期刊文献+
共找到1,467篇文章
< 1 2 74 >
每页显示 20 50 100
Simulation of distributed optical fiber disturbance detection system based on Sagnac/Mach-Zehnder interferometer and cross-correlation location 被引量:2
1
作者 方捻 李杰 +2 位作者 王陆唐 黄肇明 杨烨 《Journal of Shanghai University(English Edition)》 CAS 2011年第2期115-118,共4页
A distributed optical fiber disturbance detection system consisted of a Sagnac interferometer and a Mach-Zehnder interferometer is demonstrated. Two interferometers outputs are connected to an electric band-pass filte... A distributed optical fiber disturbance detection system consisted of a Sagnac interferometer and a Mach-Zehnder interferometer is demonstrated. Two interferometers outputs are connected to an electric band-pass filter via a detector respectively. The central frequencies of the two filters are selected adaptively according to the disturbance frequency. The disturbance frequency is obtained by either frequency spectrum of the two interferometers outputs. An alarm is given out only when the Sagnac interferometer output is changed. A disturbance position is determined by calculating a time difference with a cross-correlation method between the filter output connected to the Sagnac interferometer and derivative of the filter output connected to the Mach-Zehnder interferometer. The frequency spectrum, derivative and cross-correlation are obtained by a signal processing system. Theory analysis and simulation results are presented. They show that the system structure and location method are effective, accurate, and immune to environmental variations. 展开更多
关键词 Sagnac interferometer Mach-Zehnder interferometer distributed optical fiber disturbance detection system cross-correlation LOCATION
下载PDF
Digital Cross-Correlation Detection of Multi-Laser Beams Measuring System for Wind Field Detection
2
作者 Li-Min Zhou Ya-Dong Jiang +1 位作者 Zheng-Yu Zhang Xiao-Lin Sui 《Journal of Electronic Science and Technology》 CAS 2010年第4期366-371,共6页
A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finit... A cross-correlation detection method to process backscatter signals of multi-laser beams measuring (MLBM) is presented, which can be firstly filtered by the digital filter composed of average median filter and finite impulse response (FIR) digital filter. The processing of backscatter signals using single-pulse and three-pulse cross-correlation detection methods is depicted in detail. From calculation results, the multi-pulse cross-correlation detection could effectively improve signal-to-noise ratio (SNR). Finally, both wind velocity and direction are determined by the peak-delay method based on the correlation function which shows high measuring precision and high SNR of the MLBM system with the assistance of the digital cross- correlation detection. 展开更多
关键词 cross-correlation detection digital filter multi-laser beams measuring system signal processing signal to noise ratio.
下载PDF
Grey-theory based intrusion detection model 被引量:3
3
作者 Qin Boping Zhou Xianwei Yang Jun Song Cunyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期230-235,共6页
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor... To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international. 展开更多
关键词 network security intrusion detection grey theory model.
下载PDF
DETECTING TECHNIQUE OF WEAK PERIODIC PULSE SIGNAL VIA SYNTHESIS OF CROSS-CORRELATION AND CHAOTIC SYSTEM 被引量:4
4
作者 LiYue YangBaojun +1 位作者 LuPeng LiShizhe 《Journal of Electronics(China)》 2003年第5期397-400,共4页
In this letter, with the synthesis of usual cross-correlation detecting method andchaotic detecting method, a new detecting system for the weak periodic pulse signal is constituted,in which the two methods can play re... In this letter, with the synthesis of usual cross-correlation detecting method andchaotic detecting method, a new detecting system for the weak periodic pulse signal is constituted,in which the two methods can play respective preponderance. Theoretical analyses and simulationstudies have shown that the detecting system is very sensitive to the periodic pulse signal understrong noise background and has exceedingly powerful capability of suppressing complex noise. 展开更多
关键词 cross-correlation Chaotic system Signal detection Periodic pulse signal Signal-to-Noise Ratio (SNR)
下载PDF
USING CROSS-CORRELATION THEORY TO EXTRACT MODAL PARAMETERS IN FREQUENCY- DOMAIN 被引量:1
5
作者 ShenFan ZhengMin 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2003年第1期83-86,共4页
Conventional modal parameter identifications are usually based on frequencyresponse functions, which require measurements of both the input force and the resulting response.However, in many cases, only response data a... Conventional modal parameter identifications are usually based on frequencyresponse functions, which require measurements of both the input force and the resulting response.However, in many cases, only response data are available while the actual excitations (such aswind/wave load) are not measurable. Modal parameters estimation must base itself on response-onlydata. Over the past years, many time-domain modal parameter identification techniques fromoutput-only are proposed. A poly-reference frequency-domain modal identification scheme onresponse-only is presented. It is based on coupling the cross-correlation theory with conventionalfrequency-domain modal parameter extraction. An experiment using an airplane model is performed toverify the proposed method. 展开更多
关键词 Modal identification Vibration testing cross-correlation theory Operating conditions
下载PDF
AN INTRUSION DETECTION SYSTEM BASED ON EVIDENCE THEORY AND ROUGH SET THEORY 被引量:2
6
作者 Ye Qing Wu Xiaoping Zhang Changhong 《Journal of Electronics(China)》 2009年第6期777-781,共5页
In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. ... In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective. 展开更多
关键词 Intrusion detection System (IDS) Evidence theory Rough Set theory (RST)
下载PDF
Leak Detection in Water Distribution Systems Using Bayesian Theory and Fisher’s Law 被引量:1
7
作者 张宏伟 王丽娟 《Transactions of Tianjin University》 EI CAS 2011年第3期181-186,共6页
A leak detection method based on Bayesian theory and Fisher’s law was developed for water distribution systems. A hydraulic model was associated with the parameters of leaks (location, extent). The randomness of para... A leak detection method based on Bayesian theory and Fisher’s law was developed for water distribution systems. A hydraulic model was associated with the parameters of leaks (location, extent). The randomness of parameter values was quantified by probability density function and updated by Bayesian theory. Values of the parameters were estimated based on Fisher’s law. The amount of leaks was estimated by back propagation neural network. Based on flow characteristics in water distribution systems, the location of leaks can be estimated. The effectiveness of the proposed method was illustrated by simulated leak data of node pressure head and flow rate of pipelines in a test pipe network, and the leaks were spotted accurately and renovated on time. 展开更多
关键词 water distribution systems LEAK detection EPANET Fisher's law Bayesian theory back propagationneural network
下载PDF
A new oil spill detection algorithm based on Dempster-Shafer evidence theory 被引量:1
8
作者 Tianlong ZHANG Jie GUO +3 位作者 Chenqi XU Xi ZHANG Chuanyuan WANG Baoquan LI 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2022年第2期456-469,共14页
Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these ... Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%. 展开更多
关键词 synthetic aperture radar(SAR)data oil spill detection subjective Bayesian Faster-region convolutional neural networks(RCNN) Dempster-Shafer evidence theory
下载PDF
Frequency detection of self-adaption control based on chaotic theory
9
作者 徐艳春 瞿晓东 李振兴 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第3期202-206,共5页
Low-order Duffing and high-order Rossler chaotic oscillator are connected together and new self-adaption frequency detection method is presented. The frequency difference control between unknown signal and the periodi... Low-order Duffing and high-order Rossler chaotic oscillator are connected together and new self-adaption frequency detection method is presented. The frequency difference control between unknown signal and the periodic driving force is realized in this paper and the self-adaption is obtained. Thus, the detection precision and speed are promoted. The limitation that there are too many chaotic oscillators in Duffing system is broken. Meanwhile the disadvantage that the detection speed is lower in R ssler chaotic control is overcome. The self-adaption choice of frequency difference control is realized using the Duffing and Rssler different chaotic oscillators to obtain unknown signal frequency. The simulation results show that the presented method is feasible and effective. 展开更多
关键词 frequency detection self-adaption control chaotic theory
下载PDF
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
10
作者 Na Jiao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期22-27,共6页
In this paper,we propose two intrusion detection methods which combine rough set theory and Fuzzy C-Means for network intrusion detection.The first step consists of feature selection which is based on rough set theory... In this paper,we propose two intrusion detection methods which combine rough set theory and Fuzzy C-Means for network intrusion detection.The first step consists of feature selection which is based on rough set theory.The next phase is clustering by using Fuzzy C-Means.Rough set theory is an efficient tool for further reducing redundancy.Fuzzy C-Means allows the objects to belong to several clusters simultaneously,with different degrees of membership.To evaluate the performance of the introduced approaches,we apply them to the international Knowledge Discovery and Data mining intrusion detection dataset.In the experimentations,we compare the performance of two rough set theory based hybrid methods for network intrusion detection.Experimental results illustrate that our algorithms are accurate models for handling complex attack patterns in large network.And these two methods can increase the efficiency and reduce the dataset by looking for overlapping categories. 展开更多
关键词 rough set theory Fuzzy C-Means network security intrusion detection
下载PDF
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
11
作者 Chak Fong Cheang Yiqin Wang +1 位作者 Zhiping Cai Gen Xu 《Computers, Materials & Continua》 SCIE EI 2018年第11期297-306,共10页
Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using group... Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm. 展开更多
关键词 Intrusion detection cloud computing Dempster-Shafer theory evidence fusion
下载PDF
Rock physics modeling of heterogeneous carbonatereservoirs: porosity estimation and hydrocarbon detection 被引量:7
12
作者 于豪 巴晶 +5 位作者 Carcione Jose 李劲松 唐刚 张兴阳 何新贞 欧阳华 《Applied Geophysics》 SCIE CSCD 2014年第1期9-22,115,共15页
In heterogeneous natural gas reservoirs, gas is generally present as small patchlike pockets embedded in the water-saturated host matrix. This type of heterogeneity, also called "patchy saturation", causes s... In heterogeneous natural gas reservoirs, gas is generally present as small patchlike pockets embedded in the water-saturated host matrix. This type of heterogeneity, also called "patchy saturation", causes significant seismic velocity dispersion and attenuation. To establish the relation between seismic response and type of fluids, we designed a rock physics model for carbonates. First, we performed CT scanning and analysis of the fluid distribution in the partially saturated rocks. Then, we predicted the quantitative relation between the wave response at different frequency ranges and the basic lithological properties and pore fluids. A rock physics template was constructed based on thin section analysis of pore structures and seismic inversion. This approach was applied to the limestone gas reservoirs of the right bank block of the Amu Darya River. Based on poststack wave impedance and prestack elastic parameter inversions, the seismic data were used to estimate rock porosity and gas saturation. The model results were in good agreement with the production regime of the wells. 展开更多
关键词 Rock PHYSICS modeling Biot-Rayleigh theory heterogeneity porosity saturation velocity dispersion gas RESERVOIR detection
下载PDF
Structural damage detection method based on information fusion technique 被引量:1
13
作者 刘涛 李爱群 +1 位作者 丁幼亮 费庆国 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期201-205,共5页
Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classification... Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures. 展开更多
关键词 multi-source information fusion structural damage detection Bayes method D-S evidence theory
下载PDF
Advances in Vision-Based Lane Detection:Algorithms,Integration,Assessment,and Perspectives on ACP-Based Parallel Vision 被引量:16
14
作者 Yang Xing Chen Lv +5 位作者 Long Chen Huaji Wang Hong Wang Dongpu Cao Efstathios Velenis Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第3期645-661,共17页
Lane detection is a fundamental aspect of most current advanced driver assistance systems(ADASs). A large number of existing results focus on the study of vision-based lane detection methods due to the extensive knowl... Lane detection is a fundamental aspect of most current advanced driver assistance systems(ADASs). A large number of existing results focus on the study of vision-based lane detection methods due to the extensive knowledge background and the low-cost of camera devices. In this paper, previous visionbased lane detection studies are reviewed in terms of three aspects, which are lane detection algorithms, integration, and evaluation methods. Next, considering the inevitable limitations that exist in the camera-based lane detection system, the system integration methodologies for constructing more robust detection systems are reviewed and analyzed. The integration methods are further divided into three levels, namely, algorithm, system,and sensor. Algorithm level combines different lane detection algorithms while system level integrates other object detection systems to comprehensively detect lane positions. Sensor level uses multi-modal sensors to build a robust lane recognition system. In view of the complexity of evaluating the detection system, and the lack of common evaluation procedure and uniform metrics in past studies, the existing evaluation methods and metrics are analyzed and classified to propose a better evaluation of the lane detection system. Next, a comparison of representative studies is performed. Finally, a discussion on the limitations of current lane detection systems and the future developing trends toward an Artificial Society, Computational experiment-based parallel lane detection framework is proposed. 展开更多
关键词 Advanced driver assistance systems(ADASs) ACP theory BENCHMARK lane detection parallel vision performance evaluation
下载PDF
Multi-sources information fusion algorithm in airborne detection systems 被引量:18
15
作者 Yang Yan Jing Zhanrong Gao Tan Wang Huilong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期171-176,共6页
To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode ... To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation. 展开更多
关键词 Information fusion Dempster-Shafer evidence theory Subjective Bayesian algorithm Airplane detecting system
下载PDF
Chaos detection and control in a typical power system 被引量:1
16
作者 Hossein Gholizadeh Amir Hassannia Azita Azarfar 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第1期119-123,共5页
In this paper, a new chaotic system is introduced. The proposed system is a conventional power network that demonstrates a chaotic behavior under special operating conditions. Some features such as Lyapunov exponents ... In this paper, a new chaotic system is introduced. The proposed system is a conventional power network that demonstrates a chaotic behavior under special operating conditions. Some features such as Lyapunov exponents and a strange attractor show the chaotic behavior of the system, which decreases the system performance. Two different controllers are proposed to control the chaotic system. The first one is a nonlinear conventional controller that is simple and easy to construct, but the second one is developed based on the finite time control theory and optimized for faster control. A MATLAB-based simulation verifies the results. 展开更多
关键词 chaos detection chaos control finite time control theory synchronous generator
下载PDF
Subliminal faces with different valence: Unconscious mismatch detection indicates interactions between unconscious processing 被引量:2
17
作者 Shen Tu Ulla Martens +4 位作者 Guang Zhao Weigang Pan Ting Wang Jiang Qiu Qinglin Zhang 《World Journal of Neuroscience》 2013年第4期298-306,共9页
Many studies revealed unconscious effects on conscious processing. However, in this study, we tried to investigate whether unconscious processes could interact with each other by using simultaneously presented face pi... Many studies revealed unconscious effects on conscious processing. However, in this study, we tried to investigate whether unconscious processes could interact with each other by using simultaneously presented face pictures with the same or a different unconscious valence (SUV versus DUV). In the first event-related potential (ERP) study, DUV elicited a smaller N2 as compared with SUV. In the second functional magnetic resonance imaging (fMRI) experiment, the left middle frontal gyrus (MFG) was activated under DUV condition in comparison to SUV condition. These results support the idea of interactions between unconscious processes (unconscious mismatch detection). The theoretical implications are discussed in the light of the global neuronal workspace theory. 展开更多
关键词 INTERACTIONS BETWEEN UNCONSCIOUS Processing UNCONSCIOUS Mismatch detection Global Neuronal WORKSPACE theory fMRI ERP
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
18
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
Research and simulation on synchronization algorithm of PSS in a 5G system based on block cross-correlation 被引量:1
19
作者 Zheng Ruimen Wang Xiaojun +1 位作者 Pan Wei Chen Xiaoshu 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期245-250,共6页
In response to the downlink synchronization requirements of the user equipment(UE)or third-party radio equipment in fifth-generation(5G)mobile communication systems,a synchronization algorithm of primary synchroni-zat... In response to the downlink synchronization requirements of the user equipment(UE)or third-party radio equipment in fifth-generation(5G)mobile communication systems,a synchronization algorithm of primary synchroni-zation signal(PSS)was designed and developed in the 5G system based on block cross-correlation.According to the new characteristics of the 5G synchronization channel and broadcast channel,starting from the traditional downlink synchronization algorithm of long-term evolution(LTE),the detection performance of the algorithm under a low signal-to-noise ratio(SNR)is improved by introducing an incoherent accumulation,and the new scheme of joint coarse frequency offset estimation is used to improve the frequency offset estimation performance.Finally,the performance of the proposed synchronization algorithm is verified by conducting a simulation on a 5G downlink simulation platform based on MATLAB software.Simulation results show that the improved downlink synchronization algorithm has stable performance in the tapped delay line-C(TDL-C)and additive white Gaussian noise(AWGN)channels with large frequency deviation and low SNR. 展开更多
关键词 fifth-generation(5G)cell search downlink synchronization cross-correlation detection frequency offset estimation
下载PDF
A Neural Network based Method for Detection of Weak Underwater Signals 被引量:1
20
作者 潘俊阳 韩晶 杨士莪 《Journal of Marine Science and Application》 2010年第3期256-261,共6页
Detection of weak underwater signals is an area of general interest in marine engineering.A weak signal detection scheme was developed; it combined nonlinear dynamical reconstruction techniques, radial basis function ... Detection of weak underwater signals is an area of general interest in marine engineering.A weak signal detection scheme was developed; it combined nonlinear dynamical reconstruction techniques, radial basis function (RBF) neural networks and an extended Kalman filter (EKF).In this method chaos theory was used to model background noise.Noise was predicted by phase space reconstruction techniques and RBF neural networks in a synergistic manner.In the absence of a signal, prediction error stayed low and became relatively large when the input contained a signal.EKF was used to improve the convergence rate of the RBF neural network.Application of the scheme to different experimental data sets showed that the algorithm can detect signals hidden in strong noise even when the signal-to-noise ratio (SNR) is less than -40d B. 展开更多
关键词 detection theory underwater weak signal extended Kalman filter
下载PDF
上一页 1 2 74 下一页 到第
使用帮助 返回顶部