期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
基于线检测器的红外弱小目标检测
1
作者 高卫红 冯晓毅 《计算机仿真》 CSCD 2008年第3期239-241,共3页
复杂背景下低信噪比弱小目标的检测仍然是当今的一个难题,尤其是在复杂背景的抑制方面,针对红外小目标的特点,以及红外小目标实时性检测的要求,提出了一种检测低信噪比的复杂背景情况下的红外图像点目标的新的算法。首先,用一个线检测器... 复杂背景下低信噪比弱小目标的检测仍然是当今的一个难题,尤其是在复杂背景的抑制方面,针对红外小目标的特点,以及红外小目标实时性检测的要求,提出了一种检测低信噪比的复杂背景情况下的红外图像点目标的新的算法。首先,用一个线检测器,对红外图像进行处理,经过其处理后的图像,不仅可以大幅度抑制背景,而且还能增强目标,极大程度的提高了图像的信噪比;其次,对处理后的图像用二维的Otsu自动阈值分割法进行分割,检测出点目标。通过对红外图像的实验,证明该算法的有效性。 展开更多
关键词 红外图像 点目标 线检测器 二维最大类间方差法
下载PDF
一种智能化网线检测器的设计
2
作者 辛大志 陈国明 《辽宁师专学报(自然科学版)》 2003年第4期15-16,64,共3页
网线在组网的过程中尤为重要,文章设计出一款经济实用的网线检测器,并精要地分析了其工作原理.
关键词 智能化网线检测器 工作原理 局域网 软件部分 软件调试 元件参数 硬件部分 电源
下载PDF
包装生产线断线检测系统的设计与应用
3
作者 伍娇艳 《河南化工》 CAS 2004年第10期39-40,共2页
由于没有断线检测系统 ,乙烯成品车间包装缝合系统频繁洒料、停机 ,给生产造成巨大浪费。通过技术改造 ,采用断线检测器 ,并在包装机控制系统中编制运行程序 ,解决了这一生产难题。
关键词 包装 线检测器 程序 调试
下载PDF
DS/SS信号检测与估计的性能 被引量:3
4
作者 牟青 魏平 《航天电子对抗》 2004年第2期50-54,共5页
直接序列扩频信号 (DS/SS)广泛应用于卫星通信等领域 ,由于它的信噪比往往很低 ,给电子侦察带来了很大的困难。结合目前的研究进展 ,综述了用于直扩信号检测和估计的几种主要方法 ,简要阐述了它们的特点和适用性 。
关键词 直接序列扩频 二次法 循环谱 能量检测器 线检测器
下载PDF
线上线下结合的实时手势跟踪系统 被引量:2
5
作者 王超 崔更申 +1 位作者 黄廷辉 余益民 《桂林电子科技大学学报》 2012年第2期125-128,共4页
手势识别跟踪一般采用线下训练分类器,不能有效检测跟踪形变的手势,针对手势形变及在窗口的暂时性消失等问题,提出了一种通过线下训练结合线上提取样本对分类器进行训练的检测方法,同时采用跟踪-检测-学习(TLD)的方法不断对跟踪器的结... 手势识别跟踪一般采用线下训练分类器,不能有效检测跟踪形变的手势,针对手势形变及在窗口的暂时性消失等问题,提出了一种通过线下训练结合线上提取样本对分类器进行训练的检测方法,同时采用跟踪-检测-学习(TLD)的方法不断对跟踪器的结果进行纠正。试验结果表明,本算法对手势形变、短暂消失具有很好的适应性,与TLD算法相比较具有更好的稳定性。 展开更多
关键词 手势识别 手势跟踪 Haar特征级联器 线检测器
下载PDF
电子线路应用实例及其技法(一)
6
作者 张金 《电子制作》 2000年第5期25-26,共2页
超低音滤波器扩展低音频响在封闭式音箱中的扬声器频率响应是一只二阶高通滤波器的响应,而截止频率及Q值很容易由音箱尺寸确定。通过滤波器及功率放大器馈给扬声器信号,在该扬声器谐振频率以下却产生平直的响应,从而构成一个简单但却十... 超低音滤波器扩展低音频响在封闭式音箱中的扬声器频率响应是一只二阶高通滤波器的响应,而截止频率及Q值很容易由音箱尺寸确定。通过滤波器及功率放大器馈给扬声器信号,在该扬声器谐振频率以下却产生平直的响应,从而构成一个简单但却十分有效的超低音音箱。 展开更多
关键词 电子线 应用 超低音滤波器 市电连线检测器
下载PDF
基于不同尺度增强融合的视网膜血管分割算法 被引量:1
7
作者 冯河洋 李柏林 +1 位作者 刘甲甲 陈少杰 《传感器与微系统》 CSCD 2017年第1期135-138,142,共5页
针对现有视网膜血管图像提取细小血管准确率较低的问题,提出了一种基于多尺度线性检测器与局部和全局增强相结合的视网膜血管分割方法。对多尺度线检测器进行研究,将其分为小尺度和大尺度两部分;利用小尺度对局部增强后的图像与大尺度... 针对现有视网膜血管图像提取细小血管准确率较低的问题,提出了一种基于多尺度线性检测器与局部和全局增强相结合的视网膜血管分割方法。对多尺度线检测器进行研究,将其分为小尺度和大尺度两部分;利用小尺度对局部增强后的图像与大尺度对全局增强后的图像分别进行检测,得到不同尺度下的响应函数;将不同尺度下的响应函数进行融合,得到最终的视网膜血管结构。在STARE和DRIVE两个数据库上进行实验,结果表明:该算法得到的平均血管准确率分别达到96.62%和96.45%,平均真阳性率分别达到75.52%和83.07%,分割准确率高,能够得到较好的血管分割结果。 展开更多
关键词 视网膜血管 多尺度线检测器 局部增强 全局增强
下载PDF
一种用于土壤非金属养分测试的光纤探头式分光光度计 被引量:1
8
作者 贺冬仙 胡娟秀 +1 位作者 鲁绍坤 何厚勇 《光谱学与光谱分析》 SCIE EI CAS CSCD 北大核心 2012年第1期214-218,共5页
针对测土配方施肥技术中要求快速、便捷、高效地进行土壤养分测试的需求,文章基于浸入式光纤探头、平场凹面全息光栅、二极管线阵检测器开发了一种光纤探头式分光光度计用于土壤养分中非金属元素的快速、准确测试。基于国家计量检定规程... 针对测土配方施肥技术中要求快速、便捷、高效地进行土壤养分测试的需求,文章基于浸入式光纤探头、平场凹面全息光栅、二极管线阵检测器开发了一种光纤探头式分光光度计用于土壤养分中非金属元素的快速、准确测试。基于国家计量检定规程JJG 178—2007对紫外、可见、近红外分光光度计的性能检测方法测试的该仪器的波长最大允许误差与波长重复性、基线平直度、透射比最大允许误差与透射比重复性均达到了国标第Ⅲ级别标准,其最小光谱带宽、噪声与漂移、杂散光基本达到了国标第Ⅳ级别标准。基于该仪器测试的土壤硝态氮、铵态氮、有效磷、有效硫、有效硼、和有机质含量与基于商用的国产单光束和进口双光束分光光度计测试的结果呈极显著的线性相关关系,其回归方程的斜率接近于1,且对比数据之间无显著性差异。因此,该光纤探头式分光光度计可用于土壤非金属养分的快速、准确测试。 展开更多
关键词 二极管线检测器 非金属元素 性能测试 土壤养分测试
下载PDF
基于SVM的眼底血管分割技术
9
作者 梁明明 沈柳笛 +1 位作者 王伊雪 郑丽颖 《应用科技》 CAS 2017年第3期67-71,共5页
针对眼底中小血管提取的问题,提出了一种基于支持向量机的眼底血管分割方法。首先,采用高斯匹配滤波器对眼底图像进行滤波,增强图像对比度;然后,为了加快滤波器的运算速度,提出一种改进的滤波方法,只需像素与最佳匹配模板做卷积;最后,... 针对眼底中小血管提取的问题,提出了一种基于支持向量机的眼底血管分割方法。首先,采用高斯匹配滤波器对眼底图像进行滤波,增强图像对比度;然后,为了加快滤波器的运算速度,提出一种改进的滤波方法,只需像素与最佳匹配模板做卷积;最后,为了提高算法的分类性能,采用均值漂移算法先对滤波后的图像预分类。仿真结果表明提出方法能更准确地分割出眼底血管网络,特别是对中小血管的分割更加精确。 展开更多
关键词 眼底图像 血管分割 高斯匹配滤波 线检测器 最佳匹配模板 支持向量机 均值漂移算法 图像预分类
下载PDF
Traffic light detection and recognition in intersections based on intelligent vehicle
10
作者 张宁 何铁军 +1 位作者 高朝晖 黄卫 《Journal of Southeast University(English Edition)》 EI CAS 2008年第4期517-521,共5页
To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transfo... To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transformation. Then, the colors of traffic lights are detected with color space transformation. Finally, self-associative memory is used to recognize the countdown characters of the traffic lights. Test results at 20 real intersections show that the ratio of correct stabling siding recognition reaches up to 90%;and the ratios of recognition of traffic lights and divided characters are 85% and 97%, respectively. The research proves that the method is efficient for the detection of stabling siding and is robust enough to recognize the characters from images with noise and broken edges. 展开更多
关键词 intelligent vehicle stabling siding detection traffic lights detection self-associative memory light-emitting diode (LED) characters recognition
下载PDF
Coordinate-free k-coverage hole detection algorithm in wireless sensor networks 被引量:11
11
作者 Ma Wenyu Yan Feng +2 位作者 Zuo Xuzhou Xia Weiwei Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2019年第1期8-15,共8页
For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists ... For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes. 展开更多
关键词 k-coverage hole detection K-COVERAGE wireless sensor networks
下载PDF
Design of intelligent line-tracking chess robot based on STM32 被引量:4
12
作者 LI Shi-guang YANG Xiao-lei 《Journal of Measurement Science and Instrumentation》 CAS 2014年第2期59-63,共5页
An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circu... An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way. 展开更多
关键词 STM32 intelligent robot LINE-TRACKING infrared sensor steering engine detection circuit
下载PDF
Determination of Threshold for Energy Detection in Cognitive Radio Sensor Networks 被引量:4
13
作者 郝建军 黎晋 《China Communications》 SCIE CSCD 2011年第1期14-19,共6页
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici... The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result. 展开更多
关键词 Internet of Sensor Networks energy Things Cognitive Radio detection THRESHOLD
下载PDF
A NEW RECURSIVE ALGORITHM FOR MULTIUSER DETECTION
14
作者 Wang Lei Zheng Baoyu +1 位作者 Li Lei Chen Chao 《Journal of Electronics(China)》 2009年第3期312-317,共6页
Based on the synthesis and analysis of recursive receivers, a new algorithm, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational compl... Based on the synthesis and analysis of recursive receivers, a new algorithm, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational complexity.During the analysis, some interesting properties shared by the proposed procedures are described.Finally, the performance assessment shows that the new scheme is superior to the linear detector and ordinary grouping algorithm, and achieves a bit-error rate close to that of the optimum receiver. 展开更多
关键词 Maximization likelihood Iterative detection Multi-user detection Partial groupingmaximization likelihood
下载PDF
Determination of 5-Fluorouracil in Human Plasma by High-Performance Liquid Chromatography (HPLC) 被引量:2
15
作者 谷元 陆榕 +1 位作者 司端运 刘昌孝 《Transactions of Tianjin University》 EI CAS 2010年第3期167-173,共7页
5-Fluorouracil (5-FU) has a broad spectrum of anti-tumor activity, widely applied to the treatment of cancers. However, it is necessary to determine the plasma concentration of 5-FU in clinical practice due to its nar... 5-Fluorouracil (5-FU) has a broad spectrum of anti-tumor activity, widely applied to the treatment of cancers. However, it is necessary to determine the plasma concentration of 5-FU in clinical practice due to its narrow therapeutic index. Therefore, a simple, economic and sensitive high-performance liquid chromatography (HPLC) method was developed and validated for the determination of 5-FU in human plasma. Ethyl acetate was chosen as extraction reagent. Chromatographic separation was performed on a Diamonsil C18 column (250 mm × 4.6 mm i.d., 5 μm) with the mobile phase consisting of methanol and 20 mmol/L ammonium formate using a linear gradient elution at a flow rate of 0.8 mL/min. 5-FU and 5-bromouracil (5-BU) were detected by UV detector at 265 nm. The calibration curve was linear over the concentration range of 5—500 ng/mL and the correlation coefficient was not less than 0.992 6 for all calibration curves. The intra- and inter-day precisions were less than 10.5% and 4.3%, respectively, and the accuracy was within ±3.7%. The recovery at all concentration levels was 80.1±8.6%. 5-FU was stable under possible conditions of storing and handling. This method is proved applicable to therapeutic drug monitoring and pharmacokinetic studies of 5-FU in human. 展开更多
关键词 5-fluorouracil (5-FU) high-performance liquid chromatography (HPLC) human plasma
下载PDF
Efficient Algorithm for K-Barrier Coverage Based on Integer Linear Programming 被引量:15
16
作者 Yanhua Zhang Xingming Sun Baowei Wang 《China Communications》 SCIE CSCD 2016年第7期16-23,共8页
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af... Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach. 展开更多
关键词 k-barrier coverage linear programming wireless sensor networks
下载PDF
A Group-Based Fingerprinting Scheme for Digital Wholesale and Retail 被引量:1
17
作者 ZHAO Yong ZHANG Aixin LU Songnian 《China Communications》 SCIE CSCD 2014年第10期126-135,共10页
Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially ... Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded. 展开更多
关键词 Group fingerprint non-degeneratelinear shift register sequence wholesale andretail group colluding attack
下载PDF
Wireless Transmission System for Vehicle Inspection Data
18
作者 LIU Yuan MIAO Chang-yun 《Semiconductor Photonics and Technology》 CAS 2008年第4期234-239,共6页
Based on general packet radio service(GPRS) and TCP/IP protocol,a wireless transmission system of vehicle inspection data is designed. Basic structure and work theory are expounded. SIM300 designed by SIMCOM is used f... Based on general packet radio service(GPRS) and TCP/IP protocol,a wireless transmission system of vehicle inspection data is designed. Basic structure and work theory are expounded. SIM300 designed by SIMCOM is used for client GPRS communication module. Using Winsock control of visual basic(VB),the client and server communication has been accomplished. By means of a client and server communications software,the remote wireless transmission of vehicle inspection data has been accomplished also. The server management software has been developed by using Microsoft SQL Server 2000 and VB6.0. Functions of software include import,inquiry,export and maintenance of test data. 展开更多
关键词 vehicle inspection SIM300 GPRS remote wireless SQL Server 2000
下载PDF
Behavior analysis of malicious sensor nodes based on optimal response dynamics
19
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
下载PDF
LMI Approach to Mixed H_/H_∞ Fault Detection Observer Design 被引量:1
20
作者 张迎春 吴丽娜 +1 位作者 李璟璟 陈雪芹 《Transactions of Tianjin University》 EI CAS 2012年第5期343-349,共7页
To investigate the robust fault detection (RFD) observer design for linear uncertain systems, the H_index and H∞ norm are used to describe this observer design as optimization problems. Conditions for the existence... To investigate the robust fault detection (RFD) observer design for linear uncertain systems, the H_index and H∞ norm are used to describe this observer design as optimization problems. Conditions for the existence of such a fault detection observer are given in terms of matrix inequalities. The solution is obtained by new iterative linear matrix inequality (ILMI) algorithms. The RFD observer design over finite frequency range in which Of does not have full column rank for a system is also considered. Numerical example demonstrates that the designed fault detection observer has high sensitivity to the fault and strong robustness to the unknown input. 展开更多
关键词 fault detection OBSERVER ROBUSTNESS sensitivity linear matrix inequality (LMI)
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部