期刊文献+
共找到30,240篇文章
< 1 2 250 >
每页显示 20 50 100
应用二维经验模分解(2D-EMD)-主成分分析(PCA)组合模型定量圈定与评价胶东金与关键金属找矿靶区
1
作者 陈永清 郑澳月 +2 位作者 费金娜 赵婕 赵鹏大 《地学前缘》 北大核心 2025年第1期266-282,共17页
近年来,随着制造业和全球经济发展,全球对矿产资源的需求量大幅上升,迫切需要研究和开发新方法来勘探未发现矿产资源。然而,多阶段的成矿作用使成矿元素在地质单元内的分布呈现出复杂的叠加特征,而且大多数矿产常常伴生多种元素。本研... 近年来,随着制造业和全球经济发展,全球对矿产资源的需求量大幅上升,迫切需要研究和开发新方法来勘探未发现矿产资源。然而,多阶段的成矿作用使成矿元素在地质单元内的分布呈现出复杂的叠加特征,而且大多数矿产常常伴生多种元素。本研究将二维经验模分解(2D-EMD)与主成分分析(PCA)相结合,基于胶东金多金属矿集区水系沉积物地球化学数据,提取局部和区域多元素组合异常分量,从多阶段成矿过程产生的复杂叠加异常中识别找矿靶区。研究结果表明:(1)通过PCA建立了Au-Ag-Cd和Be-La-Mo-Nb-Th-U-Y两种多元素组合;(2)应用2D-EMD从主成分得分分别识别多元素成矿组合局部和区域异常分量;(3)局部异常分量可用于识别Au-Ag-Cd和Be-La-Mo-Nb-Th-U-Y找矿靶区,区域异常分量可识别高背景带。结合局部异常分量和花岗岩的空间分布,推断Au-Ag-Cd矿化与玲珑花岗岩和郭家岭花岗闪长岩侵入有关,Be-La-Mo-Nb-Th-U-Y矿化与郭家岭花岗闪长岩侵入体和伟德山二长岩侵入体侵入有关,郭家岭花岗闪长岩岩体具有贵金属和关键金属双重成矿特征。 展开更多
关键词 2D-emD PCA 多元素组合异常分量 胶东金多金属矿集区
下载PDF
Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence 被引量:1
2
作者 Ali Hamid Farea Omar H.Alhazmi Kerem Kucuk 《Computers, Materials & Continua》 SCIE EI 2024年第2期1525-1545,共21页
While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),... While emerging technologies such as the Internet of Things(IoT)have many benefits,they also pose considerable security challenges that require innovative solutions,including those based on artificial intelligence(AI),given that these techniques are increasingly being used by malicious actors to compromise IoT systems.Although an ample body of research focusing on conventional AI methods exists,there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures.To contribute to this nascent research stream,a novel AI-driven security system denoted as“AI2AI”is presented in this work.AI2AI employs AI techniques to enhance the performance and optimize security mechanisms within the IoT framework.We also introduce the Genetic Algorithm Anomaly Detection and Prevention Deep Neural Networks(GAADPSDNN)sys-tem that can be implemented to effectively identify,detect,and prevent cyberattacks targeting IoT devices.Notably,this system demonstrates adaptability to both federated and centralized learning environments,accommodating a wide array of IoT devices.Our evaluation of the GAADPSDNN system using the recently complied WUSTL-IIoT and Edge-IIoT datasets underscores its efficacy.Achieving an impressive overall accuracy of 98.18%on the Edge-IIoT dataset,the GAADPSDNN outperforms the standard deep neural network(DNN)classifier with 94.11%accuracy.Furthermore,with the proposed enhancements,the accuracy of the unoptimized random forest classifier(80.89%)is improved to 93.51%,while the overall accuracy(98.18%)surpasses the results(93.91%,94.67%,94.94%,and 94.96%)achieved when alternative systems based on diverse optimization techniques and the same dataset are employed.The proposed optimization techniques increase the effectiveness of the anomaly detection system by efficiently achieving high accuracy and reducing the computational load on IoT devices through the adaptive selection of active features. 展开更多
关键词 Internet of Things SECURITY anomaly detection and prevention system artificial intelligence optimization techniques
下载PDF
Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention
3
作者 Yifan Gao Jieming Zhang +1 位作者 Zhanchen Chen Xianchao Chen 《Computers, Materials & Continua》 SCIE EI 2024年第4期493-507,共15页
In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower s... In this paper, we propose a novel anomaly detection method for data centers based on a combination of graphstructure and abnormal attention mechanism. The method leverages the sensor monitoring data from targetpower substations to construct multidimensional time series. These time series are subsequently transformed intograph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matricesand additional weights associated with the graph structure, an aggregation matrix is derived. The aggregationmatrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features.Moreover, both themultidimensional time series segments and the graph structure features are inputted into a pretrainedanomaly detectionmodel, resulting in corresponding anomaly detection results that help identify abnormaldata. The anomaly detection model consists of a multi-level encoder-decoder module, wherein each level includesa transformer encoder and decoder based on correlation differences. The attention module in the encoding layeradopts an abnormal attention module with a dual-branch structure. Experimental results demonstrate that ourproposed method significantly improves the accuracy and stability of anomaly detection. 展开更多
关键词 anomaly detection TRANSFORMER graph structure
下载PDF
PUNet:A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data
4
作者 Gang Long Zhaoxin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第10期327-343,共17页
Network anomaly detection plays a vital role in safeguarding network security.However,the existing network anomaly detection task is typically based on the one-class zero-positive scenario.This approach is susceptible... Network anomaly detection plays a vital role in safeguarding network security.However,the existing network anomaly detection task is typically based on the one-class zero-positive scenario.This approach is susceptible to overfitting during the training process due to discrepancies in data distribution between the training set and the test set.This phenomenon is known as prediction drift.Additionally,the rarity of anomaly data,often masked by normal data,further complicates network anomaly detection.To address these challenges,we propose the PUNet network,which ingeniously combines the strengths of traditional machine learning and deep learning techniques for anomaly detection.Specifically,PUNet employs a reconstruction-based autoencoder to pre-train normal data,enabling the network to capture potential features and correlations within the data.Subsequently,PUNet integrates a sampling algorithm to construct a pseudo-label candidate set among the outliers based on the reconstruction loss of the samples.This approach effectively mitigates the prediction drift problem by incorporating abnormal samples.Furthermore,PUNet utilizes the CatBoost classifier for anomaly detection to tackle potential data imbalance issues within the candidate set.Extensive experimental evaluations demonstrate that PUNet effectively resolves the prediction drift and data imbalance problems,significantly outperforming competing methods. 展开更多
关键词 Network anomaly detection representation learning candidate set CatBoost
下载PDF
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things
5
作者 Mengmeng Zhao Haipeng Peng +1 位作者 Lixiang Li Yeqing Ren 《Computers, Materials & Continua》 SCIE EI 2024年第8期2815-2837,共23页
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A... In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods. 展开更多
关键词 Multivariate time series anomaly detection spatial-temporal network TRANSFORMER
下载PDF
Challenging situation of coronary artery anomaly associated with ischemia and/or risk of sudden death
6
作者 Shigenori Ito 《World Journal of Cardiology》 2024年第4期173-176,共4页
Coronary artery anomaly is known as one of the causes of angina pectoris and sudden death and is an important clinical entity that cannot be overlooked.The incidence of coronary artery anomalies is as low as 1%-2%of t... Coronary artery anomaly is known as one of the causes of angina pectoris and sudden death and is an important clinical entity that cannot be overlooked.The incidence of coronary artery anomalies is as low as 1%-2%of the general population,even when the various types are combined.Coronary anomalies are practically challenging when the left and right coronary ostium are not found around their normal positions during coronary angiography with a catheter.If there is atherosclerotic stenosis of the coronary artery with an anomaly and percutaneous coronary intervention(PCI)is required,the suitability of the guiding catheter at the entrance and the adequate back up force of the guiding catheter are issues.The level of PCI risk itself should also be considered on a caseby-case basis.In this case,emission computed tomography in the R-1 subtype single coronary artery proved that ischemia occurred in an area where the coronary artery was not visible to the naked eye.Meticulous follow-up would be crucial,because sudden death may occur in single coronary arteries.To prevent atherosclerosis with full efforts is also important,as the authors indicated admirably. 展开更多
关键词 Coronary artery anomaly Single coronary artery ISCHemIA Sudden death Percutaneous coronary intervention Coronary vessel anomalies Myocardial ischemia Sudden cardiac death
下载PDF
Enhancing Log Anomaly Detection with Semantic Embedding and Integrated Neural Network Innovations
7
作者 Zhanyang Xu Zhe Wang +2 位作者 Jian Xu Hongyan Shi Hong Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第9期3991-4015,共25页
System logs,serving as a pivotal data source for performance monitoring and anomaly detection,play an indispensable role in assuring service stability and reliability.Despite this,the majority of existing log-based an... System logs,serving as a pivotal data source for performance monitoring and anomaly detection,play an indispensable role in assuring service stability and reliability.Despite this,the majority of existing log-based anomaly detection methodologies predominantly depend on the sequence or quantity attributes of logs,utilizing solely a single Recurrent Neural Network(RNN)and its variant sequence models for detection.These approaches have not thoroughly exploited the semantic information embedded in logs,exhibit limited adaptability to novel logs,and a single model struggles to fully unearth the potential features within the log sequence.Addressing these challenges,this article proposes a hybrid architecture based on amultiscale convolutional neural network,efficient channel attention and mogrifier gated recurrent unit networks(LogCEM),which amalgamates multiple neural network technologies.Capitalizing on the superior performance of robustly optimized BERT approach(RoBERTa)in the realm of natural language processing,we employ RoBERTa to extract the original word vectors from each word in the log template.In conjunction with the enhanced Smooth Inverse Frequency(SIF)algorithm,we generate more precise log sentence vectors,thereby achieving an in-depth representation of log semantics.Subsequently,these log vector sequences are fed into a hybrid neural network,which fuses 1D Multi-Scale Convolutional Neural Network(MSCNN),Efficient Channel Attention Mechanism(ECA),and Mogrifier Gated Recurrent Unit(GRU).This amalgamation enables themodel to concurrently capture the local and global dependencies of the log sequence and autonomously learn the significance of different log sequences,thereby markedly enhancing the efficacy of log anomaly detection.To validate the effectiveness of the LogCEM model,we conducted evaluations on two authoritative open-source datasets.The experimental results demonstrate that LogCEM not only exhibits excellent accuracy and robustness,but also outperforms the current mainstream log anomaly detection methods. 展开更多
关键词 Deep learning log analysis anomaly detection natural language processing
下载PDF
A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks
8
作者 Bing Liu Zhe Zhang +3 位作者 Shengrong Hu Song Sun Dapeng Liu Zhenyu Qiu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4049-4069,共21页
Internet of Things(IoT)is vulnerable to data-tampering(DT)attacks.Due to resource limitations,many anomaly detection systems(ADSs)for IoT have high false positive rates when detecting DT attacks.This leads to the misr... Internet of Things(IoT)is vulnerable to data-tampering(DT)attacks.Due to resource limitations,many anomaly detection systems(ADSs)for IoT have high false positive rates when detecting DT attacks.This leads to the misreporting of normal data,which will impact the normal operation of IoT.To mitigate the impact caused by the high false positive rate of ADS,this paper proposes an ADS management scheme for clustered IoT.First,we model the data transmission and anomaly detection in clustered IoT.Then,the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on every IoT device.In the presence of a high false positive rate in ADSs,to deal with the trade-off between the security and availability of data,we develop a linear programming model referred to as a security trade-off(ST)model.Next,we develop an analysis framework for the ST model,and solve the ST model on an IoT simulation platform.Last,we reveal the effect of some factors on the maximum combined detection rate through theoretical analysis.Simulations show that the ADS management scheme can mitigate the data unavailability loss caused by the high false positive rates in ADS. 展开更多
关键词 Network security Internet of Things data-tampering attack anomaly detection
下载PDF
An alternative 2D ICEEMDAN-based denoising method and its application in processing magnetic anomaly data
9
作者 Jun Xu Jinsong Du Changqing Yuan 《Geodesy and Geodynamics》 EI CSCD 2024年第5期465-476,共12页
Due to environmental noise and human factors,magnetic data collected in the field often contain various noises and interferences that significantly affect the subsequent data processing and interpretation.Empirical Mo... Due to environmental noise and human factors,magnetic data collected in the field often contain various noises and interferences that significantly affect the subsequent data processing and interpretation.Empirical Mode Decomposition(EMD),an adaptive multiscale analysis method for nonlinear and non-stationary signals,is widely used in geophysical and geodetic data processing.Compared with traditional EMD,Improved Complete Ensemble EMD with Adaptive Noise(ICEEMDAN)is more effective in addressing the problem of mode mixing.Based on the principles of 1D ICEEMDAN,this paper presents an alternative algorithm for 2D ICEEMDAN,extending its application to two-dimensional scenarios.The effectiveness of the proposed approach is demonstrated through synthetic signal experiments,which show that the 2D ICEEMDAN exhibits a weaker mode mixing effect compared to the traditional bidimensional EMD(BEMD)method.Furthermore,to improve the performance of the denoising method based on 2D ICEEMDAN and preserve useful signals in high-frequency components,an improved soft thresholding technique is introduced.Synthetic magnetic anomaly data testing indicates that our denoising method effectively preserves signal continuity and outperforms traditional soft thresholding methods.To validate the practical application of this improved threshold denoising method based on 2D ICEEMDAN,it is applied to ground magnetic survey data in the Yandun area of Xinjiang.The results demonstrate the effectiveness of the method in removing noise while retaining essential information from practical magnetic anomaly data.In particular,practical applications suggest that 2D ICEEMDAN can extract trend signals more accurately than the BEMD.In conclusion,as a potential tool for multi-scale decomposition,the 2D ICEEMDAN is versatile in processing and analyzing 2D geophysical and geodetic data. 展开更多
关键词 2D ICEemDAN Mode mixing effect Magnetic anomaly DENOISING Improved soft thresholding
下载PDF
A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data
10
作者 Sameema Tariq Ata-Ur-Rehman +4 位作者 Maria Abubakar Waseem Iqbal Hatoon S.Alsagri Yousef A.Alduraywish Haya Abdullah AAlhakbani 《Computers, Materials & Continua》 SCIE EI 2024年第11期2493-2515,共23页
In video surveillance,anomaly detection requires training machine learning models on spatio-temporal video sequences.However,sometimes the video-only data is not sufficient to accurately detect all the abnormal activi... In video surveillance,anomaly detection requires training machine learning models on spatio-temporal video sequences.However,sometimes the video-only data is not sufficient to accurately detect all the abnormal activities.Therefore,we propose a novel audio-visual spatiotemporal autoencoder specifically designed to detect anomalies for video surveillance by utilizing audio data along with video data.This paper presents a competitive approach to a multi-modal recurrent neural network for anomaly detection that combines separate spatial and temporal autoencoders to leverage both spatial and temporal features in audio-visual data.The proposed model is trained to produce low reconstruction error for normal data and high error for abnormal data,effectively distinguishing between the two and assigning an anomaly score.Training is conducted on normal datasets,while testing is performed on both normal and anomalous datasets.The anomaly scores from the models are combined using a late fusion technique,and a deep dense layer model is trained to produce decisive scores indicating whether a sequence is normal or anomalous.The model’s performance is evaluated on the University of California,San Diego Pedestrian 2(UCSD PED 2),University of Minnesota(UMN),and Tampere University of Technology(TUT)Rare Sound Events datasets using six evaluation metrics.It is compared with state-of-the-art methods depicting a high Area Under Curve(AUC)and a low Equal Error Rate(EER),achieving an(AUC)of 93.1 and an(EER)of 8.1 for the(UCSD)dataset,and an(AUC)of 94.9 and an(EER)of 5.9 for the UMN dataset.The evaluations demonstrate that the joint results from the combined audio-visual model outperform those from separate models,highlighting the competitive advantage of the proposed multi-modal approach. 展开更多
关键词 Acoustic-visual anomaly detection sequence-to-sequence autoencoder reconstruction error late fusion regularity score
下载PDF
Deep Learning-Driven Anomaly Detection for IoMT-Based Smart Healthcare Systems
11
作者 Attiya Khan Muhammad Rizwan +3 位作者 Ovidiu Bagdasar Abdulatif Alabdulatif Sulaiman Alamro Abdullah Alnajim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2121-2141,共21页
The Internet of Medical Things(IoMT)is an emerging technology that combines the Internet of Things(IoT)into the healthcare sector,which brings remarkable benefits to facilitate remote patient monitoring and reduce tre... The Internet of Medical Things(IoMT)is an emerging technology that combines the Internet of Things(IoT)into the healthcare sector,which brings remarkable benefits to facilitate remote patient monitoring and reduce treatment costs.As IoMT devices become more scalable,Smart Healthcare Systems(SHS)have become increasingly vulnerable to cyberattacks.Intrusion Detection Systems(IDS)play a crucial role in maintaining network security.An IDS monitors systems or networks for suspicious activities or potential threats,safeguarding internal networks.This paper presents the development of an IDS based on deep learning techniques utilizing benchmark datasets.We propose a multilayer perceptron-based framework for intrusion detection within the smart healthcare domain.The primary objective of our work is to protect smart healthcare devices and networks from malicious attacks and security risks.We employ the NSL-KDD and UNSW-NB15 intrusion detection datasets to evaluate our proposed security framework.The proposed framework achieved an accuracy of 95.0674%,surpassing that of comparable deep learning models in smart healthcare while also reducing the false positive rate.Experimental results indicate the feasibility of using a multilayer perceptron,achieving superior performance against cybersecurity threats in the smart healthcare domain. 展开更多
关键词 anomaly detection deep learning Internet of Things(IoT) health care
下载PDF
A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment
12
作者 Weijian Song Xi Li +3 位作者 Peng Chen Juan Chen Jianhua Ren Yunni Xia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期3001-3016,共16页
With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other fields.However,with the continuous expansion of the scale and increasin... With the rapid development of Internet of Things(IoT)technology,IoT systems have been widely applied in health-care,transportation,home,and other fields.However,with the continuous expansion of the scale and increasing complexity of IoT systems,the stability and security issues of IoT systems have become increasingly prominent.Thus,it is crucial to detect anomalies in the collected IoT time series from various sensors.Recently,deep learning models have been leveraged for IoT anomaly detection.However,owing to the challenges associated with data labeling,most IoT anomaly detection methods resort to unsupervised learning techniques.Nevertheless,the absence of accurate abnormal information in unsupervised learning methods limits their performance.To address these problems,we propose AS-GCN-MTM,an adaptive structural Graph Convolutional Networks(GCN)-based framework using a mean-teacher mechanism(AS-GCN-MTM)for anomaly identification.It performs better than unsupervised methods using only a small amount of labeled data.Mean Teachers is an effective semi-supervised learning method that utilizes unlabeled data for training to improve the generalization ability and performance of the model.However,the dependencies between data are often unknown in time series data.To solve this problem,we designed a graph structure adaptive learning layer based on neural networks,which can automatically learn the graph structure from time series data.It not only better captures the relationships between nodes but also enhances the model’s performance by augmenting key data.Experiments have demonstrated that our method improves the baseline model with the highest F1 value by 10.4%,36.1%,and 5.6%,respectively,on three real datasets with a 10%data labeling rate. 展开更多
关键词 IoT multivariate time series anomaly detection graph learning SemI-SUPERVISED mean teachers
下载PDF
An intelligent active probing and trace-back scheme for IoT anomaly detection
13
作者 Luying Wang Lingyi Chen +3 位作者 Neal N.Xiong Anfeng Liu Tian Wang Mianxiong Dong 《Digital Communications and Networks》 SCIE CSCD 2024年第1期168-181,共14页
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and ... Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data collection.An Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%. 展开更多
关键词 anomaly detection Internet of things Integrating data collection Mobile edge users INTELLIGENT
下载PDF
FusionNN:A Semantic Feature Fusion Model Based on Multimodal for Web Anomaly Detection
14
作者 Li Wang Mingshan Xia +3 位作者 Hao Hu Jianfang Li Fengyao Hou Gang Chen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2991-3006,共16页
With the rapid development of the mobile communication and the Internet,the previous web anomaly detectionand identificationmodels were built relying on security experts’empirical knowledge and attack features.Althou... With the rapid development of the mobile communication and the Internet,the previous web anomaly detectionand identificationmodels were built relying on security experts’empirical knowledge and attack features.Althoughthis approach can achieve higher detection performance,it requires huge human labor and resources to maintainthe feature library.In contrast,semantic feature engineering can dynamically discover new semantic featuresand optimize feature selection by automatically analyzing the semantic information contained in the data itself,thus reducing dependence on prior knowledge.However,current semantic features still have the problem ofsemantic expression singularity,as they are extracted from a single semantic mode such as word segmentation,character segmentation,or arbitrary semantic feature extraction.This paper extracts features of web requestsfrom dual semantic granularity,and proposes a semantic feature fusion method to solve the above problems.Themethod first preprocesses web requests,and extracts word-level and character-level semantic features of URLs viaconvolutional neural network(CNN),respectively.By constructing three loss functions to reduce losses betweenfeatures,labels and categories.Experiments on the HTTP CSIC 2010,Malicious URLs and HttpParams datasetsverify the proposedmethod.Results show that compared withmachine learning,deep learningmethods and BERTmodel,the proposed method has better detection performance.And it achieved the best detection rate of 99.16%in the dataset HttpParams. 展开更多
关键词 Feature fusion web anomaly detection MULTIMODAL convolutional neural network(CNN) semantic feature extraction
下载PDF
Anomaly-Resistant Decentralized State Estimation Under Minimum Error Entropy With Fiducial Points for Wide-Area Power Systems
15
作者 Bogang Qu Zidong Wang +2 位作者 Bo Shen Hongli Dong Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期74-87,共14页
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines... This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines. Two classes of measurements(i.e., local measurements and edge measurements) are obtained, respectively, from the individual area and the transmission lines. A decentralized state estimator, whose performance is resistant against measurement with anomalies, is designed based on the minimum error entropy with fiducial points(MEEF) criterion. Specifically, 1) An augmented model, which incorporates the local prediction and local measurement, is developed by resorting to the unscented transformation approach and the statistical linearization approach;2) Using the augmented model, an MEEF-based cost function is designed that reflects the local prediction errors of the state and the measurement;and 3) The local estimate is first obtained by minimizing the MEEF-based cost function through a fixed-point iteration and then updated by using the edge measuring information. Finally, simulation experiments with three scenarios are carried out on the IEEE 14-bus system to illustrate the validity of the proposed anomaly-resistant decentralized SE scheme. 展开更多
关键词 Decentralized state estimation(SE) measurements with anomalies minimum error entropy unscented Kalman filter wide-area power systems
下载PDF
基于EM-KF算法的微地震信号去噪方法
16
作者 李学贵 张帅 +2 位作者 吴钧 段含旭 王泽鹏 《吉林大学学报(信息科学版)》 CAS 2024年第2期200-209,共10页
针对微地震信号能量较弱,噪声较强,使微地震弱信号难以提取问题,提出了一种基于EM-KF(Expectation Maximization Kalman Filter)的微地震信号去噪方法。通过建立一个符合微地震信号规律的状态空间模型,并利用EM(Expectation Maximizati... 针对微地震信号能量较弱,噪声较强,使微地震弱信号难以提取问题,提出了一种基于EM-KF(Expectation Maximization Kalman Filter)的微地震信号去噪方法。通过建立一个符合微地震信号规律的状态空间模型,并利用EM(Expectation Maximization)算法获取卡尔曼滤波的参数最优解,结合卡尔曼滤波,可以有效地提升微地震信号的信噪比,同时保留有效信号。通过合成和真实数据实验结果表明,与传统的小波滤波和卡尔曼滤波相比,该方法具有更高的效率和更好的精度。 展开更多
关键词 微地震 em算法 卡尔曼滤波 信噪比
下载PDF
不同EMS处理时间对大豆诱变后代主要品质含量变化影响分析 被引量:1
17
作者 王新风 汪辉 +1 位作者 侯云龙 王跃强 《大豆科技》 2024年第2期14-18,共5页
为探究不同EMS处理时间对大豆诱变后代主要品质含量变化的影响,文章利用0.5%EMS溶液处理大豆高蛋白品系公交1057-1,分别浸泡4、7和10 h(清水冲洗处理为对照),对播种后获得的连续4代诱变后代主要品质含量变化进行分析。结果表明,与对照相... 为探究不同EMS处理时间对大豆诱变后代主要品质含量变化的影响,文章利用0.5%EMS溶液处理大豆高蛋白品系公交1057-1,分别浸泡4、7和10 h(清水冲洗处理为对照),对播种后获得的连续4代诱变后代主要品质含量变化进行分析。结果表明,与对照相较,经EMS处理后的植株成活率随处理时间延长而降低。其中,经EMS-4处理后的植株成活率最高,为43.5%;经EMS-10处理后的植株成活率最低,仅为16.0%。不同EMS处理时间对大豆诱变后代的蛋白质含量影响显著,对脂肪含量影响不明显。其中经EMS-4处理的诱变后代蛋白质含量高于其他3组处理;经EMS-4处理后的M2代蛋白质含量发生显著分离,并出现超亲个体,脂肪含量变化不显著。 展开更多
关键词 甲基磺酸乙酯(emS) 大豆 蛋白质含量 脂肪含量
下载PDF
甲基磺酸乙酯(EMS)对谷子种子及幼苗活力的影响
18
作者 闫锋 董扬 +7 位作者 赵富阳 侯晓敏 李清泉 王冰雪 周超 杨慧莹 范国权 刘凯 《现代农业研究》 2024年第7期1-5,共5页
为了探明甲基磺酸乙酯(EMS)诱变嫩选18种子构建突变体库的最适条件,加快品种选育进程,本研究对嫩选18种子进行了3种处理时间、3种EMS处理浓度的化学诱导,并对M1种子发芽及幼苗生长的诱变效应进行研究。结果表明:与对照相比,EMS处理在浓... 为了探明甲基磺酸乙酯(EMS)诱变嫩选18种子构建突变体库的最适条件,加快品种选育进程,本研究对嫩选18种子进行了3种处理时间、3种EMS处理浓度的化学诱导,并对M1种子发芽及幼苗生长的诱变效应进行研究。结果表明:与对照相比,EMS处理在浓度0.4%下浸种6 h对嫩选18的发芽率及幼苗生长影响差异不显著,随着EMS浸种浓度、时间增加,种子萌发及幼苗生长逐渐受到抑制,在1.2%浓度下浸种14 h对种子萌发及幼苗生长抑制作用最强,极大降低了嫩选18的发芽势、发芽率、成苗率,并且导致幼苗生长缓慢。以存活率达到50%为标准,通过回归方程计算出在6 h、10 h、14 h浸种时间下,EMS浓度的半致死剂量分别为0.99%、0.72%、0.38%,可作为嫩选18 EMS诱变建立突变体库的适合条件。 展开更多
关键词 谷子 种子萌发 幼苗生长 甲基磺酸乙酯(emS)
下载PDF
双边定时截尾下Pareto分布的参数的极大似然估计的EM算法
19
作者 田霆 刘次华 《电子产品可靠性与环境试验》 2024年第3期52-54,共3页
给出了当寿命分布为Pareto分布时,双边定时截尾寿命试验下形状参数的极大似然估计。由于似然方程形式较复杂,无法得到参数的显式表达式。但可证明此极大似然估计是唯一存在的,并利用EM算法求出了此参数的一种估计。
关键词 PARETO分布 双边定时截尾 极大似然估计 em算法
下载PDF
EM菌发酵兔粪浸出液对小球藻生长及生化成分的影响
20
作者 罗静波 陈树睿 《长江大学学报(自然科学版)》 2024年第4期120-125,共6页
研究了EM厨余堆肥菌发酵处理的兔粪浸出液对小球藻(Chlorella vulgaris)的生长及蛋白质、可溶性糖、叶绿素等生化成分的影响。结果表明,兔粪浸出液处理组中,7%浓度组小球藻在第12天时达到最大现存量,为1.06×10^(7)个/mL,而对照组... 研究了EM厨余堆肥菌发酵处理的兔粪浸出液对小球藻(Chlorella vulgaris)的生长及蛋白质、可溶性糖、叶绿素等生化成分的影响。结果表明,兔粪浸出液处理组中,7%浓度组小球藻在第12天时达到最大现存量,为1.06×10^(7)个/mL,而对照组最大现存量只有6.45×10^(6)个/mL;7%浓度组的小球藻与对照组相比生长差异表现明显。5%、7%浓度组在第8天时其藻细胞密度已接近对照组的最大现存量,分别为6.02×10^(6)个/mL和6.80×10^(6)个/mL,表明适宜浓度的兔粪浸出液处理对小球藻的生长有刺激作用。低浓度组中3%浓度组的小球藻生长不理想,但蛋白质积累最高,含量达到17.31 mg/L,与对照组相比差异显著(P<0.05)。6%浓度组的可溶性糖含量最高,为332.7 mg/L,其叶绿素a、叶绿素b和类胡萝卜素含量分别为3.19、1.58 mg/L和0.57 mg/L,与对照组相比差异显著。 展开更多
关键词 em 兔粪浸出液 小球藻(Chlorella vulgaris) 生长 生化成分
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部