期刊文献+
共找到622篇文章
< 1 2 32 >
每页显示 20 50 100
Image Processing on Geological Data in Vector Format and Multi-Source Spatial Data Fusion
1
作者 Liu Xing Hu Guangdao Qiu Yubao Faculty of Earth Resources, China University of Geosciences, Wuhan 430074 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期278-282,共5页
The geological data are constructed in vector format in geographical information system (GIS) while other data such as remote sensing images, geographical data and geochemical data are saved in raster ones. This paper... The geological data are constructed in vector format in geographical information system (GIS) while other data such as remote sensing images, geographical data and geochemical data are saved in raster ones. This paper converts the vector data into 8 bit images according to their importance to mineralization each by programming. We can communicate the geological meaning with the raster images by this method. The paper also fuses geographical data and geochemical data with the programmed strata data. The result shows that image fusion can express different intensities effectively and visualize the structure characters in 2 dimensions. Furthermore, it also can produce optimized information from multi-source data and express them more directly. 展开更多
关键词 geological data GIS-based vector data conversion image processing multi-source data fusion
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
2
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 geo-spatial graphics data copyright protection digital watermarking stego carrier data encrypting
下载PDF
Data fusion for fault diagnosis using multi-class Support Vector Machines 被引量:1
3
作者 胡中辉 蔡云泽 +1 位作者 李远贵 许晓鸣 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第10期1030-1039,共10页
Multi-source multi-class classification methods based on multi-class Support Vector Machines and data fusion strategies are proposed in this paper. The centralized and distributed fusion schemes are applied to combine... Multi-source multi-class classification methods based on multi-class Support Vector Machines and data fusion strategies are proposed in this paper. The centralized and distributed fusion schemes are applied to combine information from several data sources. In the centralized scheme, all information from several data sources is centralized to construct an input space. Then a multi-class Support Vector Machine classifier is trained. In the distributed schemes, the individual data sources are proc-essed separately and modelled by using the multi-class Support Vector Machine. Then new data fusion strategies are proposed to combine the information from the individual multi-class Support Vector Machine models. Our proposed fusion strategies take into account that an Support Vector Machine (SVM) classifier achieves classification by finding the optimal classification hyperplane with maximal margin. The proposed methods are applied for fault diagnosis of a diesel engine. The experimental results showed that almost all the proposed approaches can largely improve the diagnostic accuracy. The robustness of diagnosis is also improved because of the implementation of data fusion strategies. The proposed methods can also be applied in other fields. 展开更多
关键词 data fusion Fault diagnosis Multi-class classification Multi-class Support vector Machines Diesel engine
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
4
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
4D DATA FUSION TECHNIQUE IN URBAN WATERLOG-DRAINING DECISION SUPPORT SYSTEM 被引量:3
5
作者 Li Jun Bian Fuling 《Geo-Spatial Information Science》 2000年第3期42-46,共5页
This paper studies urban waterlog_draining decision support system based on the 4D data fusion technique.4D data includes DEM,DOQ,DLG and DRG.It supplies entire databases for waterlog forecast and analysis together wi... This paper studies urban waterlog_draining decision support system based on the 4D data fusion technique.4D data includes DEM,DOQ,DLG and DRG.It supplies entire databases for waterlog forecast and analysis together with non_spatial fundamental database.Data composition and reasoning are two key steps of 4D data fusion.Finally,this paper gives a real case: Ezhou Waterlog_Draining Decision Support System (EWDSS) with two application models,i.e.,DEM application model,water generating and draining model. 展开更多
关键词 4D data fusion RASTER vector
下载PDF
Data Fusion with Optimized Block Kernels in LS-SVM for Protein Classification
6
作者 Li Liao 《Engineering(科研)》 2013年第10期223-236,共14页
In this work, we developed a method to efficiently optimize the kernel function for combined data of various different sources with their corresponding kernels being already available. The vectorization of the combine... In this work, we developed a method to efficiently optimize the kernel function for combined data of various different sources with their corresponding kernels being already available. The vectorization of the combined data is achieved by a weighted concatenation of the existing data vectors. This induces a kernel matrix composed of the existing kernels as blocks along the main diagonal, weighted according to the corresponding the subspaces span by the data. The induced block kernel matrix is optimized in the platform of least-squares support vector machines simultaneously as the LS-SVM is being trained, by solving an extended set of linear equations, other than a quadratically constrained quadratic programming as in a previous method. The method is tested on a benchmark dataset, and the performance is significantly improved from the highest ROC score 0.84 using individual data source to ROC score 0.92 with data fusion. 展开更多
关键词 data fusion KERNEL Method Support vector MACHINES Protein Classification
下载PDF
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
7
作者 Jiangui Zhang Huibin Qi 《Journal of Computer and Communications》 2020年第12期123-133,共11页
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr... <div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div> 展开更多
关键词 digital watermarking data Mining Discrete Radon Transform Tight Frame Copyright Protection Information Hiding Finite-Set
下载PDF
Assessment of distortion in watermarked geospatial vector data using different wavelets
8
作者 Sangita ZOPE-CHAUDHARI Parvatham VENKATACHALAM Krishna Mohan BUDDHIRAJU 《Geo-Spatial Information Science》 SCIE CSCD 2015年第2期124-133,共10页
With the rapid growth of the Internet,the copyright protection problem occurs frequently,and unauthorized copying and distributing of geospatial data threaten the investments of data producers.Digital watermarking is ... With the rapid growth of the Internet,the copyright protection problem occurs frequently,and unauthorized copying and distributing of geospatial data threaten the investments of data producers.Digital watermarking is a possible solution to solve this issue.However,watermarking causes modifications in the original data resulting in distortion and affects accuracy,which is very important to geospatial vector data.This article provides distortion assessment of watermarked geospatial data using wavelet-based invisible watermarking.Eight wavelets at different wavelet decomposition levels are used for accuracy evaluation with the help of error measures such as maximum error and mean square error.Normalized correlation is used as a similarity index between original and extracted watermark.It is observed that the increase in the strength of embedding increases visual degradation.Haar wavelet outperforms the other wavelets,and the third wavelet decomposition level is proved to be optimal level for watermarking. 展开更多
关键词 digital watermarking geospatial vector data WAVELETS discrete wavelet transform(DWT) DISTORTION
原文传递
High-resolution azimuth estimation algorithm based on data fusion method for the vector hydrophone vertical array 被引量:3
9
作者 CHEN Yu MENG Zhou +1 位作者 MA Shuqing BAO Changchun 《Chinese Journal of Acoustics》 CSCD 2015年第3期312-324,共13页
To aim at the problem that the horizontal directivity index of the vector hy- drophone vertical array is not higher than that of a vector hydrophone, the high-resolution azimuth estimation algorithm based on the data ... To aim at the problem that the horizontal directivity index of the vector hy- drophone vertical array is not higher than that of a vector hydrophone, the high-resolution azimuth estimation algorithm based on the data fusion method was presented. The proposed algorithnl first employs MUSIC algorithm to estimate the azimuth of each divided sub-band signal, and then the estimated azimuths of multiple hydrophones are processed by using the data fusion technique. The high-resolution estimated result is achieved finally by adopting the weighted histogram statistics method. The results of the simulation and sea trials indicated that the proposed algorithm has better azimuth estimation performance than MUSIC algorithm of a single vector hydrophone and the data fusion technique based on the acoustic energy flux method. The better performance is reflected in the aspects of the estimation precision, the probability of correct estimation, the capability to distinguish multi-objects and the inhibition of the noise sub-bands. 展开更多
关键词 MUSIC High-resolution azimuth estimation algorithm based on data fusion method for the vector hydrophone vertical array data
原文传递
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking Technology
10
作者 WANG Chundong BAI Yi MO Xiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期505-511,共7页
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss. 展开更多
关键词 the Internet of Things(IoT) data security com pressed sensing(CS) digital watermarking information privacy
原文传递
Hierarchical Visualized Multi-level Information Fusion for Big Data of Digital Image
11
作者 LI Lan LIN Guoliang +1 位作者 ZHANG Yun DU Jia 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期238-244,共7页
At present,the process of digital image information fusion has the problems of low data cleaning unaccuracy and more repeated data omission,resulting in the unideal information fusion.In this regard,a visualized multi... At present,the process of digital image information fusion has the problems of low data cleaning unaccuracy and more repeated data omission,resulting in the unideal information fusion.In this regard,a visualized multicomponent information fusion method for big data based on radar map is proposed in this paper.The data model of perceptual digital image is constructed by using the linear regression analysis method.The ID tag of the collected image data as Transactin Identification(TID)is compared.If the TID of two data is the same,the repeated data detection is carried out.After the test,the data set is processed many times in accordance with the method process to improve the precision of data cleaning and reduce the omission.Based on the radar images,hierarchical visualization of processed multi-level information fusion is realized.The experiments show that the method can clean the redundant data accurately and achieve the efficient fusion of multi-level information of big data in the digital image. 展开更多
关键词 digital image big data multi-level information fusion
下载PDF
Multi-sensor Data Fusion for Wheelchair Position Estimation with Unscented Kalman Filter 被引量:5
12
作者 Derradji Nada Mounir Bousbia-Salah Maamar Bettayeb 《International Journal of Automation and computing》 EI CSCD 2018年第2期207-217,共11页
This paper investigates the problem of estimation of the wheelchair position in indoor environments with noisy mea- surements. The measuring system is based on two odometers placed on the axis of the wheels combined w... This paper investigates the problem of estimation of the wheelchair position in indoor environments with noisy mea- surements. The measuring system is based on two odometers placed on the axis of the wheels combined with a magnetic compass to determine the position and orientation. Determination of displacements is implemented by an accelerometer. Data coming from sensors are combined and used as inputs to unscented Kalman filter (UKF). Two data fusion architectures: measurement fusion (MF) and state vector fusion (SVF) are proposed to merge the available measurements. Comparative studies of these two architectures show that the MF architecture provides states estimation with relatively less uncertainty compared to SVF. However, odometers measurements determine the position with relatively high uncertainty followed by the accelerometer measurements. Therefore, fusion in the navigation system is needed. The obtained simulation results show the effectiveness of proposed architectures. 展开更多
关键词 data fusion unscented Kalman filter (UKF) measurement fusion (MF) NAVIGATION state vector fusion (SVF) wheelchair.
原文传递
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing 被引量:2
13
作者 Zhen Yang Yongfeng Huang +1 位作者 Xing Li Wenyu Wang 《Computers, Materials & Continua》 SCIE EI 2018年第7期1-17,共17页
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance. 展开更多
关键词 data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing
下载PDF
基于语义的Data Cube数字水印技术
14
作者 杨科华 杨宇华 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第2期70-73,共4页
数字水印技术可以有效地保护版权,数据仓库中用于OLAP(OnLine Analyti-cal Processing,联机分析处理)的Data Cube(数据立方体,亦称多维数据集)不仅包含有价值的数据,而且其设计模式与分析模式也体现了Data Cube拥有者的知识产权.将数字... 数字水印技术可以有效地保护版权,数据仓库中用于OLAP(OnLine Analyti-cal Processing,联机分析处理)的Data Cube(数据立方体,亦称多维数据集)不仅包含有价值的数据,而且其设计模式与分析模式也体现了Data Cube拥有者的知识产权.将数字水印技术引入Data Cube中,并充分利用Data Cube的语义信息,从而提供一个通用、实用的Da-ta Cube数字水印技术解决方案. 展开更多
关键词 数字水印 语义 数据立方体 版权
下载PDF
一种基于Data Matrix的数字水印算法 被引量:6
15
作者 郑秋梅 金萧 +1 位作者 顾国民 王风华 《中国石油大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第1期188-193,共6页
提出一种基于数字水印的图像隐秘通信方法。该算法首先运用Data Matrix条形码技术对具有含义的通信信息进行编码,生成条形码图像。生成的条形码图像作为原始水印信息,在经过适当的变换和置乱之后将其嵌入到载体图像中。结果表明,该方法... 提出一种基于数字水印的图像隐秘通信方法。该算法首先运用Data Matrix条形码技术对具有含义的通信信息进行编码,生成条形码图像。生成的条形码图像作为原始水印信息,在经过适当的变换和置乱之后将其嵌入到载体图像中。结果表明,该方法具有良好的不可见性和鲁棒性,能抵抗旋转、缩放、滤波等攻击,更为重要的是较好地保证了通信信息的正确性。 展开更多
关键词 数字水印 隐秘通信 data MATRIX
下载PDF
基于Personel Geodatabase的数字线划图水印技术研究
16
作者 平宗玮 宋拥军 +3 位作者 牛宵 张博 崔红霞 肖佳 《山东国土资源》 2013年第10期87-89,93,共4页
数字水印技术是基础地理信息产品版权保护的重要手段。该文将提出一种在Personal Geodatabase的数字线划图数据中添加水印的方法,将置乱后的水印信息添加到数据的最小外接矩形信息中,保证数据精度不受水印的影响,通过水印信息的提取技... 数字水印技术是基础地理信息产品版权保护的重要手段。该文将提出一种在Personal Geodatabase的数字线划图数据中添加水印的方法,将置乱后的水印信息添加到数据的最小外接矩形信息中,保证数据精度不受水印的影响,通过水印信息的提取技术可有效实现数据的可追溯。实验表明,该算法具有良好的鲁棒性和实用性。 展开更多
关键词 数字水印 基础地理信息 数字线划图 无损数据隐藏 版权保护
下载PDF
支撑新型配电网数字化规划的图形⁃模型⁃数据融合关键技术 被引量:3
17
作者 余涛 王梓耀 +3 位作者 孙立明 曹华珍 吴亚雄 吴毓峰 《电力系统自动化》 EI CSCD 北大核心 2024年第6期139-153,共15页
配电网规划领域期盼实现智能规划,其愿景在于实现无人或少人干预的全自动规划。在数字化转型的背景下,新型配电网规划将面临图形多样化、场景碎片化、数据规模化三大挑战。文中从图形-模型-数据融合的角度提出三大关键技术:基于电气图... 配电网规划领域期盼实现智能规划,其愿景在于实现无人或少人干预的全自动规划。在数字化转型的背景下,新型配电网规划将面临图形多样化、场景碎片化、数据规模化三大挑战。文中从图形-模型-数据融合的角度提出三大关键技术:基于电气图纸识别和拓扑智能分析的图形-模型融合技术、基于知识驱动的负荷/新能源推演分析和智能决策的模型-数据融合技术、基于多模态数据融合和多时空数据联动的图形-数据融合技术,尝试打破理论研究与数字化工程的壁垒。最后,对未来新型配电网数字化规划的发展进行思考和展望,为实现“以机为主,人机协同”的大闭环模式提供借鉴。 展开更多
关键词 图形-模型-数据融合 配电网 数字化规划 知识驱动 图计算
下载PDF
数字产业化与产业数字化协同发展中的数据价值实现 被引量:1
18
作者 马费成 王文慧 +1 位作者 孙玉姣 熊思玥 《信息资源管理学报》 2024年第4期4-15,共12页
数字产业化和产业数字化的协同发展是推动经济转型升级的关键。本研究基于数据价值链,解释了数据资源、数据资产、数据商品和数据资本四种数据价值形态,针对产业数据和政府数据两种类型数据,揭示了数字产业化和产业数字化的关联性,同时... 数字产业化和产业数字化的协同发展是推动经济转型升级的关键。本研究基于数据价值链,解释了数据资源、数据资产、数据商品和数据资本四种数据价值形态,针对产业数据和政府数据两种类型数据,揭示了数字产业化和产业数字化的关联性,同时分析了数字产业化和产业数字化协同发展中数据要素价值演变过程和价值实现环节。研究认为,数字经济“两化”协同发展过程蕴含了数据资产向数据商品的跳跃和数据商品向数据资本的演进两个价值实现过程;为推动数字经济“两化”协同发展,需要结合数据要素价值转化对数字产业、传统产业进行重塑升级。通过深入分析数字产业化与产业数字化的协同发展,研究深化了对数据要素价值实现的认识,提升了对数字经济发展规律的理解。 展开更多
关键词 数字产业化 产业数字化 协同发展 数据价值 数据价值链 数据融合
下载PDF
融合内外部特征水印的模型保护方案
19
作者 彭维平 刘家宝 +2 位作者 平源 马迪 宋成 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2024年第4期765-774,共10页
针对经典模型水印技术在保护模型所有权过程中存在鲁棒性差、提取率低等问题,融合白、黑盒水印优势,提出了一种特征嵌入的模型保护方案。按照香农熵大小进行数据集样本划分的策略,将数据集样本划分为良性样本、风格迁移样本、关键密钥样... 针对经典模型水印技术在保护模型所有权过程中存在鲁棒性差、提取率低等问题,融合白、黑盒水印优势,提出了一种特征嵌入的模型保护方案。按照香农熵大小进行数据集样本划分的策略,将数据集样本划分为良性样本、风格迁移样本、关键密钥样本;利用风格迁移样本集对模型嵌入外部特征,将关键密钥样本标签嵌入模型内部特征;通过训练二元分类器并利用掩码梯度下降方法修改极少量参数让模型产生特定输出来综合判断模型是否被窃取。实验结果表明,所提方案用较小开销保证了水印的高保真度,在标签查询、知识蒸馏等攻击下仍具有较高稳定性,且能规避恶意检测风险。 展开更多
关键词 模型保护 融合水印 数据划分 特征嵌入
下载PDF
数字孪生在制造业中实现的关键技术及典型应用综述
20
作者 陈燕 王禹封 +4 位作者 谯木 赵正彩 苏宏华 朱夏林 冯天民 《航空制造技术》 CSCD 北大核心 2024年第11期24-45,共22页
数字孪生技术是实现智能制造和工业数字化转型的关键技术,受到学术界和产业界的广泛关注和研究。近十年来,随着数据采集技术、计算机性能和相关智能算法的迅速发展,数字孪生技术的研究及应用取得了巨大进展。针对数字孪生技术应用领域... 数字孪生技术是实现智能制造和工业数字化转型的关键技术,受到学术界和产业界的广泛关注和研究。近十年来,随着数据采集技术、计算机性能和相关智能算法的迅速发展,数字孪生技术的研究及应用取得了巨大进展。针对数字孪生技术应用领域的多样性和对象层级的复杂性,本文回顾了数字孪生基本概念和模型的发展历程,综述了数字孪生技术在制造业应用的关键技术及其发展成果。在此基础上,阐述了数字孪生技术在制造业三个层级的应用现状以及数字孪生赋能智能制造的新范式。最后,展望了制造业数字孪生技术未来发展趋势,为后续研究提供参考。 展开更多
关键词 智能制造 数字孪生 数字化建模 智能终端 数据融合
下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部