期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
MULTIVARIATE EXTREME VALUE DISTRIBUTION AND ITS FISHER INFORMATION MATRIX 被引量:3
1
作者 史道济 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 1995年第4期421-428,共8页
The paper is concerned with the basic properties of multivariate extreme value distribution (in the Logistic model). We obtain the characteristic function and recurrence formula of the density function. The explicit a... The paper is concerned with the basic properties of multivariate extreme value distribution (in the Logistic model). We obtain the characteristic function and recurrence formula of the density function. The explicit algebraic formula for Fisher information matrix is indicated. A simple and accurate procedure for generating random vector from multivariate extreme value distribution is presented. 展开更多
关键词 Characteristic function Fisher information matrix Gumbel distribution multivariate extreme value distribution
原文传递
A Class of Distributed Variable Structure Multiple Model Algorithm Based on Posterior Information of Information Matrix
2
作者 黄颖浩 吴怡 +1 位作者 姚莉秀 蔡云泽 《Journal of Shanghai Jiaotong university(Science)》 EI 2022年第5期671-679,共9页
The tracking of maneuvering targets in radar networking scenarios is studied in this paper.For the interacting multiple model algorithm and the expected-mode augmentation algorithm,the fixed base model set leads to a ... The tracking of maneuvering targets in radar networking scenarios is studied in this paper.For the interacting multiple model algorithm and the expected-mode augmentation algorithm,the fixed base model set leads to a mismatch between the model set and the target motion mode,which causes the reduction on tracking accuracy.An adaptive grid-expected-mode augmentation variable structure multiple model algorithm is proposed.The adaptive grid algorithm based on the turning model is extended to the two-dimensional pattern space to realize the self-adaptation of the model set.Furthermore,combining with the unscented information filtering,and by interacting the measurement information of neighboring radars and iterating information matrix with consistency strategy,a distributed target tracking algorithm based on the posterior information of the information matrix is proposed.For the problem of filtering divergence while target is leaving radar surveillance area,a k-coverage algorithm based on particle swarm optimization is applied to plan the radar motion trajectory for achieving filtering convergence. 展开更多
关键词 radar network system variable structure multiple model consistency filtering information matrix particle swarm optimization
原文传递
Novel Fault Detection Optimization Algorithm for Single Event Effect system Based on Multi-information Entropy Fusion
3
作者 高翔 周国昌 +3 位作者 赖晓玲 张国霞 朱启 巨艇 《Journal of Donghua University(English Edition)》 EI CAS 2014年第6期879-881,885,共4页
Fault detection caused by single event effect( SEE) in system was studied,and an improved fault detection algorithm by fusing multi-information entropy for detecting soft error was proposed based on multi-objective de... Fault detection caused by single event effect( SEE) in system was studied,and an improved fault detection algorithm by fusing multi-information entropy for detecting soft error was proposed based on multi-objective detection approach and classification management method. In the improved fault detection algorithm, the analysis model of posteriori information with corresponding multi-fault alternative detection points was formulated through correlation information matrix, and the maximum incremental information entropy was chosen as the classification principle for the optimal detection points. A system design example was given to prove the rationality and feasibility of this algorithm.This fault detection algorithm can achieve the purpose of fault detection and resource configuration with high efficiency. 展开更多
关键词 fault detection multi-information entropy posteriori information entropy correlation information matrix single event effect(SEE)
下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
4
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(DataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
Optimal observation configuration of UAVs based on angle and range measurements and cooperative target tracking in three-dimensional space 被引量:4
5
作者 SHI Haoran LU Faxing +1 位作者 WANG Hangyu XU Junfei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第5期996-1008,共13页
This article investigates the optimal observation configuration of unmanned aerial vehicles(UAVs) based on angle and range measurements, and generalizes predecessors' researches in two dimensions into three dimens... This article investigates the optimal observation configuration of unmanned aerial vehicles(UAVs) based on angle and range measurements, and generalizes predecessors' researches in two dimensions into three dimensions. The relative geometry of the UAVs-target will significantly affect the state estimation performance of the target, the cost function based on the Fisher information matrix(FIM) is used to derive the FIM determinant of UAVs' observation in three-dimensional space, and the optimal observation geometric configuration that maximizes the determinant of the FIM is obtained. It is shown that the optimal observation configuration of the UAVs-target is usually not unique, and the optimal observation configuration is proved for two UAVs and three UAVs in three-dimension. The long-range over-the-horizon target tracking is simulated and analyzed based on the analysis of optimal observation configuration for two UAVs. The simulation results show that the theoretical analysis and control algorithm can effectively improve the positioning accuracy of the target. It can provide a helpful reference for the design of over-the-horizon target localization based on UAVs. 展开更多
关键词 target state estimation optimal observation configuration Fisher information matrix(FIM) Cramer-Rao lower bound(CRLB)
下载PDF
Sensor placement for structural damage detection with modal data
6
作者 孙小猛 冯新 +1 位作者 周晶 闫子才 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第3期297-302,共6页
A new method is presented for prioritizing sensor locations for structural health monitoring (SHM). In view of the needs of SHM and damage detection,sensor locations are optimized for the purpose of both sensitivity f... A new method is presented for prioritizing sensor locations for structural health monitoring (SHM). In view of the needs of SHM and damage detection,sensor locations are optimized for the purpose of both sensitivity for local damages and independence of the target mode. However,the two different optimization criterions lead to an inconsistency of the optimal result. Considering the structural response changes that result from damage,the relationship between the structural response and damage is deduced from the structural motion equation by a quasi-analytical mode. Based on the harmony between damage identifiability and mode observability,an object function is set up,including the information of mode independence and damage sensitivity. Utilizing the technique of singular value decomposition,an interior algorithm for the optimum sensor placement is proposed with the multiple objective criterions of minimizing the condition number of coefficient matrix and maximizing the fisher information matrix. A numerical example shows that this approach can effectively avoid the contradiction between the two different optimization criterions. Comparing with the result of single object,the result of damage detection from the optical sensor locations is much more accurate. 展开更多
关键词 sensor placement damage sensitivity mode observability fisher information matrix
下载PDF
The Alpha-Beta-Gamma Skew Normal Distribution and Its Application
7
作者 Zhengyuan Wei Tiankui Peng Xiaoya Zhou 《Open Journal of Statistics》 2020年第6期1057-1071,共15页
In this paper, a new class of skew multimodal distributions with more flexible than alpha skew normal distribution and alpha-beta skew normal distribution is proposed, which makes some important distributions become i... In this paper, a new class of skew multimodal distributions with more flexible than alpha skew normal distribution and alpha-beta skew normal distribution is proposed, which makes some important distributions become its special cases. The statistical properties of the new distribution are studied in detail, its moment generating function, skewness coefficient, kurtosis coefficient, Fisher information matrix, maximum likelihood estimators are derived. Moreover, a random simulation study is carried out for test the performance of the estimators, the simulation results show that with the increase of sample size, the mean value of maximum likelihood estimators tends to the true value. The new distribution family provides a better fit compared with other known skew distributions through the analysis of a real data set. 展开更多
关键词 Skew Distribution Multimodal Distribution Alpha-Beta-Gamma Skew Normal Distribution Fisher information matrix
下载PDF
基于演化博弈的城市数据中心建设主体分析 被引量:7
8
作者 陈卉馨 刘伟章 《科技通报》 北大核心 2016年第3期149-152,170,共5页
针对数字城市背景下城市数据中心建设主体分析的需求,本文提出了一种基于演化博弈的城市数据中心建设主体分析模型,首先采用演化博弈理论针对城市数据中心建设的主体分析需求,对其3个主体市民、信息化主管部门和强势部门进行模型的构建... 针对数字城市背景下城市数据中心建设主体分析的需求,本文提出了一种基于演化博弈的城市数据中心建设主体分析模型,首先采用演化博弈理论针对城市数据中心建设的主体分析需求,对其3个主体市民、信息化主管部门和强势部门进行模型的构建,然后根据市民、信息化主管部门、强势部门之间的相互关系,得出三个主体的期望收益函数,接着根据复制动态方程,得到复制动态微分方程,最后对演化博弈模型进行联立,求得市民、信息化主管部门、信息强势部门三者的局部均衡点,并根据雅克比矩阵的方法,判断市民、信息化主管部门和信息强势部门之间的均衡点的稳定性。仿真试验结果表明,本文提出的基于演化博弈的城市数据中心建设主体分析模型应用效果良好。 展开更多
关键词 演化博弈理论 城市数据中心建设 主体分析 市民 信息化主管部门 信息强势部门 雅克比矩阵
下载PDF
高职物流专业信息化教学模式应用研究 被引量:1
9
作者 刘莉娟 《佳木斯职业学院学报》 2018年第10期57-57,共1页
"互联网+教育"要求提升高职院校教师信息化教学能力,提升高职院校核心竞争力的应用研究以高职院校物流专业为试点,采用波士顿矩阵法进行信息化教学模式的判别和优化,利用信息化教学模型整合物流专业校内外资源,不断提升信息... "互联网+教育"要求提升高职院校教师信息化教学能力,提升高职院校核心竞争力的应用研究以高职院校物流专业为试点,采用波士顿矩阵法进行信息化教学模式的判别和优化,利用信息化教学模型整合物流专业校内外资源,不断提升信息化教育教学实力,构建专业信息化资源库,提升物流专业信息化教育教学水平。 展开更多
关键词 信息化教学 波士顿矩阵法 信息化教学模型 高职物流专业
下载PDF
中小学教育信息化评价指标体系及评价方法探讨 被引量:6
10
作者 蔡亲鹏 贺增毅 马生全 《海南师范大学学报(自然科学版)》 CAS 2008年第4期434-439,共6页
论述了建立中小学教育信息化评价指标体系的目的和原则,对影响中小学信息化评价的主要因素进行了分析,并在此基础上建立信息化评价指标体系,讨论指标权重的确定与标准化处理的问题,并对量化评价进行初步探讨.
关键词 中小学教育信息化 评价准则 评价指标体系 评价方法 矩阵
下载PDF
网络安全威胁集中分析的研究
11
作者 夏雷 《信息与电脑》 2017年第2期57-58,共2页
随着电子渠道的逐步拓展,来自外部的各种安全威胁日益增多,那么如何在现有软硬件系统基础上,更安全、高效、便捷地应对来自外部网络的安全威胁是需要深入研究的内容。笔者以A单位为例,从构建统一采集信息、统一分析信息、统一告警的网... 随着电子渠道的逐步拓展,来自外部的各种安全威胁日益增多,那么如何在现有软硬件系统基础上,更安全、高效、便捷地应对来自外部网络的安全威胁是需要深入研究的内容。笔者以A单位为例,从构建统一采集信息、统一分析信息、统一告警的网络安全威胁集中分析平台着手,为电子渠道业务的平稳运行提供一个优秀的架构载体。 展开更多
关键词 Syslog范式化 信息化资产统计 安全矩阵 等保配置核查 行为审计
下载PDF
Pupil design based on Fisher information optimization to extend field depth in practical optical system
12
作者 刘钦晓 赵廷玉 +2 位作者 陈燕平 张文字 余飞鸿 《Chinese Optics Letters》 SCIE EI CAS CSCD 2010年第2期159-161,共3页
Wavefront coding (WFC) is used to extend the field depth of an incoherent optical system by employing a phase mask on the pupil. We uses a Fisher information (FI) metric based optimization method to design a phase... Wavefront coding (WFC) is used to extend the field depth of an incoherent optical system by employing a phase mask on the pupil. We uses a Fisher information (FI) metric based optimization method to design a phase mask by taking the modulation transfer function (MTF) of the practical optical system into consid- eration. This method can modulate the wavefront so that the point spread function and optical transfer function are insensitive to the object distance. The simulation results show that the optimized phase mask based on the proposed method can further improve the defocusing image quality while maintaining the focusing image quality. 展开更多
关键词 Fisher information matrix Image quality Optical design Optical systems Optical transfer function OPTIMIZATION WAVEFRONTS
原文传递
Fisher Information in Moving Extreme Ranked Set Sampling with Application to Parameter Estimation
13
作者 YAO Dongsen CHEN Wangxue +1 位作者 YANG Rui LONG Chunxian 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2022年第1期361-372,共12页
In statistical parameter estimation problems,how well the parameters are estimated largely depends on the sampling design used.In the current paper,a modification of ranked set sampling called moving extremes ranked s... In statistical parameter estimation problems,how well the parameters are estimated largely depends on the sampling design used.In the current paper,a modification of ranked set sampling called moving extremes ranked set sampling(MERSS)is considered for the Fisher information matrix for the location-scale family.The Fisher information matrix for this model are respectively derived under simple random sampling and MERSS.In order to give more insight into the performance of MERSS with respect to simple random sampling,the Fisher information matrix for usual locationscale distributions are respectively computed under the two sampling.The numerical results show that MERSS provides more information than simple random sampling in parametric inference. 展开更多
关键词 Fisher information matrix location-scale family moving extremes ranked set sampling
原文传递
Quantum Fisher information of triphoton states
14
作者 李韬 李名扬 黄俊铭 《Chinese Optics Letters》 SCIE EI CAS CSCD 2016年第3期84-88,共5页
Based on the standard angular momentum theory, we create an experiment on preparing maximally path- entangled ([N, 0] + [0, N〉]2 (NOON) states of triphotons. In order to explain the error between the theoretical ... Based on the standard angular momentum theory, we create an experiment on preparing maximally path- entangled ([N, 0] + [0, N〉]2 (NOON) states of triphotons. In order to explain the error between the theoretical and experimental data, we consider the background events during the experiment, and observe their effect on the uncertainty in S1- Afterwards, we calculate the quantum Fisher information (QFI) of the states to evaluate their potential applications in quantum metrology. Our results show that by adding the appropriate background terms, the theoretical data of the produced states matches well with the experimental data. In this case, the QFI of the states is lower than maximally entangled NOON states, but still higher than a classical state. 展开更多
关键词 Fisher information matrix Quantum entanglement
原文传递
Collaborative target tracking in WSNs using the combination of maximum likelihood estimation and Kalman filtering 被引量:4
15
作者 Xingbo WANG Huanshui ZHANG Minyue FU 《控制理论与应用(英文版)》 EI CSCD 2013年第1期27-34,共8页
Target tracking using wireless sensor networks requires efficient collaboration among sensors to tradeoff between energy consumption and tracking accuracy. This paper presents a collaborative target tracking approach ... Target tracking using wireless sensor networks requires efficient collaboration among sensors to tradeoff between energy consumption and tracking accuracy. This paper presents a collaborative target tracking approach in wire- less sensor networks using the combination of maximum likelihood estimation and the Kalman filter. The cluster leader converts the received nonlinear distance measurements into linear observation model and approximates the covariance of the converted measurement noise using maximum likelihood estimation, then applies Kalman filter to recursively update the target state estimate using the converted measurements. Finally, a measure based on the Fisher information matrix of maximum likelihood estimation is used by the leader to select the most informative sensors as a new tracking cluster for further tracking. The advantages of the proposed collaborative tracking approach are demonstrated via simulation results. 展开更多
关键词 Target tracking Wireless sensor network Maximum likelihood estimation Kalman filtering Fisher information matrix Sensor selection
原文传递
DAMAGE DETECTION BASED ON OPTIMIZED INCOMPLETE MODE SHAPE AND FREQUENCY 被引量:4
16
作者 Wei Chen Wenguang Zhao +1 位作者 Huizhen Yang Xuquan Chen 《Acta Mechanica Solida Sinica》 SCIE EI CSCD 2015年第1期74-82,共9页
For the purpose of structural health monitoring, a damage detection method combined with optimum sensor placement is proposed in this paper. The back sequential sensor placement (BSSP) algorithm is introduced to opt... For the purpose of structural health monitoring, a damage detection method combined with optimum sensor placement is proposed in this paper. The back sequential sensor placement (BSSP) algorithm is introduced to optimize the sensor locations with the aim of maximizing the 2-norm of information matrix, since the EI method is not suitable for optimum sensor placement based on eigenvector sensitivity analysis. Structural damage detection is carried out based on the respective advantages of mode shape and frequency. The optimized incomplete mode shapes yielded from the optimal sensor locations are used to localize structural damage. After the potential damage elements have been preliminarily identified, an iteration scheme is adopted to estimate the damage extent of the potential damage elements based on the changes in the frequency. The effectiveness of this method is demonstrated using a numerical example of a 31-bar truss structure. 展开更多
关键词 structural damage detection optimum sensor placement sensitivity analysis information matrix
原文传递
Analytical and experimental demonstration of depth of field extension for incoherent imaging system with a standard sinusoidal phase mask 被引量:1
17
作者 赵惠 李英才 《Chinese Optics Letters》 SCIE EI CAS CSCD 2012年第3期35-38,共4页
The wavefront coding technique is used to enlarge the depth of field(DOF)of incoherent imaging systems. The key to wavefront coding lies in the design of suitable phase masks.To date,numerous kinds of phase masks ar... The wavefront coding technique is used to enlarge the depth of field(DOF)of incoherent imaging systems. The key to wavefront coding lies in the design of suitable phase masks.To date,numerous kinds of phase masks are proposed.However,further understanding is needed regarding phase mask with its phase function being in a standard sinusoidal form.Therefore,the characteristics of such a phase mask are studied in this letter.Deriving the defocused optical transfer function(OTF)analytically proves that the standard sinusoidal phase mask is effective in extending the DOF,and actual experiments confirm the numerical results.At the same time,with the Fisher information as a criterion,the standard sinusoidal phase mask shows a higher tolerance to focus errors(especially severe focus errors)than the classical cubic phase mask. 展开更多
关键词 ERRORS Fisher information matrix Imaging systems Optical transfer function STANDARDS
原文传递
Binomial Proportion Estimation in Longitudinal Data with Non-ignorable Non-response
18
作者 Xue-li WANG 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2013年第3期623-630,共8页
Non-random missing data poses serious problems in longitudinal studies. The binomial distribution parameter becomes to be unidentifiable without any other auxiliary information or assumption when it suffers from ignor... Non-random missing data poses serious problems in longitudinal studies. The binomial distribution parameter becomes to be unidentifiable without any other auxiliary information or assumption when it suffers from ignorable missing data. Existing methods are mostly based on the log-linear regression model. In this article, a model is proposed for longitudinal data with non-ignorable non-response. It is considered to use the pre-test baseline data to improve the identifiability of the post-test parameter. Furthermore, we derive the identified estimation (IE), the maximum likelihood estimation (MLE) and its associated variance for the post-test parameter. The simulation study based on the model of this paper shows that the proposed approach gives promising results. 展开更多
关键词 Binomial proportion information matrix IDENTIFIABILITY non-ignorable non-response variance estimation
原文传递
Observation-Driven Multiple UAV Coordinated Standoff Target Tracking Based on Model Predictive Control
19
作者 Shun Sun Yu Liu +2 位作者 Shaojun Guo Gang Li Xiaohu Yuan 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第6期948-963,共16页
An observation-driven method for coordinated standoff target tracking based on Model Predictive Control(MPC)is proposed to improve observation of multiple Unmanned Aerial Vehicles(UAVs)while approaching or loitering o... An observation-driven method for coordinated standoff target tracking based on Model Predictive Control(MPC)is proposed to improve observation of multiple Unmanned Aerial Vehicles(UAVs)while approaching or loitering over a target.After acquiring a fusion estimate of the target state,each UAV locally measures the observation capability of the entire UAV system with the Fisher Information Matrix(FIM)determinant in the decentralized architecture.To facilitate observation optimization,only the FIM determinant is adopted to derive the performance function and control constraints for coordinated standoff tracking.Additionally,a modified iterative scheme is introduced to improve the iterative efficiency,and a consistent circular direction control is established to maintain long-term observation performance when the UAV approaches its target.Sufficient experiments with simulated and real trajectories validate that the proposed method can improve observation of the UAV system for target tracking and adaptively optimize UAV trajectories according to sensor performance and UAV-target geometry. 展开更多
关键词 coordinated tracking standoff tracking observation-driven Model Predictive Control(MPC) multiple UAVs Fisher information matrix(FIM)
原文传递
煤炭企业信息化项目风险管理研究 被引量:3
20
作者 秦容军 《煤炭经济研究》 2015年第10期63-69,共7页
针对目前煤炭企业信息化工作存在的问题,从风险角度来探讨煤炭企业信息化.对煤炭企业信息化项目的风险进行了识别、评估和控制研究,以提高煤炭企业信息化项目成功率.以P煤炭企业运销信息化项目为实例,用风险矩阵模型进行了分析,结果证实... 针对目前煤炭企业信息化工作存在的问题,从风险角度来探讨煤炭企业信息化.对煤炭企业信息化项目的风险进行了识别、评估和控制研究,以提高煤炭企业信息化项目成功率.以P煤炭企业运销信息化项目为实例,用风险矩阵模型进行了分析,结果证实,煤炭企业信息化项目风险程度高,要注意控制项目风险,尤其要注意控制选型风险和组织结构风险. 展开更多
关键词 煤炭企业 信息化项目 风险评估 风险矩阵
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部