期刊文献+
共找到77,495篇文章
< 1 2 250 >
每页显示 20 50 100
Pre-detection and dual-dictionary sparse representation based face recognition algorithm in non-sufficient training samples 被引量:2
1
作者 ZHAO Jian ZHANG Chao +3 位作者 ZHANG Shunli LU Tingting SU Weiwen JIA Jian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第1期196-202,共7页
Face recognition based on few training samples is a challenging task. In daily applications, sufficient training samples may not be obtained and most of the gained training samples are in various illuminations and pos... Face recognition based on few training samples is a challenging task. In daily applications, sufficient training samples may not be obtained and most of the gained training samples are in various illuminations and poses. Non-sufficient training samples could not effectively express various facial conditions, so the improvement of the face recognition rate under the non-sufficient training samples condition becomes a laborious mission. In our work, the facial pose pre-recognition(FPPR) model and the dualdictionary sparse representation classification(DD-SRC) are proposed for face recognition. The FPPR model is based on the facial geometric characteristic and machine learning, dividing a testing sample into full-face and profile. Different poses in a single dictionary are influenced by each other, which leads to a low face recognition rate. The DD-SRC contains two dictionaries, full-face dictionary and profile dictionary, and is able to reduce the interference. After FPPR, the sample is processed by the DD-SRC to find the most similar one in training samples. The experimental results show the performance of the proposed algorithm on olivetti research laboratory(ORL) and face recognition technology(FERET) databases, and also reflect comparisons with SRC, linear regression classification(LRC), and two-phase test sample sparse representation(TPTSSR). 展开更多
关键词 face recognition facial pose pre-recognition(FPPR) dual-dictionary sparse representation method machine learning
下载PDF
IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations
2
作者 Yajing Ma Gulila Altenbek Yingxia Yu 《Computers, Materials & Continua》 SCIE EI 2024年第1期695-712,共18页
Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurr... Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events,we propose an Independent Recurrent Temporal Graph Convolution Networks(IndRT-GCNets)framework to efficiently and accurately capture event attribute information.The framework models the knowledge graph sequences to learn the evolutionary represen-tations of entities and relations within each period.Firstly,by utilizing the temporal graph convolution module in the evolutionary representation unit,the framework captures the structural dependency relationships within the knowledge graph in each period.Meanwhile,to achieve better event representation and establish effective correlations,an independent recurrent neural network is employed to implement auto-regressive modeling.Furthermore,static attributes of entities in the entity-relation events are constrained andmerged using a static graph constraint to obtain optimal entity representations.Finally,the evolution of entity and relation representations is utilized to predict events in the next subsequent step.On multiple real-world datasets such as Freebase13(FB13),Freebase 15k(FB15K),WordNet11(WN11),WordNet18(WN18),FB15K-237,WN18RR,YAGO3-10,and Nell-995,the results of multiple evaluation indicators show that our proposed IndRT-GCNets framework outperforms most existing models on knowledge reasoning tasks,which validates the effectiveness and robustness. 展开更多
关键词 Knowledge reasoning entity and relation representation structural dependency relationship evolutionary representation temporal graph convolution
下载PDF
Research on the Encapsulation Device for Lunar Samples
3
作者 Yonggang Du Chunyong Wang +3 位作者 Haoling Li Ying Zhou Ming Ji Xuesong Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第3期104-117,共14页
The encapsulation of lunar samples is a core research area in the third phase of the Chinese Lunar Exploration Program.The seal assembly,opening and closing mechanism(OCM),and locking mechanism are the core components... The encapsulation of lunar samples is a core research area in the third phase of the Chinese Lunar Exploration Program.The seal assembly,opening and closing mechanism(OCM),and locking mechanism are the core components of the encapsulation device of the lunar samples,and the requirements of a tight seal,lightweight,and low power make the design of these core components difficult.In this study,a combined sealing assembly,OCM,and locking mechanism were investigated for the device.The sealing architecture consists of rubber and an Ag-In alloy,and a theory was built to analyze the seal.Experiments of the electroplate Au coating on the knife-edge revealed that the hermetic seal can be significantly improved.The driving principle for coaxial double-helical pairs was investigated and used to design the OCM.Moreover,a locking mechanism was created using an electric initiating explosive device with orifice damping.By optimizing the design,the output parameters were adjusted to meet the requirements of the lunar explorer.The experimental results showed that the helium leak rate of the test pieces were not more than 5×10^(-11) Pa·m^(3)·s^(-1),the minimum power of the OCM was 0.3 W,and the total weight of the principle prototype was 2.9 kg.The explosive driven locking mechanism has low impact.This investigation solved the difficulties in achieving tight seal,light weight,and low power for the lunar explorer,and the results can also be used to explore other extraterrestrial objects in the future. 展开更多
关键词 Lunar samples ENCAPSULATION Vacuum seal MECHANISM
下载PDF
Effectiveness of Histopathological Examination of Ultrasound-guided Puncture Biopsy Samples for Diagnosis of Extrapulmonary Tuberculosis
4
作者 GU Wen Fei SHI Xia +5 位作者 MA Xin YU Jun Lei XU Jin Chuan QIAN Cheng Cheng HU Zhi Dong ZHANG Hui 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第2期170-177,共8页
Objective To evaluate the diagnostic value of histopathological examination of ultrasound-guided puncture biopsy samples in extrapulmonary tuberculosis(EPTB).Methods This study was conducted at the Shanghai Public Hea... Objective To evaluate the diagnostic value of histopathological examination of ultrasound-guided puncture biopsy samples in extrapulmonary tuberculosis(EPTB).Methods This study was conducted at the Shanghai Public Health Clinical Center.A total of 115patients underwent ultrasound-guided puncture biopsy,followed by MGIT 960 culture(culture),smear,Gene Xpert MTB/RIF(Xpert),and histopathological examination.These assays were performed to evaluate their effectiveness in diagnosing EPTB in comparison to two different diagnostic criteria:liquid culture and composite reference standard(CRS).Results When CRS was used as the reference standard,the sensitivity and specificity of culture,smear,Xpert,and histopathological examination were(44.83%,89.29%),(51.72%,89.29%),(70.11%,96.43%),and(85.06%,82.14%),respectively.Based on liquid culture tests,the sensitivity and specificity of smear,Xpert,and pathological examination were(66.67%,72.60%),(83.33%,63.01%),and(92.86%,45.21%),respectively.Histopathological examination showed the highest sensitivity but lowest specificity.Further,we found that the combination of Xpert and histopathological examination showed a sensitivity of 90.80%and a specificity of 89.29%.Conclusion Ultrasound-guided puncture sampling is safe and effective for the diagnosis of EPTB.Compared with culture,smear,and Xpert,histopathological examination showed higher sensitivity but lower specificity.The combination of histopathology with Xpert showed the best performance characteristics. 展开更多
关键词 Extrapulmonary tuberculosis DIAGNOSIS BIOPSY Histopathological examination Puncture samples
下载PDF
C-CORE:Clustering by Code Representation to Prioritize Test Cases in Compiler Testing
5
作者 Wei Zhou Xincong Jiang Chuan Qin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2069-2093,共25页
Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount impo... Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount importance in the emerging field of edge AI.One widely used testing method for this purpose is fuzz testing,which detects bugs by inputting random test cases into the target program.However,this process consumes significant time and resources.To improve the efficiency of compiler fuzz testing,it is common practice to utilize test case prioritization techniques.Some researchers use machine learning to predict the code coverage of test cases,aiming to maximize the test capability for the target compiler by increasing the overall predicted coverage of the test cases.Nevertheless,these methods can only forecast the code coverage of the compiler at a specific optimization level,potentially missing many optimization-related bugs.In this paper,we introduce C-CORE(short for Clustering by Code Representation),the first framework to prioritize test cases according to their code representations,which are derived directly from the source codes.This approach avoids being limited to specific compiler states and extends to a broader range of compiler bugs.Specifically,we first train a scaled pre-trained programming language model to capture as many common features as possible from the test cases generated by a fuzzer.Using this pre-trained model,we then train two downstream models:one for predicting the likelihood of triggering a bug and another for identifying code representations associated with bugs.Subsequently,we cluster the test cases according to their code representations and select the highest-scoring test case from each cluster as the high-quality test case.This reduction in redundant testing cases leads to time savings.Comprehensive evaluation results reveal that code representations are better at distinguishing test capabilities,and C-CORE significantly enhances testing efficiency.Across four datasets,C-CORE increases the average of the percentage of faults detected(APFD)value by 0.16 to 0.31 and reduces test time by over 50% in 46% of cases.When compared to the best results from approaches using predicted code coverage,C-CORE improves the APFD value by 1.1% to 12.3% and achieves an overall time-saving of 159.1%. 展开更多
关键词 Compiler testing test case prioritization code representation
下载PDF
Sparse representation scheme with enhanced medium pixel intensity for face recognition
6
作者 Xuexue Zhang Yongjun Zhang +3 位作者 Zewei Wang Wei Long Weihao Gao Bob Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期116-127,共12页
Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test sample.It has been widely used in various image classification tasks.Sparseness in ... Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test sample.It has been widely used in various image classification tasks.Sparseness in sparse representation means that only a few of instances selected from all training samples can effectively convey the essential class-specific information of the test sample,which is very important for classification.For deformable images such as human faces,pixels at the same location of different images of the same subject usually have different intensities.Therefore,extracting features and correctly classifying such deformable objects is very hard.Moreover,the lighting,attitude and occlusion cause more difficulty.Considering the problems and challenges listed above,a novel image representation and classification algorithm is proposed.First,the authors’algorithm generates virtual samples by a non-linear variation method.This method can effectively extract the low-frequency information of space-domain features of the original image,which is very useful for representing deformable objects.The combination of the original and virtual samples is more beneficial to improve the clas-sification performance and robustness of the algorithm.Thereby,the authors’algorithm calculates the expression coefficients of the original and virtual samples separately using the sparse representation principle and obtains the final score by a designed efficient score fusion scheme.The weighting coefficients in the score fusion scheme are set entirely automatically.Finally,the algorithm classifies the samples based on the final scores.The experimental results show that our method performs better classification than conventional sparse representation algorithms. 展开更多
关键词 computer vision face recognition image classification image representation
下载PDF
HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
7
作者 Zhihui Song Jinchen Xu +1 位作者 Kewei Li Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第6期4573-4601,共29页
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representation... Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality. 展开更多
关键词 Vulnerability detection deep learning CST-PDG code representation tree-graph-gated-attention network CROSS-LANGUAGE
下载PDF
Systematic Method for Constructing Lewis Representations
8
作者 Lahbib Abbas Lahcen Bih +3 位作者 Khalid Yamni Abderrahim Elyahyaouy Abdelmalik El Attaoui Zahra Ramzi 《Open Journal of Inorganic Chemistry》 2024年第1期1-18,共18页
The systematic method for constructing Lewis representations is a method for representing chemical bonds between atoms in a molecule. It uses symbols to represent the valence electrons of the atoms involved in the bon... The systematic method for constructing Lewis representations is a method for representing chemical bonds between atoms in a molecule. It uses symbols to represent the valence electrons of the atoms involved in the bond. Using a number of rules in a defined order, it is often better suited to complicated cases than the Lewis representation of atoms. This method allows us to determine the formal charge and oxidation number of each atom in the edifice more efficiently than other methods. 展开更多
关键词 Systematic Method Lewis representation Chemical Bond Formal Charge Oxidation Number
下载PDF
Exploring device physics of perovskite solar cell via machine learning with limited samples
9
作者 Shanshan Zhao Jie Wang +8 位作者 Zhongli Guo Hongqiang Luo Lihua Lu Yuanyuan Tian Zhuoying Jiang Jing Zhang Mengyu Chen Lin Li Cheng Li 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期441-448,共8页
Perovskite solar cells(PsCs)have developed tremendously over the past decade.However,the key factors influencing the power conversion efficiency(PCE)of PSCs remain incompletely understood,due to the complexity and cou... Perovskite solar cells(PsCs)have developed tremendously over the past decade.However,the key factors influencing the power conversion efficiency(PCE)of PSCs remain incompletely understood,due to the complexity and coupling of these structural and compositional parameters.In this research,we demon-strate an effective approach to optimize PSCs performance via machine learning(ML).To address chal-lenges posed by limited samples,we propose a feature mask(FM)method,which augments training samples through feature transformation rather than synthetic data.Using this approach,squeeze-and-excitation residual network(SEResNet)model achieves an accuracy with a root-mean-square-error(RMSE)of 0.833%and a Pearson's correlation coefficient(r)of 0.980.Furthermore,we employ the permu-tation importance(PI)algorithm to investigate key features for PCE.Subsequently,we predict PCE through high-throughput screenings,in which we study the relationship between PCE and chemical com-positions.After that,we conduct experiments to validate the consistency between predicted results by ML and experimental results.In this work,ML demonstrates the capability to predict device performance,extract key parameters from complex systems,and accelerate the transition from laboratory findings to commercialapplications. 展开更多
关键词 Perovskite solar cell Machine learning Device physics Performance prediction Limited samples
下载PDF
THE SPARSE REPRESENTATION RELATED WITH FRACTIONAL HEAT EQUATIONS
10
作者 曲伟 钱涛 +1 位作者 梁应德 李澎涛 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期567-582,共16页
This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli an... This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions. 展开更多
关键词 reproducing kernel Hilbert space DICTIONARY sparse representation approximation to the identity fractional heat equations
下载PDF
A Fault Detection Method for Electric Vehicle Battery System Based on Bayesian Optimization SVDD Considering a Few Faulty Samples
11
作者 Miao Li Fanyong Cheng +2 位作者 Jiong Yang Maxwell Mensah Duodu Hao Tu 《Energy Engineering》 EI 2024年第9期2543-2568,共26页
Accurate and reliable fault detection is essential for the safe operation of electric vehicles.Support vector data description(SVDD)has been widely used in the field of fault detection.However,constructing the hypersp... Accurate and reliable fault detection is essential for the safe operation of electric vehicles.Support vector data description(SVDD)has been widely used in the field of fault detection.However,constructing the hypersphere boundary only describes the distribution of unlabeled samples,while the distribution of faulty samples cannot be effectively described and easilymisses detecting faulty data due to the imbalance of sample distribution.Meanwhile,selecting parameters is critical to the detection performance,and empirical parameterization is generally timeconsuming and laborious and may not result in finding the optimal parameters.Therefore,this paper proposes a semi-supervised data-driven method based on which the SVDD algorithm is improved and achieves excellent fault detection performance.By incorporating faulty samples into the underlying SVDD model,training deals better with the problem of missing detection of faulty samples caused by the imbalance in the distribution of abnormal samples,and the hypersphere boundary ismodified to classify the samplesmore accurately.The Bayesian Optimization NSVDD(BO-NSVDD)model was constructed to quickly and accurately optimize hyperparameter combinations.In the experiments,electric vehicle operation data with four common fault types are used to evaluate the performance with other five models,and the results show that the BO-NSVDD model presents superior detection performance for each type of fault data,especially in the imperceptible early and minor faults,which has seen very obvious advantages.Finally,the strong robustness of the proposed method is verified by adding different intensities of noise in the dataset. 展开更多
关键词 Fault detection vehicle battery system lithium batteries fault samples
下载PDF
Mechanical behavior of 2G NPR bolt anchored rock samples under static disturbance loading
12
作者 WANG Jiong JIANG Jian +4 位作者 WANG Siyu CHANG Yiwen LIU Peng HE Manchao CHENG Shuang 《Journal of Mountain Science》 SCIE CSCD 2024年第7期2494-2516,共23页
The deep mining of coal resources is accompanied by severe environmental challenges and various potential engineering hazards.The implementation of NPR(negative Poisson's ratio)bolts are capable of controlling lar... The deep mining of coal resources is accompanied by severe environmental challenges and various potential engineering hazards.The implementation of NPR(negative Poisson's ratio)bolts are capable of controlling large deformations in the surrounding rock effectively.This paper focuses on studying the mechanical properties of the NPR bolt under static disturbance load.The deep nonlinear mechanical experimental system was used to study the mechanical behavior of rock samples with different anchored types(unanchored/PR anchored/2G NPR anchored)under static disturbance load.The whole process of rock samples was taken by high-speed camera to obtain the real-time failure characteristics under static disturbance load.At the same time,the acoustic emission signal was collected to obtain the key characteristic parameters of acoustic emission such as acoustic emission count,energy,and frequency.The deformation at the failure of the samples was calculated and analyzed by digital speckle software.The findings indicate that the failure mode of rock is influenced by different types of anchoring.The peak failure strength of 2G NPR bolt anchored rock samples exhibits an increase of 6.5%when compared to the unanchored rock samples.The cumulative count and cumulative energy of acoustic emission exhibit a decrease of 62.16%and 62.90%,respectively.The maximum deformation of bearing capacity exhibits an increase of 59.27%,while the failure time demonstrates a delay of 42.86%.The peak failure strength of the 2G NPR bolt anchored ones under static disturbance load exhibits an increase of 5.94%when compared to the rock anchored by PR(Poisson's ratio)bolt.The cumulative count and cumulative energy of acoustic emission exhibit a decrease of 47.16%and 43.86%,respectively.The maximum deformation of the bearing capacity exhibits an increase of 50.43%,and the failure time demonstrates a delay of 32%.After anchoring by 2G NPR bolt,anchoring support effectively reduces the risk of damage caused by static disturbance load.These results demonstrate that the support effect of 2G NPR bolt materials surpasses that of PR bolt. 展开更多
关键词 Anchored rock samples Static disturbance load Acoustic emission characteristics Digital speckle Negative Poisson's ratio
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
13
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Wigner function of optical cumulant operator and its dissipation in thermo-entangled state representation
14
作者 张科 李兰兰 范洪义 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期205-210,共6页
To conveniently calculate the Wigner function of the optical cumulant operator and its dissipation evolution in a thermal environment, in this paper, the thermo-entangled state representation is introduced to derive t... To conveniently calculate the Wigner function of the optical cumulant operator and its dissipation evolution in a thermal environment, in this paper, the thermo-entangled state representation is introduced to derive the general evolution formula of the Wigner function, and its relation to Weyl correspondence is also discussed. The method of integration within the ordered product of operators is essential to our discussion. 展开更多
关键词 Wigner function optical cumulant operator dissipation evolution thermo-entangled state representation integration within ordered product of operators
下载PDF
Localization in modified polar representation: hybrid measurements and closed-form solution
15
作者 CONG Xunchao SUN Yimao +2 位作者 YANG Yanbing ZHANG Lei CHEN Liangyin 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期575-588,共14页
Classical localization methods use Cartesian or Polar coordinates, which require a priori range information to determine whether to estimate position or to only find bearings. The modified polar representation (MPR) u... Classical localization methods use Cartesian or Polar coordinates, which require a priori range information to determine whether to estimate position or to only find bearings. The modified polar representation (MPR) unifies near-field and farfield models, alleviating the thresholding effect. Current localization methods in MPR based on the angle of arrival (AOA) and time difference of arrival (TDOA) measurements resort to semidefinite relaxation (SDR) and Gauss-Newton iteration, which are computationally complex and face the possible diverge problem. This paper formulates a pseudo linear equation between the measurements and the unknown MPR position,which leads to a closed-form solution for the hybrid TDOA-AOA localization problem, namely hybrid constrained optimization(HCO). HCO attains Cramér-Rao bound (CRB)-level accuracy for mild Gaussian noise. Compared with the existing closed-form solutions for the hybrid TDOA-AOA case, HCO provides comparable performance to the hybrid generalized trust region subproblem (HGTRS) solution and is better than the hybrid successive unconstrained minimization (HSUM) solution in large noise region. Its computational complexity is lower than that of HGTRS. Simulations validate the performance of HCO achieves the CRB that the maximum likelihood estimator (MLE) attains if the noise is small, but the MLE deviates from CRB earlier. 展开更多
关键词 LOCALIZATION modified polar representation time difference of arrival(TDOA) angle of arrival(AOA) closed-form solution
下载PDF
GNN Representation Learning and Multi-Objective Variable Neighborhood Search Algorithm for Wind Farm Layout Optimization
16
作者 Yingchao Li JianbinWang HaibinWang 《Energy Engineering》 EI 2024年第4期1049-1065,共17页
With the increasing demand for electrical services,wind farm layout optimization has been one of the biggest challenges that we have to deal with.Despite the promising performance of the heuristic algorithm on the rou... With the increasing demand for electrical services,wind farm layout optimization has been one of the biggest challenges that we have to deal with.Despite the promising performance of the heuristic algorithm on the route network design problem,the expressive capability and search performance of the algorithm on multi-objective problems remain unexplored.In this paper,the wind farm layout optimization problem is defined.Then,a multi-objective algorithm based on Graph Neural Network(GNN)and Variable Neighborhood Search(VNS)algorithm is proposed.GNN provides the basis representations for the following search algorithm so that the expressiveness and search accuracy of the algorithm can be improved.The multi-objective VNS algorithm is put forward by combining it with the multi-objective optimization algorithm to solve the problem with multiple objectives.The proposed algorithm is applied to the 18-node simulation example to evaluate the feasibility and practicality of the developed optimization strategy.The experiment on the simulation example shows that the proposed algorithm yields a reduction of 6.1% in Point of Common Coupling(PCC)over the current state-of-the-art algorithm,which means that the proposed algorithm designs a layout that improves the quality of the power supply by 6.1%at the same cost.The ablation experiments show that the proposed algorithm improves the power quality by more than 8.6% and 7.8% compared to both the original VNS algorithm and the multi-objective VNS algorithm. 展开更多
关键词 GNN representation learning variable neighborhood search multi-objective optimization wind farm layout point of common coupling
下载PDF
Guest Editorial:Special issue on advances in representation learning for computer vision
17
作者 Andrew Beng Jin Teoh Thian Song Ong +1 位作者 Kian Ming Lim Chin Poo Lee 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期1-3,共3页
Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional ... Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional performance across a spectrum of tasks.The success of deep learning methods can be attributed to their capability to derive potent representations from data,integral for a myriad of downstream applications.These representations encapsulate the intrinsic structure,fea-tures,or latent variables characterising the underlying statistics of visual data.Despite these achievements,the challenge per-sists in effectively conducting representation learning of visual data with deep models,particularly when confronted with vast and noisy datasets.This special issue is a dedicated platform for researchers worldwide to disseminate their latest,high-quality articles,aiming to enhance readers'comprehension of the principles,limitations,and diverse applications of repre-sentation learning in computer vision. 展开更多
关键词 SPITE computer representation
下载PDF
Examining Zhang Peiji’s Translation of Beiying:A Study on the Representation of Zhu Ziqing’s Linguistic Style
18
作者 Chen Liang Kou Zeyu Lu Silin 《Contemporary Social Sciences》 2024年第4期143-155,共13页
Based on Yan Fu’s translation norms of“faithfulness,expressiveness,and elegance”and Liu Miqing’s concept of aesthetic representation in translation,the present study employed a combined method of qualitative and q... Based on Yan Fu’s translation norms of“faithfulness,expressiveness,and elegance”and Liu Miqing’s concept of aesthetic representation in translation,the present study employed a combined method of qualitative and quantitative analysis to investigate the linguistic styles employed by Zhu Ziqing in his renowned prose Beiying.Then,using relevant corpora and self-designed Python software,we investigated whether Zhang Peiji,as a translator,has successfully reproduced the simplistic,emotional,and realistic linguistic characteristics in Zhu Ziqing’s prose from the perspectives of“faithfulness,expressiveness,and elegance.”The findings of the research indicate that by employing a dynamic imitative translation approach,Zhang Peiji has successfully enhanced the linguistic aesthetic qualities of the source text,striving to reflect the distinctive linguistic style of Zhu Ziqing. 展开更多
关键词 Beiying Zhu Ziqing representation of linguistic style
下载PDF
Closing the Gap: Boosting Women’s Representation in Cybersecurity Leadership
19
作者 Yasser Asiry 《Journal of Information Security》 2024年第1期15-23,共9页
The research consistently highlights the gender disparity in cybersecurity leadership roles, necessitating targeted interventions. Biased recruitment practices, limited STEM education opportunities for girls, and work... The research consistently highlights the gender disparity in cybersecurity leadership roles, necessitating targeted interventions. Biased recruitment practices, limited STEM education opportunities for girls, and workplace culture contribute to this gap. Proposed solutions include addressing biased recruitment through gender-neutral language and blind processes, promoting STEM education for girls to increase qualified female candidates, and fostering inclusive workplace cultures with mentorship and sponsorship programs. Gender parity is crucial for the industry’s success, as embracing diversity enables the cybersecurity sector to leverage various perspectives, drive innovation, and effectively combat cyber threats. Achieving this balance is not just about fairness but also a strategic imperative. By embracing concerted efforts towards gender parity, we can create a more resilient and impactful cybersecurity landscape, benefiting industry and society. 展开更多
关键词 CYBERSECURITY Workforce LEADERSHIP GENDER GAP Women representation
下载PDF
Research on the influence of quadrupole deformation and continuum effects on the exotic properties of 15,17,19B with the complex momentum representation method 被引量:1
20
作者 Xue‑Neng Cao Xian‑Xian Zhou +1 位作者 Ming Fu Xin‑Xing Shi 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第2期98-108,共11页
The properties of exotic nuclei are the focus of the present research.Two-neutron halo structures of neutron-rich17,19B were experimentally confirmed.We studied the formation mechanism of halo phenomena in17,19B using... The properties of exotic nuclei are the focus of the present research.Two-neutron halo structures of neutron-rich17,19B were experimentally confirmed.We studied the formation mechanism of halo phenomena in17,19B using the complex momentum representation method applied to deformation and continuum coupling.By examining the evolution of the weakly bound and resonant levels near the Fermi surface,s–d orbital reversals and certain prolate deformations were observed.In addition,by analyzing the evolution of the occupation probabilities and density distributions occupied by valence neutrons,we found that the ground state of15B did not exhibit a halo and the ground states of17B and19B exhibited halos at 0.6≤β2≤0.7 and0.3≤β2≤0.7,respectively.The low-l components in the valence levels that are weakly bound or embedded in the continuous spectrum lead to halo formation. 展开更多
关键词 Quadrupole deformation Resonant states Complex momentum representation HALO
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部