期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems
1
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
下载PDF
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator 被引量:1
2
作者 Kamayani Shrivastav R.P.Yadav K.C.Jain 《Digital Communications and Networks》 SCIE CSCD 2021年第1期55-61,共7页
This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Fr... This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Frequency Division Multiplexing(OFDM)receivers used for high speed and high spectral efficient wireless communication systems.The MAP cost function for joint estimation and detection is derived and optimized further with the proposed cyclic gradient descent optimization algorithm.The proposed joint estimation and detection algorithm relaxes the restriction of small PHN assumptions and utilizes the prior statistical knowledge of PHN spectral components to produce a statistically optimal solution.The frequency-domain estimation of Channel Transfer Function(CTF)in frequency selective fading makes the method simpler,compared with the estimation of Channel Impulse Response(CIR)in the time domain.Two different time-varying PHN models,produced by Free Running Oscillator(FRO)and Phase-Locked Loop(PLL)oscillator,are presented and compared for performance difference with proposed OFDM receiver.Simulation results for joint MAP channel estimation are compared with Cramer-Rao Lower Bound(CRLB),and the simulation results for joint MAP data detection are compared with“NO PHN"performance to demonstrate that the proposed joint MAP estimation and detection algorithm achieve near-optimum performance even under multipath channel fading. 展开更多
关键词 Orthogonal frequency division multiplexing Phase noise Free running oscillator Phase-locked loop oscillator Maximum a posteriori Channel estimation data detection
下载PDF
A Power Data Anomaly Detection Model Based on Deep Learning with Adaptive Feature Fusion
3
作者 Xiu Liu Liang Gu +3 位作者 Xin Gong Long An Xurui Gao Juying Wu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4045-4061,共17页
With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve suffi... With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve sufficient extraction of data features,which seriously affects the accuracy and performance of anomaly detection.Therefore,this paper proposes a deep learning-based anomaly detection model for power data,which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction.Aiming at the distribution variability of power data,this paper developed a sliding window-based data adjustment method for this model,which solves the problem of high-dimensional feature noise and low-dimensional missing data.To address the problem of insufficient feature fusion,an adaptive feature fusion method based on feature dimension reduction and dictionary learning is proposed to improve the anomaly data detection accuracy of the model.In order to verify the effectiveness of the proposed method,we conducted effectiveness comparisons through elimination experiments.The experimental results show that compared with the traditional anomaly detection methods,the method proposed in this paper not only has an advantage in model accuracy,but also reduces the amount of parameter calculation of the model in the process of feature matching and improves the detection speed. 展开更多
关键词 data alignment dimension reduction feature fusion data anomaly detection deep learning
下载PDF
Bad Data Detection Algorithm for PMU Based on Spectral Clustering 被引量:11
4
作者 Zhiwei Yang Hao Liu +1 位作者 Tianshu Bi Qixun Yang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第3期473-483,共11页
Phasor measurement units(PMUs) can provide real-time measurement data to construct the ubiquitous electric of the Internet of Things. However, due to complex factors on site, PMU data can be easily compromised by inte... Phasor measurement units(PMUs) can provide real-time measurement data to construct the ubiquitous electric of the Internet of Things. However, due to complex factors on site, PMU data can be easily compromised by interference or synchronization jitter. It will lead to various levels of PMU data quality issues, which can directly affect the PMU-based application and even threaten the safety of power systems. In order to improve the PMU data quality, a data-driven PMU bad data detection algorithm based on spectral clustering using single PMU data is proposed in this paper. The proposed algorithm does not require the system topology and parameters. Firstly, a data identification method based on a decision tree is proposed to distinguish event data and bad data by using the slope feature of each data. Then, a bad data detection method based on spectral clustering is developed. By analyzing the weighted relationships among all the data, this method can detect the bad data with a small deviation. Simulations and results of field recording data test illustrate that this data-driven method can achieve bad data identification and detection effectively. This technique can improve PMU data quality to guarantee its applications in the power systems. 展开更多
关键词 Phasor measurement units(PMUs) bad data detection event data identification decision tree spectral clustering
原文传递
Joint DOA and channel estimation with data detection based on 2D unitary ESPRIT in massive MIMO systems 被引量:1
5
作者 Jing-ming KUANG Yuan ZHOU Ze-song FEI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第6期841-849,共9页
We propose a novel method for joint two-dimensional (2D) direction-of-arrival (DOA) and channel estimation with data detection for uniform rectangular arrays (URAs) for the massive multiple-input multiple-output (MIMO... We propose a novel method for joint two-dimensional (2D) direction-of-arrival (DOA) and channel estimation with data detection for uniform rectangular arrays (URAs) for the massive multiple-input multiple-output (MIMO) systems. The conventional DOA estimation algorithms usually assume that the channel impulse responses are known exactly. However, the large number of antennas in a massive MIMO system can lead to a challenge in estimating accurate corresponding channel impulse responses. In contrast, a joint DOA and channel estimation scheme is proposed, which first estimates the channel impulse responses for the links between the transmitters and antenna elements using training sequences. After that, the DOAs of the waves are estimated based on a unitary ESPRIT algorithm using previous channel impulse response estimates instead of accurate channel impulse responses and then, the enhanced channel impulse response estimates can be obtained. The proposed estimator enjoys closedform expressions, and thus it bypasses the search and pairing processes. In addition, a low-complexity approach toward data detection is presented by reducing the dimension of the inversion matrix in massive MIMO systems.Different cases for the proposed method are analyzed by changing the number of antennas. Experimental results demonstrate the validity of the proposed method. 展开更多
关键词 Two-dimensional (2D) direction-of-arrival (DOA) estimation Channel impulse response estimation data detection Uniform rectangular array (URA) Massive multiple-input multiple-output (MIMO)
原文传递
On Accurate Detection of Oceanic Features from Satellite IR Data Using ICSED Method
6
作者 李俊 周风仙 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 1992年第3期373-382,共10页
ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the ... ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed. 展开更多
关键词 On Accurate detection of Oceanic Features from Satellite IR data Using ICSED Method IR
下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
7
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(dataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
8
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
Biomedical Event Extraction Using a New Error Detection Learning Approach Based on Neural Network 被引量:2
9
作者 Xiaolei Ma Yang Lu +2 位作者 Yinan Lu Zhili Pei Jichao Liu 《Computers, Materials & Continua》 SCIE EI 2020年第5期923-941,共19页
Supervised machine learning approaches are effective in text mining,but their success relies heavily on manually annotated corpora.However,there are limited numbers of annotated biomedical event corpora,and the availa... Supervised machine learning approaches are effective in text mining,but their success relies heavily on manually annotated corpora.However,there are limited numbers of annotated biomedical event corpora,and the available datasets contain insufficient examples for training classifiers;the common cure is to seek large amounts of training samples from unlabeled data,but such data sets often contain many mislabeled samples,which will degrade the performance of classifiers.Therefore,this study proposes a novel error data detection approach suitable for reducing noise in unlabeled biomedical event data.First,we construct the mislabeled dataset through error data analysis with the development dataset.The sample pairs’vector representations are then obtained by the means of sequence patterns and the joint model of convolutional neural network and long short-term memory recurrent neural network.Following this,the sample identification strategy is proposed,using error detection based on pair representation for unlabeled data.With the latter,the selected samples are added to enrich the training dataset and improve the classification performance.In the BioNLP Shared Task GENIA,the experiments results indicate that the proposed approach is competent in extract the biomedical event from biomedical literature.Our approach can effectively filter some noisy examples and build a satisfactory prediction model. 展开更多
关键词 Biomedical event extraction pair representation error data detection sample identification
下载PDF
Symbiotic Radio Systems:Detection and Performance Analysis
10
作者 CUI Ziqi WANG Gongpu +2 位作者 WANG Zhigang AI Bo XIAO Huahua 《ZTE Communications》 2022年第3期93-98,共6页
Symbiotic radio(SR)is an emerging green technology for the Internet of Things(IoT).One key challenge of the SR systems is to design efficient and low-complexity detectors,which is the focus of this paper.We first driv... Symbiotic radio(SR)is an emerging green technology for the Internet of Things(IoT).One key challenge of the SR systems is to design efficient and low-complexity detectors,which is the focus of this paper.We first drive the mathematical expression of the optimal maximum-likelihood(ML)detector,and then propose a suboptimal iterative detector with low complexity.Finally,we show through numerical results that our proposed detector can obtain near-optimal bit error rate(BER)performance at a low computational cost. 展开更多
关键词 bit error rate data detection Internet of Things symbiotic radio system wireless communication
下载PDF
Detecting Climate Change in Using Extreme Data from Two Surface Weather Stations: Case Study Valle of Comitan and La Esperanza, Chiapas, Mexico
11
作者 Martín Mundo-Molina Eber A. Godinez-Gutiérrez +1 位作者 José Luis Pérez-Díaz Daniel Hernández-Cruz 《Journal of Water Resource and Protection》 2021年第12期1061-1075,共15页
The study area is located between the cities of Comitan (16&deg;10'43"N and 92&deg;04'20''W) a city with 150,000 inhabitants and La Esperanza (16&deg;9'15''N and 91&deg... The study area is located between the cities of Comitan (16&deg;10'43"N and 92&deg;04'20''W) a city with 150,000 inhabitants and La Esperanza (16&deg;9'15''N and 91&deg;52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05. 展开更多
关键词 Detecting Climate Change in Using Extreme data from Two Surface Weather Stations: Case Study Valle of Comitan and La Esperanza CHIAPAS Mexico
下载PDF
Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networks
12
作者 Bairen Chen Q.H.Wu +1 位作者 Mengshi Li Kaishun Xiahou 《Protection and Control of Modern Power Systems》 SCIE EI 2023年第2期1-12,共12页
State estimation plays a vital role in the stable operation of modern power systems,but it is vulnerable to cyber attacks.False data injection attacks(FDIA),one of the most common cyber attacks,can tamper with measure... State estimation plays a vital role in the stable operation of modern power systems,but it is vulnerable to cyber attacks.False data injection attacks(FDIA),one of the most common cyber attacks,can tamper with measure-ment data and bypass the bad data detection(BDD)mechanism,leading to incorrect results of power system state estimation(PSSE).This paper presents a detection framework of FDIA for PSSE based on graph edge-conditioned convolutional networks(GECCN),which use topology information,node features and edge features.Through deep graph architecture,the correlation of sample data is effectively mined to establish the mapping relationship between the estimated values of measurements and the actual states of power systems.In addition,the edge-conditioned convolution operation allows processing data sets with different graph structures.Case studies are undertaken on the IEEE 14-bus system under different attack intensities and degrees to evaluate the performance of GECCN.Simulation results show that GECCN has better detection performance than convolutional neural networks,deep neural net-works and support vector machine.Moreover,the satisfactory detection performance obtained with the data sets of the IEEE 14-bus,30-bus and 118-bus systems verifies the effective scalability of GECCN. 展开更多
关键词 Power system state estimation(PSSE) Bad data detection(BDD) False data injection attacks(FDIA) Graph edge-conditioned convolutional networks(GECCN)
原文传递
Temporal-spatial dynamic characteristics of vehicle emissions on intercity roads in Guangdong Province based on vehicle identity detection data
13
作者 Hui Ding Yongming Zhao +2 位作者 Shenhua Miao Tong Chen Yonghong Liu 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2023年第8期126-138,共13页
Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics ... Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics of air pollutants(CO,HC,NO_(X),PM_(2.5))on the intercity road network of Guangdong Province by vehicle categories and road links were revealed based on vehicle identity detection data in real-life traffic for each hour in July 2018.The results showed that the spatial diversity of emissions caused by the unbalanced economywas obvious.The vehicle emissions in the Pearl River Delta region(PRD)with a higher economic level were approximately 1–2 times those in the non-Pearl RiverDelta region(non-PRD).Provincial roads with high loads became potential sources of high emissions.Therefore,emission control policies must emphasize the PRD and key roads by travel guidance to achieve greater reduction.Gasoline passenger cars with a large proportion of traffic dominated morning and evening peaks in the 24-hour period and were the dominant contributors to CO and HC emissions,contributing more than 50%in the daytime(7:00–23:00)and higher than 26%at night(0:00–6:00).Diesel trucks made up 10%of traffic,but were the dominant player at night,contributed 50%–90%to NO_(X) and PM_(2.5) emissions,with amarked 24-hour change rule of more than 80%at night(23:00–5:00)and less than 60%during daytime.Therefore,targeted control measures by time-section should be set up on collaborative control.These findings provide time-varying decision support for variable vehicle emission control on a large scale. 展开更多
关键词 Intercity roads Dynamic vehicle emissions Vehicle identity detection data Diesel trucks
原文传递
A Hybrid Method for False Data Injection Attack Detection in Smart Grid Based on Variational Mode Decomposition and OS-ELM 被引量:2
14
作者 Chunxia Dou Di Wu +2 位作者 Dong Yue Bao Jin Shiyun Xu 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第6期1697-1707,共11页
Accurate state estimation is critical to wide-area situational awareness of smart grid.However,recent research found that power system state estimators are vulnerable to a new type of cyber-attack,called false data in... Accurate state estimation is critical to wide-area situational awareness of smart grid.However,recent research found that power system state estimators are vulnerable to a new type of cyber-attack,called false data injection attack(FDIA).In order to ensure the security of power system operation and control,a hybrid FDIA detection mechanism utilizing temporal correlation is proposed.The proposed mechanism combines Variational Mode Decomposition(VMD)technology and machine learning.For the purpose of identifying the features of FDIA,VMD is used to decompose the system state time series into an ensemble of components with different frequencies.Furthermore,due to the lack of online model updating ability in a traditional extreme learning machine,an OS-extreme learning machine(OSELM)which has sequential learning ability is used as a detector for identifying FDIA.The proposed detection mechanism is evaluated on the IEEE-14 bus system using real load data from an independent system operator in New York.Apart from detection accuracy,the impact of attack intensity and environment noise on the performance of the proposed method are tested.The simulation results demonstrate the efficiency and robustness of our method. 展开更多
关键词 Cyberphysical security false data injection attack detection smart grid state estimation
原文传递
Real and Fitted Spherical Indentations 被引量:2
15
作者 Gerd Kaupp 《Advances in Materials Physics and Chemistry》 2020年第10期207-229,共23页
Spherical indentations that rely on original date are analyzed with the physically correct mathematical formula and its integration that take into account the radius over depth changes upon penetration. Linear plots, ... Spherical indentations that rely on original date are analyzed with the physically correct mathematical formula and its integration that take into account the radius over depth changes upon penetration. Linear plots, phase-transition onsets, energies, and pressures are algebraically obtained for germanium, zinc-oxide and gallium-nitride. There are low pressure phase-transitions that correspond to, or are not resolved by hydrostatic anvil onset pressures. This enables the attribution of polymorph structures, by comparing with known structures from pulsed laser deposition or molecular beam epitaxy and twinning. The spherical indentation is the easiest way for the synthesis and further characterization of polymorphs, now available in pure form under diamond calotte and in contact with their corresponding less dense polymorph. The unprecedented results and new possibilities require loading curves from experimental data. These are now easily distinguished from data that are “fitted” to make them concur with widely used unphysical Johnson’s formula for spheres (“<span style="white-space:nowrap;"><em>P</em> = (4/3)<em>h</em><sup>3/2</sup><em>R</em><sup>1/2</sup><em>E</em><sup><span style="white-space:nowrap;">&#8727;</span></sup></span>”) not taking care of the <em>R/h</em> variation. Its challenge is indispensable, because its use involves “fitting equations” for making the data concur. These faked reports (no “experimental” data) provide dangerous false moduli and theories. The fitted spherical indentation reports with radii ranging from 4 to 250 μm are identified for PDMS, GaAs, Al, Si, SiC, MgO, and Steel. The detailed analysis reveals characteristic features. 展开更多
关键词 Spherical Indentations Correct Formula Phase-Transition Onset Pressure False Johnson Formula detection of data Fittings
下载PDF
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
16
作者 Alese Boniface Kayode Alowolodu Olufunso Dayo Adekunle Adewale Uthman 《Communications and Network》 2021年第2期68-78,共11页
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ... With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews. 展开更多
关键词 Mobile Agent Distribution Model data Leakage detection data Leakage Prevention DLP SECURITY Distributed Computing
下载PDF
Study on the performance of data fusion system for sonar signal detection
17
作者 XIANG Ming WANG Zhao +1 位作者 LI Hong ZHAO Junwei (College of Marine Engineering, Northwestern Polytechnical University Xi’an 710072) GONG Xianyi (The 715th Institute of China State Shipbuilding Corporation Fu Yang 311400) 《Chinese Journal of Acoustics》 2000年第4期354-362,共9页
The mathematical model and fusion algorithm for multisensor data fusion are presented, and applied to integrate the decisions obtained by multiple sonars in a distributed detection system. Assuming that all the sonar... The mathematical model and fusion algorithm for multisensor data fusion are presented, and applied to integrate the decisions obtained by multiple sonars in a distributed detection system. Assuming that all the sonars and the fusion system operate at the same false alarm probability, the expression for the detection probability of the fusion system is obtained. Computer simulations reveals that the detection probability and detection range of the fusion system are significantly improved compared to the original distributed detection system. 展开更多
关键词 Study on the performance of data fusion system for sonar signal detection PDI data
原文传递
A STATISTICAL ANALYSIS OF SODAR DATA DETECTED IN YANSHAN MOUNTAIN AREA,BEIJING
18
作者 吕乃平 周明煜 +1 位作者 苏立荣 陈炎涓 《Acta meteorologica Sinica》 SCIE 1989年第5期645-652,共8页
According to the characteristics of sodar echo,a classified method for temperature stratification is given. By using sodar data observed in Yanshan Mountain area in Beijing,the statistical characteristics for the heig... According to the characteristics of sodar echo,a classified method for temperature stratification is given. By using sodar data observed in Yanshan Mountain area in Beijing,the statistical characteristics for the height of inversion layer,thermal plume,and the depth of mixed layer are compared.Finally,the appearance frequency for stable,unstable and neutral stratification is analyzed. 展开更多
关键词 A STATISTICAL ANALYSIS OF SODAR data DETECTED IN YANSHAN MOUNTAIN AREA BEIJING Mean
原文传递
Ship speed power performance under relative wind profiles in relation to sensor fault detection
19
作者 Lokukaluge P.Perera B.Mo 《Journal of Ocean Engineering and Science》 SCIE 2018年第4期355-366,共12页
Statistical data analysis and visualization approaches to identify ship speed power performance under relative wind(i.e.apparent wind)profiles are considered in this study.Ship performance and navigation data of a sel... Statistical data analysis and visualization approaches to identify ship speed power performance under relative wind(i.e.apparent wind)profiles are considered in this study.Ship performance and navigation data of a selected vessel are analyzed,where various data anomalies,i.e.sensor related erroneous data conditions,are identified.Those erroneous data conditions are investigated and several approaches to isolate such situations are also presented by considering appropriate data visualization methods.Then,the cleaned data are used to derive various relationships among ship performance and navigation parameters that have been visualized in this study,appropriately.The results show that the wind profiles along ship routes can be used to evaluate vessel performance and navigation conditions by assuming the respective sea states relate to their wind conditions.Hence,the results are useful to derive appropriate mathematical models that represent ship performance and navigation conditions.Such mathematical models can be used for weather routing type applications(i.e.voyage planning),where the respective weather forecast can be used to derive optimal ship routes to improve vessel performance and reduce fuel consumption.This study presents not only an overview of statistical data analysis of ship performance and navigation data but also the respective challenges in data anomalies(i.e.erroneous data intervals and sensor faults)due to onboard sensors and data handling systems.Furthermore,the respective solutions to such challenges in data quality have also been presented by considering data visualization approaches. 展开更多
关键词 Speed power performance data anomaly detection Sensor fault identification Weather routing Statistical data analysis Ship wind profile.
原文传递
Improved Flight Conflict Detection Algorithm Based on Gauss-Hermite Particle Filter 被引量:1
20
作者 MA Lan GAO Yongsheng +1 位作者 YIN Tianyi ZHAI Wenpeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第3期269-276,共8页
In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algor... In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algorithm improves the traditional flight conflict detection method in two aspects:(i) New observation data are integrated into system state transition probability, and Gauss-Hermite Filter(GHF) is used for generating the importance density function.(ii) GHPF is used for flight trajectory prediction and flight conflict probability calculation. The experimental results show that the accuracy of conflict detection and tracing with GHPF is better than that with standard particle filter. The detected conflict probability is more precise with GHPF, and GHPF is suitable for early free flight conflict detection. 展开更多
关键词 free flight conflict detection Gauss-Hermite particle filter importance probability density function observation data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部