point detecting to filter the stray light and reflect light. By introducing the construction and working principle of the multi-beam 3D detecting system, the feasibility is investigated. Results Experiment result indicates that the optical fiber technology is applicable in parallel confocal detecting. Conclusion The equipment needn't mechanical rotation. The measuring parameters that influence the detecting can easily be adapted to satisfy different requirments of measurement. Compared with the conventional confocal method, the parallel confocal detecting system using optical fiber plate is simple in the mechanism, the measuring field is larger and the speed is faster. 展开更多
关键词 confocal microscopy 3D profile parallel detecting optical fiber plate
下载PDF
Research of handwriting detecting system for space pen
6
作者 Zong-Yu Gao De-Sheng Li +1 位作者 Wei Wang Chun-Jie Yang 《Natural Science》 2010年第1期56-62,共7页
A handwriting detecting system based on Micro- accelerometer and Micro-gyros is proposed. And the algorithm of the detecting system is also described in detail. And the error analysis of the detecting system is also d... A handwriting detecting system based on Micro- accelerometer and Micro-gyros is proposed. And the algorithm of the detecting system is also described in detail. And the error analysis of the detecting system is also described in de-tail. The motion contrail of the handwriting de-tecting in the 3-D space can be recognized through compute the matrix of attitude angles and the dynamic information of the handwriting detecting which is mapped on the 2-D plane. Then the information of contrail can be recurred on the writing plane by integral. There were good results in the actual experiment. 展开更多
关键词 HANDWRITING detecting Micro-Gyro MICRO-ACCELEROMETER
下载PDF
ERROR ANALYSIS OF 3D DETECTING SYSTEM BASED ON WHOLE-FIELD PARALLEL CONFOCAL MICROSCOPE
7
作者 Wang Yonghong Yu Xiaofen 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2005年第4期623-626,共4页
Compared with the traditional scanning confocal microscopy, the effect of various factors on characteristic in multi-beam parallel confocal system is discussed, the error factors in multi-beam parallel confocal system... Compared with the traditional scanning confocal microscopy, the effect of various factors on characteristic in multi-beam parallel confocal system is discussed, the error factors in multi-beam parallel confocal system are analyzed. The factors influencing the characteristics of the multi-beam parallel confocal system are discussed. The construction and working principle of the non-scanning 3D detecting system is introduced, and some experiment results prove the effect of various factors on the detecting system. 展开更多
关键词 3D profile Parallel detecting Confocal Microlens array
下载PDF
A NON-INVASIVE AUTOMATIC DETECTING SYSTEM FOR BLOOD FLOW PARAMETERS OF CARDIOVASCULAR SYSTEM
8
作者 Zhichang Lou Song Zhang Wenming Yang Institute of Biomedical Engineering,Department of Thermal and Energy Engineering,Beijing Polytechnic University,Beijing 100022,China 《Chinese Journal of Biomedical Engineering(English Edition)》 1993年第4期176-176,共1页
In this paper,a non-invasive detecting system for measuring blood flow parame-ters of cardiovascular system is described.The device employs a new unique methodwhich is based on the theory of hemodynamics,ordinary meas... In this paper,a non-invasive detecting system for measuring blood flow parame-ters of cardiovascular system is described.The device employs a new unique methodwhich is based on the theory of hemodynamics,ordinary measurement of blood pres-sure and pulse information of variation of pulse contour parameter Ko The sphygmo-gram is picked up from radial artery via sensor.As the blood pressure changes。 展开更多
关键词 CONTOUR detecting radial CARDIOVASCULAR ordinary PRINTER analog permanent WAVEFORM shaped
下载PDF
Direction Detecting System of Indoor Smartphone Users Using BLE in IoT
9
作者 D. Kothandaraman C. Chellappan 《Circuits and Systems》 2016年第8期1492-1503,共12页
Indoor organization user activity’s (UA) direction detection monitoring system and also emergency prediction are major challenging tasks in the field of the typical body sensor and indoor fixed sensor networks. ... Indoor organization user activity’s (UA) direction detection monitoring system and also emergency prediction are major challenging tasks in the field of the typical body sensor and indoor fixed sensor networks. In this paper, indoor UA based direction detection monitoring system is achieved by the combination of both the orientation sensor and Bluetooth Low Energy (BLE) in user’s smartphones belonging to the Internet of Things (IoT). The orientation sensor senses the actual orientation of the user and BLE transmits the sensed BLE signals to monitoring system using star topology in IoT. In monitoring system, classification algorithm is used to identify the directions of the smartphone users. The emergency situation of the user is also predicted based on signal variation instantly in real time. The user activity’s signals are captured using LabVIEW toolkit then applied to various classification algorithms such asRF—91.42%, Ibk—90.55%, j48— 85.61%, K*—73.54% are the results obtained. An average of 85% was obtained in all the classifi- cation algorithims indicating the consistency and accuracy in detecting the directions of the users. RF was found to be the best among all the classification algorithms. IoT enabled devices have high demand in near coming future, moreover smartphones users increase day by day, hence implementing and maintaining the above said system would be much easier and cheaper compared to other conventional networks. 展开更多
关键词 Orientation Sensor BLE (Bluetooth Low Energy) IoT (Internet of Things) Direction Detection
下载PDF
An Intelligent SDN-IoT Enabled Intrusion Detection System for Healthcare Systems Using a Hybrid Deep Learning and Machine Learning Approach 被引量:1
10
作者 R Arthi S Krishnaveni Sherali Zeadally 《China Communications》 SCIE CSCD 2024年第10期267-287,共21页
The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during the... The advent of pandemics such as COVID-19 significantly impacts human behaviour and lives every day.Therefore,it is essential to make medical services connected to internet,available in every remote location during these situations.Also,the security issues in the Internet of Medical Things(IoMT)used in these service,make the situation even more critical because cyberattacks on the medical devices might cause treatment delays or clinical failures.Hence,services in the healthcare ecosystem need rapid,uninterrupted,and secure facilities.The solution provided in this research addresses security concerns and services availability for patients with critical health in remote areas.This research aims to develop an intelligent Software Defined Networks(SDNs)enabled secure framework for IoT healthcare ecosystem.We propose a hybrid of machine learning and deep learning techniques(DNN+SVM)to identify network intrusions in the sensor-based healthcare data.In addition,this system can efficiently monitor connected devices and suspicious behaviours.Finally,we evaluate the performance of our proposed framework using various performance metrics based on the healthcare application scenarios.the experimental results show that the proposed approach effectively detects and mitigates attacks in the SDN-enabled IoT networks and performs better that other state-of-art-approaches. 展开更多
关键词 deep neural network healthcare intrusion detection system IOT machine learning software-defined networks
下载PDF
The concept of sUAS/DL-based system for detecting and classifying abandoned small firearms
11
作者 Jungmok Ma Oleg A.Yakimenko 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第12期23-31,共9页
Military object detection and identification is a key capability in surveillance and reconnaissance.It is a major factor in warfare effectiveness and warfighter survivability.Inexpensive,portable,and rapidly deployabl... Military object detection and identification is a key capability in surveillance and reconnaissance.It is a major factor in warfare effectiveness and warfighter survivability.Inexpensive,portable,and rapidly deployable small unmanned aerial systems(s UAS)in conjunction with powerful deep learning(DL)based object detection models are expected to play an important role for this application.To prove overall feasibility of this approach,this paper discusses some aspects of designing and testing of an automated detection system to locate and identify small firearms left at the training range or at the battlefield.Such a system is envisioned to involve an s UAS equipped with a modern electro-optical(EO)sensor and relying on a trained convolutional neural network(CNN).Previous study by the authors devoted to finding projectiles on the ground revealed certain challenges such as small object size,changes in aspect ratio and image scale,motion blur,occlusion,and camouflage.This study attempts to deal with these challenges in a realistic operational scenario and go further by not only detecting different types of firearms but also classifying them into different categories.This study used a YOLOv2CNN(Res Net-50 backbone network)to train the model with ground truth data and demonstrated a high mean average precision(m AP)of 0.97 to detect and identify not only small pistols but also partially occluded rifles. 展开更多
关键词 Small firearms Object detection Deep learning Small unmanned aerial systems
下载PDF
The Possibility of Detecting our Solar System through Astrometry
12
作者 Dong-Hong Wu 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2023年第11期198-204,共7页
Searching for exoplanets with different methods has always been the focus of astronomers over the past few years.Among multiple planet detection techniques,astrometry stands out for its capability to accurately determ... Searching for exoplanets with different methods has always been the focus of astronomers over the past few years.Among multiple planet detection techniques,astrometry stands out for its capability to accurately determine the orbital parameters of exoplanets.In this study,we examine the likelihood of extraterrestrial intelligent civilizations detecting planets in our solar system using the astrometry method.By conducting injection-recovery simulations,we investigate the detectability of the four giant planets in our solar system under different observing baselines and observational errors.Our findings indicate that extraterrestrial intelligence could detect and characterize all four giant planets,provided they are observed for a minimum of 90 yr with signal-noise ratios exceeding 1.For individual planets such as Jupiter,Saturn,and Neptune,a baseline that surpasses half of their orbital periods is necessary for detection.However,Uranus requires longer observing baselines since its orbital period is roughly half of that of Neptune.If the astrometry precision is equal to or better than 10μas,all 8707 stars located within30 pc of our solar system possess the potential to detect the four giant planets within 100 yr.Additionally,our prediction suggests that over 300 stars positioned within 10 pc from our solar system could detect our Earth if they achieve an astrometry precision of 0.3μas. 展开更多
关键词 ASTROMETRY planets and satellites:detection Planetary systems
下载PDF
Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles
13
作者 Qunyue Mu Qiancheng Yu +2 位作者 Chengchen Zhou Lei Liu Xulong Yu 《Computers, Materials & Continua》 SCIE EI 2024年第7期449-466,共18页
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cam... Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios. 展开更多
关键词 YOLOv8 object detection electric bicycle helmet detection electric bicycle license plate detection
下载PDF
Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework
14
作者 Simona-Vasilica Oprea Adela Bara 《Computers, Materials & Continua》 SCIE EI 2024年第6期3827-3853,共27页
The potential of text analytics is revealed by Machine Learning(ML)and Natural Language Processing(NLP)techniques.In this paper,we propose an NLP framework that is applied to multiple datasets to detect malicious Unif... The potential of text analytics is revealed by Machine Learning(ML)and Natural Language Processing(NLP)techniques.In this paper,we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators(URLs).Three categories of features,both ML and Deep Learning(DL)algorithms and a ranking schema are included in the proposed framework.We apply frequency and prediction-based embeddings,such as hash vectorizer,Term Frequency-Inverse Dense Frequency(TF-IDF)and predictors,word to vector-word2vec(continuous bag of words,skip-gram)from Google,to extract features from text.Further,we apply more state-of-the-art methods to create vectorized features,such as GloVe.Additionally,feature engineering that is specific to URL structure is deployed to detect scams and other threats.For framework assessment,four ranking indicators are weighted:computational time and performance as accuracy,F1 score and type error II.For the computational time,we propose a new metric-Feature Building Time(FBT)as the cutting-edge feature builders(like doc2vec or GloVe)require more time.By applying the proposed assessment step,the skip-gram algorithm of word2vec surpasses other feature builders in performance.Additionally,eXtreme Gradient Boost(XGB)outperforms other classifiers.With this setup,we attain an accuracy of 99.5%and an F1 score of 0.99. 展开更多
关键词 detecting malicious URL CLASSIFIERS text to feature deep learning ranking algorithms feature building time
下载PDF
Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems
15
作者 Ye-Seul Kil Yu-Ran Jeon +1 位作者 Sun-Jin Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1473-1493,共21页
With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrus... With the rise of remote work and the digital industry,advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics,rendering them difficult to detect with conventional intrusion detection methods.Signature-based intrusion detection methods can be used to detect attacks;however,they cannot detect new malware.Endpoint detection and response(EDR)tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques.However,EDR tools are restricted by the continuous generation of unnecessary logs,resulting in poor detection performance and memory efficiency.Machine learning-based intrusion detection techniques for responding to advanced cyberattacks are memory intensive,using numerous features;they lack optimal feature selection for each attack type.To overcome these limitations,this study proposes a memory-efficient intrusion detection approach incorporating multi-binary classifiers using optimal feature selection.The proposed model detects multiple types of malicious attacks using parallel binary classifiers with optimal features for each attack type.The experimental results showed a 2.95%accuracy improvement and an 88.05%memory reduction using only six features compared to a model with 18 features.Furthermore,compared to a conventional multi-classification model with simple feature selection based on permutation importance,the accuracy improved by 11.67%and the memory usage decreased by 44.87%.The proposed scheme demonstrates that effective intrusion detection is achievable with minimal features,making it suitable for memory-limited mobile and Internet of Things devices. 展开更多
关键词 Endpoint detection and response feature selection machine learning malware detection
下载PDF
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
16
作者 Amardeep Singh Hamad Ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
下载PDF
A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing
17
作者 Hawazen Alzahrani Tarek Sheltami +2 位作者 Abdulaziz Barnawi Muhammad Imam Ansar Yaser 《Computers, Materials & Continua》 SCIE EI 2024年第9期4703-4728,共26页
The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and th... The Internet of Things(IoT)links various devices to digital services and significantly improves the quality of our lives.However,as IoT connectivity is growing rapidly,so do the risks of network vulnerabilities and threats.Many interesting Intrusion Detection Systems(IDSs)are presented based on machine learning(ML)techniques to overcome this problem.Given the resource limitations of fog computing environments,a lightweight IDS is essential.This paper introduces a hybrid deep learning(DL)method that combines convolutional neural networks(CNN)and long short-term memory(LSTM)to build an energy-aware,anomaly-based IDS.We test this system on a recent dataset,focusing on reducing overhead while maintaining high accuracy and a low false alarm rate.We compare CICIoT2023,KDD-99 and NSL-KDD datasets to evaluate the performance of the proposed IDS model based on key metrics,including latency,energy consumption,false alarm rate and detection rate metrics.Our findings show an accuracy rate over 92%and a false alarm rate below 0.38%.These results demonstrate that our system provides strong security without excessive resource use.The practicality of deploying IDS with limited resources is demonstrated by the successful implementation of IDS functionality on a Raspberry Pi acting as a Fog node.The proposed lightweight model,with a maximum power consumption of 6.12 W,demonstrates its potential to operate effectively on energy-limited devices such as low-power fog nodes or edge devices.We prioritize energy efficiency whilemaintaining high accuracy,distinguishing our scheme fromexisting approaches.Extensive experiments demonstrate a significant reduction in false positives,ensuring accurate identification of genuine security threats while minimizing unnecessary alerts. 展开更多
关键词 Intrusion detection fog computing CNN LSTM energy consumption
下载PDF
Nondestructive and active interrogation system for special nuclear material:proof of principle and initial results
18
作者 Mahmoud Bakr Kai Masuda +3 位作者 Yoshiyuki Takahashi Tsuyoshi Misawa Norio Yamakawa Tomas Scott 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第5期216-225,共10页
Herein,we employ the threshold energy neutron analysis(TENA)technique to introduce the world's first active interrogation system to detect special nuclear materials(SNMs),including U-235 and Pu-239.The system util... Herein,we employ the threshold energy neutron analysis(TENA)technique to introduce the world's first active interrogation system to detect special nuclear materials(SNMs),including U-235 and Pu-239.The system utilizes a DD neutron generator based on inertial electrostatic confinement(IEC)to interrogate suspicious objects.To detect secondary neutrons produced during fission reactions induced in SNMs,a tensioned metastable fluid detector(TMFD)is employed.The current status of the system's development is reported in this paper,accompanied by the results from experiments conducted to detect 10 g of highly enriched uranium(HEU).Notably,the experimental findings demonstrate a distinct difference in the count rates of measurements with and without HEU.This difference in count rates surpasses two times the standard deviation,indicating a confidence level of more than 96% for identifying the presence of HEU.The paper presents and extensively discusses the proof-of-principle experimental results,along with the system's planned trajectory. 展开更多
关键词 Special nuclear materials Uranium detection Inertial electrostatic confinement fusion TENA HEU CTMFD
下载PDF
Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
19
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第7期1457-1490,共34页
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr... This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge. 展开更多
关键词 MACHINE-LEARNING Deep-Learning intrusion detection system security PRIVACY deep neural network NSL-KDD Dataset
下载PDF
Cluster-Based Massive Access for Massive MIMO Systems
20
作者 Shiyu Liang Wei Chen +2 位作者 Zhongwen Sun Ao Chen Bo Ai 《China Communications》 SCIE CSCD 2024年第1期24-33,共10页
Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multipl... Massive machine type communication aims to support the connection of massive devices,which is still an important scenario in 6G.In this paper,a novel cluster-based massive access method is proposed for massive multiple input multiple output systems.By exploiting the angular domain characteristics,devices are separated into multiple clusters with a learned cluster-specific dictionary,which enhances the identification of active devices.For detected active devices whose data recovery fails,power domain nonorthogonal multiple access with successive interference cancellation is employed to recover their data via re-transmission.Simulation results show that the proposed scheme and algorithm achieve improved performance on active user detection and data recovery. 展开更多
关键词 compressive sensing dictionary learning multiuser detection random access
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部