期刊文献+
共找到559篇文章
< 1 2 28 >
每页显示 20 50 100
Adansonia digitata L.(baobab):a review of traditional information and taxonomic description 被引量:4
1
作者 Jitin Rahul Manish Kumar Jain +5 位作者 Shishu Pal Singh Rakesh Kant Kama Anuradha Aliya Naz Anup Kumar Gupta Sujeet Kumar Mrityunjay 《Asian Pacific Journal of Tropical Biomedicine》 SCIE CAS 2015年第1期79-84,共6页
Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful... Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful items.The fruit pulp,seeds,leaves,flowers.roots,and bark of baobab are edible and they have been studied by scientists for their useful properties.The fruit pulp have very high vitamin C.calcium,phosphorus,carbohydrates,fibers,potassium,proteins and lipids content,which can be used in seasoning as an appetizer and also make juices.Seeds contain appreciable quantities of phosphorus,magnesium,zinc,sodium,iron,manganese,whereas they have high levels of lysine,thiamine,calcium and iron.Baobab has numerous biological properties including antimicrobial,anti-malarial,diarrhoea,anaemia,asthma,antiviral,anti-oxidant and anti-inflammatory activities amongst others.Phytochemical investigation revealed the presence of flavonoids.phytosterols.amino acids,fatty acids,vitamins and minerals.The review summarizes the information on various aspects of traditional information,taxonomic description,medicinal properties and importantly nutritional value. 展开更多
关键词 Adansonia digitata Baobab TRADITIONAL information TAXONOMIC description
下载PDF
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
2
作者 Dominik Molitor Aditya Saharia +1 位作者 Viju Raghupathi Wullianallur Raghupathi 《Journal of Information Security》 2024年第2期168-195,共28页
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This... Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents. 展开更多
关键词 Cyber Security information Security Data Breaches descriptive Analytics PRIVACY Visualization Visual Analytics
下载PDF
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
3
作者 Adeyemi A. Adekoya Aurelia M. Donald +1 位作者 Somasheker Akkaladevi Akinjide A. Akinola 《Journal of Information Security》 2020年第4期177-188,共12页
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ... The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated. 展开更多
关键词 Benchmark CYBERSECURITY descriptive Model Survey results Certifications Common-Body-of-Knowledge Empirical Evidence Principles of information/Cybersecurity Course Tools Deployed
下载PDF
Chaining Distributed Geographic Information Web Services Based on Ontology 被引量:2
4
作者 WU Shanming SHEN Jianjing 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期401-406,共6页
To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by sem... To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by semantic annotation of the elements in a Web service description language(WSDL) document with concepts of geographic ontology, and then a common under-standing about service semantics between customers and providers of Web services is built. Based on the decomposition and formalization of customer requirements, the discovery, composition and execution of GI Web services are explained in detail, and then a chaining of GI Web services is built and used to achieve the customer's requirement. Finally, an example based on Web ontology language for service (OWL-S) is provided for testing the feasibility of this method. 展开更多
关键词 Web service geographic information Web services ONTOLOGY description logic Web ontology langugae (OWL)
下载PDF
Multi-Level Feature Aggregation-Based Joint Keypoint Detection and Description
5
作者 Jun Li Xiang Li +2 位作者 Yifei Wei Mei Song Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2022年第11期2529-2540,共12页
Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in... Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors.This paper proposes a new end-to-end selfsupervised training deep learning network.The network uses a backbone feature encoder to extract multi-level feature maps,then performs joint image keypoint detection and description in a forward pass.On the one hand,in order to enhance the localization accuracy of keypoints and restore the local shape structure,the detector detects keypoints on feature maps of the same resolution as the original image.On the other hand,in order to enhance the ability to percept local shape details,the network utilizes multi-level features to generate robust feature descriptors with rich local shape information.A detailed comparison with traditional feature-based methods Scale Invariant Feature Transform(SIFT),Speeded Up Robust Features(SURF)and deep learning methods on HPatches proves the effectiveness and robustness of the method proposed in this paper. 展开更多
关键词 Multi-scale information keypoint detection and description artificial intelligence
下载PDF
Definition,measuring methods and status of carbon information disclosure in Chinese enterprises
6
作者 CHEN Hua WANG Hai-yan 《Ecological Economy》 2015年第4期393-400,共8页
From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 a... From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 annual report of A-share listed companies in Shanghai and Shenzhen Security Exchange,we found that Chinese enterprises' carbon disclosure scattered,industry structure quite different characteristics,quantity information and quality information asymmetry. 展开更多
关键词 CARBON information DISCLOSURE content DEFINITION measuring methods STATUS description
下载PDF
基于Transformer网络多模态融合的密集视频描述方法
7
作者 李想 桑海峰 《系统仿真学报》 CAS CSCD 北大核心 2024年第5期1061-1071,共11页
针对目前的密集视频描述模型大多使用两阶段的方法存在效率较低、忽略音频及语义信息,描述结果不全面的问题。提出了一种基于Transformer网络多模态和语义信息融合的密集视频描述方法。提取自适应R(2+1)D网络提取视觉特征,设计了语义探... 针对目前的密集视频描述模型大多使用两阶段的方法存在效率较低、忽略音频及语义信息,描述结果不全面的问题。提出了一种基于Transformer网络多模态和语义信息融合的密集视频描述方法。提取自适应R(2+1)D网络提取视觉特征,设计了语义探测器生成语义信息,加入音频特征进行补充,建立了多尺度可变形注意力模块,应用并行的预测头,加快模型收敛速度,提高模型精度。实验结果表明:模型在2个基准数据集上性能均有很好的表现,评价指标BLEU4上达到了2.17。 展开更多
关键词 密集事件描述 Transformer网络 语义信息 多模态融合 可变形注意力
下载PDF
基于Web 2.0的软件工程实践教学平台设计
8
作者 张晶 《信息与电脑》 2024年第6期230-232,共3页
软件工程实践教学平台在运行过程中,存在没有全方位整合教学资源的问题。为此,提出基于Web 2.0的软件工程实践教学平台设计研究。将恩智浦iMX8MM开发板DB11作为平台硬件装置,构建Web 2.0技术为支撑的软件工程实践教学平台构架,动态整合... 软件工程实践教学平台在运行过程中,存在没有全方位整合教学资源的问题。为此,提出基于Web 2.0的软件工程实践教学平台设计研究。将恩智浦iMX8MM开发板DB11作为平台硬件装置,构建Web 2.0技术为支撑的软件工程实践教学平台构架,动态整合工程实践教学资源,并引入单参数项目信息函数作为软件工程实践教学资源的属性进行划分。在测试结果中,进程/线程交换率不仅能够结合并行请求规模实现适应性调整,而且调整的幅度较大。 展开更多
关键词 Web 2.0 软件工程实践教学平台 iMX8MM开发板 平台构架 动态整合 单参数项目信息函数 Web服务描述语言(WSDL)文档
下载PDF
基于潜在特征增强网络的视频描述生成方法
9
作者 李伟健 胡慧君 《计算机工程》 CAS CSCD 北大核心 2024年第2期266-272,共7页
视频描述生成旨在用自然语言描述视频中的物体及其相互作用。现有方法未充分利用视频中的时空语义信息,限制了模型生成准确描述语句的能力。为此,提出一种用于视频描述生成的潜在特征增强网络(LFAN)模型。利用不同的特征提取器提取外观... 视频描述生成旨在用自然语言描述视频中的物体及其相互作用。现有方法未充分利用视频中的时空语义信息,限制了模型生成准确描述语句的能力。为此,提出一种用于视频描述生成的潜在特征增强网络(LFAN)模型。利用不同的特征提取器提取外观特征、运动特征和目标特征,将对象级的目标特征分别和帧级的外观特征与运动特征融合,同时对融合后的不同特征进行增强,在生成描述前利用图神经网络和长短时记忆网络推理对象之间的时空关系,从而得到具有时空信息和语义信息的潜在特征,同时使用长短时记忆网络和门控循环单元的解码器生成视频的描述语句。该网络模型能够准确地学习到对象特征,进而引导生成更准确的词汇及与对象之间的关系。在MSVD和MSR-VTT数据集上的实验结果表明,LFAN模型可以显著提高生成描述语句的准确性,并与视频中的内容呈现出更好的语义一致性,在MSVD数据集上的BLEU@4和ROUGE-L分数分别为57.0和74.1,在MSRVTT数据集上分别为43.8和62.1。 展开更多
关键词 视频描述生成 潜在特征增强网络 时空语义信息 图神经网络 特征融合
下载PDF
三维建模软件和AutoCAD交互作用在画法几何教学中的应用探索
10
作者 别文博 陈凡 +1 位作者 杜俊超 常英丽 《科教文汇》 2024年第1期82-86,共5页
针对画法几何课程截交线、相贯线、组合体的三视图表达等内容教学过程中,学生对相关几何元素的空间特征和平面投影理解困难,且传统的讲解方法手工作图烦琐、知识输出量少等情况。为了提高画法几何课程的实践性及应用性,基于信息化教学手... 针对画法几何课程截交线、相贯线、组合体的三视图表达等内容教学过程中,学生对相关几何元素的空间特征和平面投影理解困难,且传统的讲解方法手工作图烦琐、知识输出量少等情况。为了提高画法几何课程的实践性及应用性,基于信息化教学手段,提出一种三维建模软件和AutoCAD交互作用的运用方法。首先基于三维建模软件对三维模型进行建模,通过立体展示增加学生对相关几何元素的空间想象和理解,同时通过AutoCAD作图演示代替传统的手工作图,提高了作图演示的效率。最后结合课堂实际教学环节,针对三维建模和AutoCAD交互作用在画法几何教学中的应用提出相关注意事项。 展开更多
关键词 画法几何 信息化教学 三维建模软件 AUTOCAD 作图演示
下载PDF
AMOUNT OF INFORMATION FOR SPATIAL-TEMPORAL CORRELATION FILTER PATTERN RECOGNITION SYSTEM
11
作者 陶纯堪 《Science China Mathematics》 SCIE 1990年第8期1005-1015,共11页
In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be comp... In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious. 展开更多
关键词 OPTICAL PATTERN RECOGNITION information PROCESSING spatial-temporal CORRELATION filter.
原文传递
A description logic based approach to formalizing the information bearing capability of paths in ER schemata
12
作者 Kaibo Xu Junkang Feng +1 位作者 Malcolm Crowe Lin Liu 《International Journal of Intelligent Computing and Cybernetics》 EI 2015年第3期279-291,共13页
Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–Th... Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–The approach follows and extends the idea presented in Xu and Feng(2004),which applies DLs to classifying paths in an ER schema.To verify whether the information content of a data construct(e.g.a path)covers a semantic relation(which formulates a piece of information requirement),the principle of IBC under the source-bearer-receiver framework is presented.It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors(e.g.quantifiers).Findings–Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC.The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema.Originality/value–This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle.It is a new point of view for evaluation of data representation,which looks at the information borne by data but not data dependencies. 展开更多
关键词 information retrieval Semantic web Classification of paths information-bearing capability description logics ER schema
原文传递
基于OPC UA的数字孪生矿井提升系统信息模型研究 被引量:1
13
作者 徐善永 白善文 +1 位作者 黄友锐 韩涛 《煤炭工程》 北大核心 2023年第11期179-185,共7页
针对矿井提升系统中子系统种类多、设备类型繁杂、数据多源异构,具有语义不同且碎片化的特点,提出了一种基于OPC UA的数字孪生矿井提升系统信息模型构建方法。首先建立了基于OPC UA的数字孪生数据集成体系架构,根据OPC UA建模规则构建... 针对矿井提升系统中子系统种类多、设备类型繁杂、数据多源异构,具有语义不同且碎片化的特点,提出了一种基于OPC UA的数字孪生矿井提升系统信息模型构建方法。首先建立了基于OPC UA的数字孪生数据集成体系架构,根据OPC UA建模规则构建矿井提升机系统信息模型,然后通过建模工具UaModeler生成XML描述文件,通过搭建OPC UA服务器将信息模型结构数据与属性集映射在OPC UA地址空间。最后利用OPC UA客户端工具UaExpert连接服务器对信息模型进行测试。结果表明:基于OPC UA的数字孪生矿井提升系统信息模型可以实现多源异构数据的虚实映射,获取信息模型结构与对象数据,实时在数字孪生可视化平台上显示,验证了信息模型的有效性,为矿井提升数字孪生系统提供数据交互服务,实现矿井提升系统的状态监控,故障预警等。 展开更多
关键词 数字孪生 OPC UA 矿井提升机 信息模型 数据交互 XML描述文件
下载PDF
融合实体描述与路径信息的知识图谱表示学习模型
14
作者 李军怀 武允文 +2 位作者 王怀军 李志超 徐江 《智能系统学报》 CSCD 北大核心 2023年第1期153-161,共9页
知识图谱表示学习方法是将知识图谱中的实体和关系通过特定规则表示成一个多维向量的过程。现有表示学习方法多用于解决单跳知识图谱问答任务,其多跳推理能力无法满足实际需求,为提升多跳推理能力,提出一种融合实体描述与路径信息的知... 知识图谱表示学习方法是将知识图谱中的实体和关系通过特定规则表示成一个多维向量的过程。现有表示学习方法多用于解决单跳知识图谱问答任务,其多跳推理能力无法满足实际需求,为提升多跳推理能力,提出一种融合实体描述与路径信息的知识图谱表示学习模型。首先通过预训练语言模型RoBERTa得到融合实体描述的实体、关系表示学习向量;其次利用OPTransE将知识图谱转化成融入有序关系路径信息的向量。最后构建总能量函数,将针对实体描述和路径信息的向量进行融合。通过实验分析与对比该模型在链路预测任务上与主流知识图谱表示学习模型的性能,验证了该模型的可行性与有效性。 展开更多
关键词 知识图谱 表示学习 多维向量 多跳推理能力 实体描述 路径信息 能量函数 向量融合
下载PDF
ISBD(统一版)视角下《中国文献编目规则》(第2版)和《中文图书著录规则》的比较和评述
15
作者 曾伟忠 赵欣 《图书馆研究》 2023年第3期20-25,共6页
以图书为例,在参照ISBD(统一版)的基础上,从著录信息源和著录项目两个方面比较了《中国文献编目规则》(第2版)和CALIS《中文图书著录规则》著录方式存在的不同之处,建议这两种规则应互相取长补短。
关键词 《中国文献编目规则》(第2版) 《中文图书著录规则》 著录信息源 著录项目
下载PDF
基于语义分割的全卷积图像描述模型 被引量:2
16
作者 李永生 颜秉勇 周家乐 《计算机工程与设计》 北大核心 2023年第1期210-217,共8页
为快速生成准确描述图片内容的语句,提出语义分割和卷积神经网络(convolutional neural network,CNN)相结合的图像描述方法。将图像分类模型和语义分割模型结合为编码器,增强对图像语义信息的利用,采用CNN代替长短时记忆网络(long short... 为快速生成准确描述图片内容的语句,提出语义分割和卷积神经网络(convolutional neural network,CNN)相结合的图像描述方法。将图像分类模型和语义分割模型结合为编码器,增强对图像语义信息的利用,采用CNN代替长短时记忆网络(long short term memory,LSTM)作为解码器生成完整描述性语句。通过在MSCOCO数据集上与5种主流算法的对比实验可知,以CNN作为解码器能够大幅提高解码速度,语义信息的增强能够有效提高实验精度,验证了该方法的有效性和可行性。 展开更多
关键词 图像描述 语义分割 卷积神经网络 编码器 语义信息 长短时记忆网络 解码速度
下载PDF
面向战略性新兴产业政策制定的情报感知研究
17
作者 马雨萌 王延飞 《情报学报》 CSCD 北大核心 2023年第8期883-892,共10页
以“情报感知”理念指导战略性新兴产业情报工作,能够帮助决策者应对复杂决策环境和科学把握产业政策窗口。本文在战略性新兴产业政策制定关切下,分析了情报用户需求、情报对象内容、情报任务组织三类情报感知要素,以情报感知线索发现... 以“情报感知”理念指导战略性新兴产业情报工作,能够帮助决策者应对复杂决策环境和科学把握产业政策窗口。本文在战略性新兴产业政策制定关切下,分析了情报用户需求、情报对象内容、情报任务组织三类情报感知要素,以情报感知线索发现、情报感知技术应用、情报感知结果刻画作为实施要件,针对战略性新兴产业决策中的信息不完备问题,提出了基于情报感知的解决方案,为开展基于情报感知理念的科技情报工作提供了参考示范。 展开更多
关键词 战略性新兴产业 政策制定 情报感知 线索发现 情报刻画
下载PDF
融合形状与纹理的点云局部特征描述算法
18
作者 史泽鹏 张元 +2 位作者 杨晓文 韩慧妍 韩燮 《计算机工程与设计》 北大核心 2023年第3期822-828,共7页
针对现有点云局部描述符缺乏色彩纹理信息导致特征描述能力不足,以及耗时过长的问题,提出一种基于FPFH(快速点特征直方图)的多特征融合描述符。利用FPFH算法提取形状特征;为特征邻域内点云建立拓扑结构,利用点对间HSV色彩通道比值提取... 针对现有点云局部描述符缺乏色彩纹理信息导致特征描述能力不足,以及耗时过长的问题,提出一种基于FPFH(快速点特征直方图)的多特征融合描述符。利用FPFH算法提取形状特征;为特征邻域内点云建立拓扑结构,利用点对间HSV色彩通道比值提取纹理特征;通过特征融合构造描述符,基于最近邻比值的策略进行特征匹配来评估性能。实验结果表明,该算法相较其它描述符有效减少了计算量,可以提高彩色点云特征匹配的效率和精度。 展开更多
关键词 三维图像处理 点云 特征描述 特征匹配 特征融合 纹理信息 快速点特征直方图
下载PDF
基于最大信息系数的分组支持向量数据描述故障检测
19
作者 张逸豪 王振雷 《化工学报》 EI CSCD 北大核心 2023年第9期3865-3878,共14页
工业过程的众多变量之间往往存在着复杂的相关关系,传统的故障检测模型通常会忽略不同变量间相关性的差异,对不同相关关系的变量采用相同的特征提取方法,从而导致检测效果欠佳。针对以上问题,提出了一种基于最大信息系数的分组支持向量... 工业过程的众多变量之间往往存在着复杂的相关关系,传统的故障检测模型通常会忽略不同变量间相关性的差异,对不同相关关系的变量采用相同的特征提取方法,从而导致检测效果欠佳。针对以上问题,提出了一种基于最大信息系数的分组支持向量数据描述故障检测模型,首先计算变量间的最大信息系数矩阵,按照相关性的不同对变量进行分组,再通过最大信息系数为模型混合核函数中高斯核与多项式核的权重分配提供理论指导,从而分别为各组建立不同的支持向量数据描述检测模型,完成最大信息系数与支持向量数据描述的紧密结合,最终实现分布式故障检测。通过仿真对比,验证了该模型的可行性与有效性。 展开更多
关键词 故障检测 最大信息系数 变量分组 核函数 支持向量数据描述
下载PDF
化工过程微小故障检测方法研究与应用
20
作者 樊梦奇 孙四通 《化学工程》 CAS CSCD 北大核心 2023年第7期83-88,94,共7页
在实际化工过程中缺少对微小故障的检测方法,为解决PCA(主元分析)进行特征提取容易丢失非线性信息的问题,使用互信息矩阵代替协方差矩阵进行特征提取,称作MIPCA(互信息主元分析)。为了弥补SVDD(支持向量数据描述)忽略故障数据中重要信... 在实际化工过程中缺少对微小故障的检测方法,为解决PCA(主元分析)进行特征提取容易丢失非线性信息的问题,使用互信息矩阵代替协方差矩阵进行特征提取,称作MIPCA(互信息主元分析)。为了弥补SVDD(支持向量数据描述)忽略故障数据中重要信息的缺点,将少量故障数据引入模型训练过程中,以提高模型的精度,称作CSVDD(全面支持向量数据描述)。将2种算法相结合提出一种新的故障检测方法MIPCA-CSVDD,用于化工过程微小故障检测。最后借助TE(田纳西-伊斯曼)仿真数据与河南某化工厂的真实数据,与经典PCA和SVDD方法比较检测结果,验证了所提方法的有效性。 展开更多
关键词 微小故障检测 特征提取 主元分析 互信息 支持向量数据描述
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部