期刊文献+
共找到1,752篇文章
< 1 2 88 >
每页显示 20 50 100
FPGA Design and Implementation of a Convolutional Encoder and a Viterbi Decoder Based on 802.11a for OFDM
1
作者 Yan Sun Zhizhong Ding 《Wireless Engineering and Technology》 2012年第3期125-131,共7页
In this paper, a modified FPGA scheme for the convolutional encoder and Viterbi decoder based on the IEEE 802.11a standards of WLAN is presented in OFDM baseband processing systems. The proposed design supports a gene... In this paper, a modified FPGA scheme for the convolutional encoder and Viterbi decoder based on the IEEE 802.11a standards of WLAN is presented in OFDM baseband processing systems. The proposed design supports a generic, robust and configurable Viterbi decoder with constraint length of 7, code rate of 1/2 and decoding depth of 36 symbols. The Viterbi decoder uses full-parallel structure to improve computational speed for the add-compare-select (ACS) modules, adopts optimal data storage mechanism to avoid overflow and employs three distributed RAM blocks to complete cyclic trace-back. It includes the core parts, for example, the state path measure computation, the preservation and transfer of the survivor path and trace-back decoding, etc. Compared to the general Viterbi decoder, this design can effectively decrease the 10% of chip logic elements, reduce 5% of power consumption, and increase the encoder and decoder working performance in the hardware implementation. Lastly, relevant simulation results using Verilog HDL language are verified based on a Xinlinx Virtex-II FPGA by ISE 7.1i. It is shown that the Viterbi decoder is capable of decoding (2, 1, 7) convolutional codes accurately with a throughput of 80 Mbps. 展开更多
关键词 FPGa Convolutional encoder VITERBI decoder IEEE 802.11a ofDM
下载PDF
PERFORMANCE ANALYSIS AND SIMULATION OF OCDMA SYSTEM BASED ON FBGs ENCODER/DECODER
2
作者 Li Chuanqi Sun Xiaohan Je-Myung Jeong 《Journal of Electronics(China)》 2005年第6期663-670,共8页
The encoding/decoding scheme based on Fiber Bragg Grating (FBG) for Optical Code Division Multiple Access (OCDMA) system is analyzed and the whole process from transmitting end to receiving end is researched in detail... The encoding/decoding scheme based on Fiber Bragg Grating (FBG) for Optical Code Division Multiple Access (OCDMA) system is analyzed and the whole process from transmitting end to receiving end is researched in detail. The mathematical mode including signal transmission, summing, receiving and recovering are established respectively. One of the main sources of Bit Error Rate (BER) of OCDMA system based on FBGs is the unevenness of signal power spectrum, which leads to the chip powers unequal with each other. The Signal to Interfere Ratio (SIR) and BER performance of the system are studied and simulated at the case with uneven distribution of chips' powers. 展开更多
关键词 OCDMa 光学码分多址系统 编码器 光纤通信
下载PDF
基于时空特征融合的Encoder-Decoder多步4D短期航迹预测
3
作者 石庆研 张泽中 韩萍 《信号处理》 CSCD 北大核心 2023年第11期2037-2048,共12页
航迹预测在确保空中交通安全、高效运行中扮演着至关重要的角色。所预测的航迹信息是航迹优化、冲突告警等决策工具的输入,而预测准确性取决于模型对航迹序列特征的提取能力。航迹序列数据是具有丰富时空特征的多维时间序列,其中每个变... 航迹预测在确保空中交通安全、高效运行中扮演着至关重要的角色。所预测的航迹信息是航迹优化、冲突告警等决策工具的输入,而预测准确性取决于模型对航迹序列特征的提取能力。航迹序列数据是具有丰富时空特征的多维时间序列,其中每个变量都呈现出长短期的时间变化模式,并且这些变量之间还存在着相互依赖的空间信息。为了充分提取这种时空特征,本文提出了基于融合时空特征的编码器-解码器(Spatio-Temporal EncoderDecoder,STED)航迹预测模型。在Encoder中使用门控循环单元(Gated Recurrent Unit,GRU)、卷积神经网络(Convolutional Neural Network,CNN)和注意力机制(Attention,AT)构成的双通道网络来分别提取航迹时空特征,Decoder对时空特征进行拼接融合,并利用GRU对融合特征进行学习和递归输出,实现对未来多步航迹信息的预测。利用真实的航迹数据对算法性能进行验证,实验结果表明,所提STED网络模型能够在未来10 min预测范围内进行高精度的短期航迹预测,相比于LSTM、CNN-LSTM和AT-LSTM等数据驱动航迹预测模型具有更高的精度。此外,STED网络模型预测一个航迹点平均耗时为0.002 s,具有良好的实时性。 展开更多
关键词 4D航迹预测 时空特征 encoder-decoder 门控循环单元
下载PDF
基于encoder-decoder框架的城镇污水厂出水水质预测
4
作者 史红伟 陈祺 +1 位作者 王云龙 李鹏程 《中国农村水利水电》 北大核心 2023年第11期93-99,共7页
由于污水厂的出水水质指标繁多、污水处理过程中反应复杂、时序非线性程度高,基于机理模型的预测方法无法取得理想效果。针对此问题,提出基于深度学习的污水厂出水水质预测方法,并以吉林省某污水厂监测水质为来源数据,利用多种结合encod... 由于污水厂的出水水质指标繁多、污水处理过程中反应复杂、时序非线性程度高,基于机理模型的预测方法无法取得理想效果。针对此问题,提出基于深度学习的污水厂出水水质预测方法,并以吉林省某污水厂监测水质为来源数据,利用多种结合encoder-decoder结构的神经网络预测水质。结果显示,所提结构对LSTM和GRU网络预测能力都有一定提升,对长期预测能力提升更加显著,ED-GRU模型效果最佳,短期预测中的4个出水水质指标均方根误差(RMSE)为0.7551、0.2197、0.0734、0.3146,拟合优度(R2)为0.9013、0.9332、0.9167、0.9532,可以预测出水质局部变化,而长期预测中的4个指标RMSE为1.7204、1.7689、0.4478、0.8316,R2为0.4849、0.5507、0.4502、0.7595,可以预测出水质变化趋势,与顺序结构相比,短期预测RMSE降低10%以上,R2增加2%以上,长期预测RMSE降低25%以上,R2增加15%以上。研究结果表明,基于encoder-decoder结构的神经网络可以对污水厂出水水质进行准确预测,为污水处理工艺改进提供技术支撑。 展开更多
关键词 污水厂出水 encoder-decoder 多指标水质预测 GRU模型
下载PDF
基于Encoder-Decoder注意力网络的异常驾驶行为在线识别方法 被引量:2
5
作者 唐坤 戴语琴 +2 位作者 徐永能 郭唐仪 邵飞 《兵器装备工程学报》 CAS CSCD 北大核心 2023年第8期63-71,共9页
异常驾驶行为是车辆安全运行的重大威胁,其对人员与物资的安全高效投送造成严重危害。以低成本非接触式的手机多传感器数据为基础,通过对驾驶行为特性进行数据分析,提出一种融合Encoder-Decoder深度网络与Attention机制的异常驾驶行为... 异常驾驶行为是车辆安全运行的重大威胁,其对人员与物资的安全高效投送造成严重危害。以低成本非接触式的手机多传感器数据为基础,通过对驾驶行为特性进行数据分析,提出一种融合Encoder-Decoder深度网络与Attention机制的异常驾驶行为的在线识别方法。该方法由基于LSTM(long short-term memory)的Encoder-Decoder、Attention机制与基于SVM(support vector machine)的分类器3个模块构成。该系统识别方法包括:输入编码、注意力学习、特征解码、序列重构、残差计算与驾驶行为分类等6个步骤。该技术方法利用自然驾驶条件下所采集的手机传感器数据进行实验。实验结果表明:①手机多传感器数据融合方法对驾驶行为识别具备有效性;②异常驾驶行为必然会造成数据异常波动;③Attention机制有助于提升模型学习效果,对所提出模型的识别准确率F1-score为0.717,与经典同类模型比较,准确率得到显著提升;④对于汽车异常驾驶行为来说,SVM比Logistic与随机森林算法具有更优越的识别效果。 展开更多
关键词 异常驾驶 深度学习 编码器-解码器 长短时记忆网络 注意力机制
下载PDF
On the Manipulation of the Selectivity of Encoding and Decoding overthe Translator's Subjectivity
6
作者 蒋知洋 《海外英语》 2014年第9X期177-178,共2页
The translation activity is a process of the interlinguistic transmission of information realized by the information encoding and decoding.Encoding and decoding,cognitive practices operated in objective contexts,are i... The translation activity is a process of the interlinguistic transmission of information realized by the information encoding and decoding.Encoding and decoding,cognitive practices operated in objective contexts,are inevitably of selectivity ascribing to the restriction of contextual reasons.The translator as the intermediary agent connects the original author(encoder)and the target readers(decoder),shouldering the dual duties of the decoder and the encoder,for which his subjectivity is irrevocably manipulated by the selectivity of encoding and decoding. 展开更多
关键词 ENCODING and DECODING SELECTIVITY COGNITION the TR
下载PDF
利用Encoder-Decoder框架的深度学习网络实现绕射波分离及成像 被引量:1
7
作者 马铭 包乾宗 《石油地球物理勘探》 EI CSCD 北大核心 2023年第1期56-64,共9页
利用单纯绕射波场实现地下地质异常体的识别具有坚实的理论基础,对应的实施方法得到了广泛研究,且有效地应用于实际勘探。但现有技术在微小尺度异常体成像方面收效甚微,相关研究多数以射线传播理论为基础,对于影响绕射波分离成像精度的... 利用单纯绕射波场实现地下地质异常体的识别具有坚实的理论基础,对应的实施方法得到了广泛研究,且有效地应用于实际勘探。但现有技术在微小尺度异常体成像方面收效甚微,相关研究多数以射线传播理论为基础,对于影响绕射波分离成像精度的因素分析并不完备。相较于反射波,由于存在不连续构造而产生的绕射波能量微弱并且相互干涉,同时环境干扰使得绕射波进一步湮没。因此,更高精度的波场分离及单独成像是现阶段基于绕射波超高分辨率处理、解释的重点研究方向。为此,首先针对地球物理勘探中地质异常体的准确定位,以携带高分辨率信息的绕射波为研究对象,系统分析在不同尺度、不同物性参数的异常体情况下绕射波的能量大小及形态特征,掌握绕射波与其他类型波叠加的具体形式;然后根据相应特征性质提出基于深度学习技术的绕射波分离成像方法,即利用Encoder-Decoder框架的空洞卷积网络捕获绕射波场特征,从而实现绕射波分离,基于速度连续性原则构建单纯绕射波场的偏移速度模型并完成最终成像。数据测试表明,该方法最终可满足微小地质异常体高精度识别的需求。 展开更多
关键词 绕射波分离成像 深度神经网络 encoder-decoder框架 方差最大范数
下载PDF
RaptorQ喷泉码编译码算法分析及优化
8
作者 马梦宇 罗长洲 +1 位作者 梁春瑞 王杰 《系统工程与电子技术》 EI CSCD 北大核心 2024年第4期1440-1447,共8页
RaptorQ喷泉码是喷泉码的最新研究成果,理论分析和仿真验证表明,RaptorQ喷泉码是性能最好的喷泉码,同时也是编译码复杂度最高的喷泉码。针对RaptorQ喷泉码编译码复杂度高这一问题,以国际标准RFC6330所设计的RaptorQ码编译码流程为基础,... RaptorQ喷泉码是喷泉码的最新研究成果,理论分析和仿真验证表明,RaptorQ喷泉码是性能最好的喷泉码,同时也是编译码复杂度最高的喷泉码。针对RaptorQ喷泉码编译码复杂度高这一问题,以国际标准RFC6330所设计的RaptorQ码编译码流程为基础,提出一种RaptorQ编译码算法的优化版本。新的编译码流程通过固定生成矩阵的方式提前计算好生成矩阵并存储,方便随时调用;通过提前列变换的方式规避多次寻找标准行和高斯消去操作,以及通过去稀疏化的方式,减少编译码过程中的矩阵乘法和异或运算。仿真比较优化前后的编译码算法,结果表明,优化后的RaptorQ码编译码流程能够在保证传输性能不变的同时,减少RaptorQ喷泉码编译码基本运算次数、缩短RaptorQ喷泉码编译码的时间,降低了编译码的计算复杂度,并保持了传输性能。 展开更多
关键词 喷泉码 RaptorQ RFC6330 编译码算法
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
9
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRaPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
异步BiSS-C协议的FPGA解码
10
作者 陈佳文 刘晴晴 邵春江 《微电子学与计算机》 2024年第2期101-107,共7页
为了在BiSS-C协议的处理器设备(Master,MA)时钟和现场可编程门阵列(Field Programmable Gate Array,FPGA)时钟异步的情况下获得BiSS-C协议传输的数据,提出一种异步时钟下FPGA解码BiSS-C协议的实现方法。首先,在FPGA中对BiSS-C传输的编... 为了在BiSS-C协议的处理器设备(Master,MA)时钟和现场可编程门阵列(Field Programmable Gate Array,FPGA)时钟异步的情况下获得BiSS-C协议传输的数据,提出一种异步时钟下FPGA解码BiSS-C协议的实现方法。首先,在FPGA中对BiSS-C传输的编码器数据进行16倍采样,用状态机解码BiSS-C数据,并对数据进行循环冗余校验(Cyclic Redundancy Check,CRC)。其次,在ModelSim中对FPGA软件进行仿真,对状态机的功能、FPGA软件的数据判读能力进行验证。最后,搭建光栅编码器数据采集系统,对FPGA的解码效果进行验证。仿真结果和试验结果表明:在异步时钟下FPGA能正确解码BiSS-C协议传输数据,解码得到的编码器角度位置误差不大于0.1'',误码率低、解码精度高。 展开更多
关键词 BiSS-C协议 现场可编程门阵列(FPGa) 异步时钟 数据解码 编码器
下载PDF
The Dissemination of Chinese Tea Culture Based on Encoding/Decoding Theory
11
作者 TAN Hao XIANYU Jing 《Journalism and Mass Communication》 2023年第1期45-49,共5页
Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its ... Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its existence and development are also of great significance to the diversified development of world culture.Based on Stuart Hall’s encoding/decoding theory,this paper analyzes the problems in the spreading of Chinese tea in and out of the country and provides solutions from the perspective of encoding,communication,and decoding.It is expected to provide a reference for the domestic and international dissemination of Chinese tea culture. 展开更多
关键词 tea culture ENCODING DECODING COMMUNICaTION
下载PDF
The Dissemination of Intangible Cultural Heritage Along Beijing-Hangzhou Canal Based on Encoding/Decoding Theory
12
作者 TAN Hao XIANYU Jing 《Cultural and Religious Studies》 2023年第5期241-245,共5页
The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can he... The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can help to evoke cultural memories and cultural identification of the Canal and build cultural confidence.This paper applies Stuart Hall’s encoding/decoding theory to analyze the dissemination of intangible heritage tourism culture.On the basis of a practical study of the villages along the Beijing-Hangzhou Grand Canal,this paper analyses the problems in the transmission of its intangible cultural heritage and proposes specific methods to solve them in four processes,encoding,decoding,communication,and secondary encoding,in order to propose references for the transmission of intangible heritage culture at home and abroad. 展开更多
关键词 DISSEMINaTION ENCODING DECODING intangible cultural heritage
下载PDF
BER Modified Decode-and-Forward Protocol for OFDM-Based Linear Multihop Networks 被引量:3
13
作者 MIAO Tingting WANG Ning YANG Hongwen YANG Dachcng 《China Communications》 SCIE CSCD 2014年第11期34-43,共10页
In orthogonal frequency division multiplexing(OFDM) based muitihop communications,the conventional decodeand-forward(DF) relay scheme severely suffers from the error propagation problem.This drawback is serious in mui... In orthogonal frequency division multiplexing(OFDM) based muitihop communications,the conventional decodeand-forward(DF) relay scheme severely suffers from the error propagation problem.This drawback is serious in muitihop networks as errors made by any relay node may fail the decoder at the destination in great chance.In this paper,we propose a bit error rate(BER)modified DF protocol(BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used.By modeling all links except the last one as a binary symmetric channel(BSC),we derive a log likelihood ratio(LLR)modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper.Furthermore,to reduce the computational complexity and signaling overhead,the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER.In addition,for situations where the channel state information(CSI) of forward link is available,the proposed BMDF can be further enhanced by combining with subcarrier pairing(SP) and power allocation(PA),where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed.The simulation results verify the significant performance improvement to the conventional DF. 展开更多
关键词 多跳网络 ofDM 误码率 解码器 协议 转发 二进制对称信道 线性
下载PDF
Encoding-Decoding-Based Control and Filtering of Networked Systems: Insights, Developments and Opportunities 被引量:1
14
作者 Zidong Wang Licheng Wang +1 位作者 Shuai Liu Guoliang Wei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期3-18,共16页
In order to make the information transmission more efficient and reliable in a digital communication channel with limited capacity, various encoding-decoding techniques have been proposed and widely applied in many br... In order to make the information transmission more efficient and reliable in a digital communication channel with limited capacity, various encoding-decoding techniques have been proposed and widely applied in many branches of the signal processing including digital communications, data compression,information encryption, etc. Recently, due to its promising application potentials in the networked systems(NSs), the analysis and synthesis issues of the NSs under various encoding-decoding schemes have stirred some research attention. However, because of the network-enhanced complexity caused by the limited network resources, it poses new challenges to the design of suitable encoding-decoding procedures to meet certain control or filtering performance for the NSs. In this survey paper, our aim is to present a comprehensive review of the encoding-decodingbased control and filtering problems for different types of NSs.First, some basic introduction with respect to the coding-decoding mechanism is presented in terms of its engineering insights,specific properties and theoretical formulations. Then, the recent representative research progress in the design of the encodingdecoding protocols for various control and filtering problems is discussed. Some possible further research topics are finally outlined for the encoding-decoding-based NSs. 展开更多
关键词 Encoding-decoding-based communication mechanism encoding-decoding-based control encoding-decodingbased state estimation networked systems
下载PDF
基于GRU Encoder-decoder和注意力机制的RUL预测方法
15
作者 兰杰 李宁 +1 位作者 李志宁 吕建刚 《现代电子技术》 2023年第8期99-105,共7页
深度学习模型可直接建立机械设备的状态与剩余使用寿命(RUL)之间的映射关系,从而避免人工提取特征和建立健康指标的过程。文中基于深度学习理论,提出一种基于注意力机制和时序编码解码器(Encoder-decoder)相结合的RUL预测方法。首先,基... 深度学习模型可直接建立机械设备的状态与剩余使用寿命(RUL)之间的映射关系,从而避免人工提取特征和建立健康指标的过程。文中基于深度学习理论,提出一种基于注意力机制和时序编码解码器(Encoder-decoder)相结合的RUL预测方法。首先,基于门控循环神经网络(GRU)构建一个时序编码解码器以实现输入序列的重构,其中GRU-Encoder对输入的多元时间序列进行编码;再引入注意力机制对GRU-Encoder在每个时刻的输出向量进行加权融合,以融合后的向量作为编码结果,并将其输入到GRU-Decoder中实现输入序列的重构,同时将编码结果映射为输入样本的RUL。采用CMAPSS数据集对所提方法的有效性进行验证,结果表明,该方法预测精度较高,可行且有效。 展开更多
关键词 剩余使用寿命 RUL预测方法 门控循环神经网络 解码编码器 注意力机制 对比验证
下载PDF
基于Encoder-Decoder-ILSTM模型的瓦斯浓度预测研究
16
作者 陈小建 《能源与节能》 2023年第12期102-105,176,共5页
近年来,神经网络在各领域均发挥了巨大作用,同样在煤矿瓦斯浓度预测当中也有应用。为了提高模型的预测精度和实时性,结合Encoder-Decoder结构、长短期记忆形成、蛇优化算法提出了一种新的神经网络,为促进煤矿安全生产提供了技术支持。
关键词 神经网络 encoder-decoder 蛇优化算法 瓦斯浓度预测
下载PDF
基于Transformer_LSTM编解码器模型的船舶轨迹异常检测方法
17
作者 李可欣 郭健 +3 位作者 李冉冲 王宇君 李宗明 缪坤 《中国舰船研究》 CSCD 北大核心 2024年第2期223-232,共10页
[目的]为提升船舶轨迹异常检测的精度和效率,解决传统异常检测方法存在的特征表征能力有限、补偿精度不足、容易出现梯度消失、过拟合等问题,提出一种基于Transformer_LSTM编解码器模型的无监督船舶轨迹异常检测方法。[方法]该方法基于... [目的]为提升船舶轨迹异常检测的精度和效率,解决传统异常检测方法存在的特征表征能力有限、补偿精度不足、容易出现梯度消失、过拟合等问题,提出一种基于Transformer_LSTM编解码器模型的无监督船舶轨迹异常检测方法。[方法]该方法基于编码器解码器架构,由Transformer_LSTM模块替代传统神经网络实现轨迹特征提取和轨迹重构;将Transformer嵌入LSTM的递归机制,结合循环单元和注意力机制,利用自注意力和交叉注意力实现对循环单元状态向量的计算,实现对长序列模型的有效构建;通过最小化重构输出和原始输入之间的差异,使模型学习一般轨迹的特征和运动模式,将重构误差大于异常阈值的轨迹判定为异常轨迹。[结果]采用2021年1月的船舶AIS数据进行实验,结果表明,模型在准确率、精确率以及召回率上相较于LOF,DBSCAN,VAE,LSTM等经典模型有着明显提升;F1分数相较于VAE_LSTM模型提升约8.11%。[结论]该方法的异常检测性能在各项指标上显著优于传统算法,可有效、可靠地运用于海上船舶轨迹异常检测。 展开更多
关键词 异常检测 深度学习 编码器解码器 TRaNSFORMER 长短期记忆 轨迹重建
下载PDF
基于RDE-GAN算法的多阶段壁画图像修复
18
作者 冉娅琴 张乾 《湖北民族大学学报(自然科学版)》 CAS 2024年第2期219-225,共7页
针对现存的壁画图像修复方法仍存在纹理细节缺失及图像输入像素尺寸不合适的问题,提出了一种多阶段密集残差和高效注意力机制的壁画图像修复(multi stage mural image restoration based on residual dense efficient-generative advers... 针对现存的壁画图像修复方法仍存在纹理细节缺失及图像输入像素尺寸不合适的问题,提出了一种多阶段密集残差和高效注意力机制的壁画图像修复(multi stage mural image restoration based on residual dense efficient-generative adversarial networks,RDE-GAN)算法。整个网络采用编码器-解码器架构,使网络具有足够大的感受野,便于充分利用图像的特征信息。首先,利用全局感知网络得到粗略的初始结果;其次,引入较小感受野的密集残差局部过渡网络;最后,利用高效细化网络增强图像的结构信息及图像语义的连贯性。将该算法分别与其他相关算法在定性定量分析上进行比较,结果表明,在[50%,60%)掩码比例中,RDE-GAN算法的峰值信噪比(peak signal-to-noise ratio,PSNR)为32.5655 dB、结构相似性指数(structural similarity index measure,SSIM)为0.9690、学习感知图像块相似度(learned perceptual image patch similarity,LPIPS)为0.0141、生成图像与真实图像越相似指标(Fréchet inception distance,FID)为11.3027,且在其他5种掩码比例中RDE-GAN算法均优于对比算法。该研究成果能用于壁画等文化遗产的保护。 展开更多
关键词 深度学习 壁画图像 编码器-解码器 局部密集残差模块 图像修复
下载PDF
SW-SAN:基于Seq2Seq结合注意力机制与滑动窗口的车辆轨迹预测模型
19
作者 朱云鹤 刘明剑 +1 位作者 祝朗千 李沐阳 《现代电子技术》 北大核心 2024年第11期175-180,共6页
针对长时间内4~5 s车辆轨迹预测精度较差的问题,提出基于Seq2Seq结合注意力机制与滑动窗口的车辆轨迹预测模型(SW-SAN)。首先,使用滑动窗口的方法更新历史轨迹状态集合,利用编码器对目标车辆的历史轨迹数据编码,得到历史轨迹特征向量;其... 针对长时间内4~5 s车辆轨迹预测精度较差的问题,提出基于Seq2Seq结合注意力机制与滑动窗口的车辆轨迹预测模型(SW-SAN)。首先,使用滑动窗口的方法更新历史轨迹状态集合,利用编码器对目标车辆的历史轨迹数据编码,得到历史轨迹特征向量;其次,经过注意力机制计算历史时间内各时刻的关联性得分、时间注意力权重因子和历史时间相关性特征向量;最后,解码器将历史时间相关性特征向量作为输入,多次循环解码层,输出目标车辆的未来预测轨迹。实验结果表明,SW-SAN模型在4 s和5 s时预测轨迹的RMSE误差为1.99 m和1.94 m,SW-SAN模型在较长时间4~5 s的预测误差更低,在车辆轨迹预测问题上性能更强。 展开更多
关键词 交通工程 轨迹预测 深度学习 编-解码器结构 注意力机制 滑动窗口
下载PDF
多尺度特征融合对比学习结合PointMetaBase的点云分割
20
作者 杨林杰 张斌 张志圣 《现代电子技术》 北大核心 2024年第15期91-97,共7页
点云场景边界的精确分割对提升三维点云整体分割精度和小目标的分割精度都非常重要。针对现有三维点云语义分割算法中存在的对点云场景边界分割不准确的问题,设计了一种新的多尺度特征融合对比学习方法,并将其集成到PointMetaBase网络上... 点云场景边界的精确分割对提升三维点云整体分割精度和小目标的分割精度都非常重要。针对现有三维点云语义分割算法中存在的对点云场景边界分割不准确的问题,设计了一种新的多尺度特征融合对比学习方法,并将其集成到PointMetaBase网络上,提出了MFFCL-PMB三维点云语义分割网络。该网络将解码器各层的输入和输出平行多路径地输入多尺度特征提取网络,其次将多尺度特征进行拼接融合,最后由边界搜索模块确定点云场景边界点,在边界点对应的多尺度融合特征上进行对比学习,使网络学习到使特征区分度更大的权重。MFFCL-PMB在数据集S3DIS的测试集区域5上的mIoU为70.9%,相比原始的PointMetaBase,在边界上的mIoU增加了1.4%,内部区域mIoU增加了1.2%,总体mIoU增加了1.2%,边界mIoU增量比内部区域增加的mIoU更大,说明MFFCL-PMB有效增强了PointMetaBase在边界上的分割表现并提高了网络在点云总体上的语义分割性能。 展开更多
关键词 深度学习 三维点云 语义分割 对比学习 多尺度特征融合 编码器 解码器
下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部