期刊文献+
共找到11,732篇文章
< 1 2 250 >
每页显示 20 50 100
Assessment of Meteorological Threats to the Coordinated Search and Rescue of Unmanned/Manned Aircraft
1
作者 Fei YAN Chuan LI +2 位作者 Xiaoyi FU Kefeng WU Yuying LI 《Meteorological and Environmental Research》 2024年第1期27-29,37,共4页
The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate... The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance. 展开更多
关键词 Unmanned/manned aircraft Coordinated search and rescue Assessment of meteorological threats Meteorological data
下载PDF
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
2
作者 Sina Ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud Security threat Analysis Mitigation Strategies Emerging Trends Ethi-cal Considerations data Analysis
下载PDF
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
3
作者 Shuqin Zhang Xinyu Su +2 位作者 Peiyu Shi Tianhui Du Yunfei Han 《Computers, Materials & Continua》 SCIE EI 2023年第10期349-377,共29页
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u... Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment. 展开更多
关键词 multi-source data fusion threat modeling threat propagation path knowledge graph intelligent defense decision-making
下载PDF
基于自主研发ACU&MOX-DATA平台探索腧穴功效特点研究
4
作者 李思慧 刘书庆 +8 位作者 唐强 张瑞斌 陈伟 洪浩 朱冰梅 蓝勋 王勇 余曙光 吴巧凤 《中国中医药信息杂志》 CAS CSCD 2024年第2期64-69,共6页
目的基于ACU&MOX-DATA平台,初步明确不同腧穴、不同靶器官及不同刺灸法对腧穴功效的影响,并可视化展示相关结果是否存在腧穴功效“特性”“共性”的特点。方法以原创组学数据和公共组学数据整合后获得的多源异构数据作为数据源,经... 目的基于ACU&MOX-DATA平台,初步明确不同腧穴、不同靶器官及不同刺灸法对腧穴功效的影响,并可视化展示相关结果是否存在腧穴功效“特性”“共性”的特点。方法以原创组学数据和公共组学数据整合后获得的多源异构数据作为数据源,经标准化处理后,利用ACU&MOX-DATA平台中Batch Search、Stimulation Mode等模块对不同腧穴、不同靶器官、不同刺灸法的数据进行差异基因分析、疾病病理网络分析和富集分析。结果在同一疾病状态、同一干预措施下,不同腧穴间存在效应差异;在同一疾病状态、同一腧穴及干预措施下,不同靶器官产生的应答不完全一致;在同一疾病状态、同一腧穴下,不同干预措施间存在效应差异。结论基于ACU&MOX-DATA平台,初步明确腧穴、靶器官、刺灸法是影响腧穴功效的关键因素,上述结果间存在腧穴功效的特异性或共性调节特点。将ACU&MOX-DATA平台应用于针灸学领域关键科学问题的分析和可视化解读,可为深化腧穴认知、指导临床选穴、提高针灸临床疗效等提供参考。 展开更多
关键词 腧穴功效 针灸干预方式 靶器官响应 多组学数据 异源数据分析
下载PDF
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data
5
作者 Sagarkumar Patel Rachna Patel +1 位作者 Ashok Akbari Srinivasa Reddy Mukkala 《Journal of Information Security》 2023年第4期343-365,共23页
The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently... The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently only possible through multi-institutional cooperation. Building large central repositories is one strategy for multi-institution studies. However, this is hampered by issues regarding data sharing, including patient privacy, data de-identification, regulation, intellectual property, and data storage. These difficulties have lessened the impracticality of central data storage. In this survey, we will look at 24 research publications that concentrate on machine learning approaches linked to privacy preservation techniques for multi-institutional data, highlighting the multiple shortcomings of the existing methodologies. Researching different approaches will be made simpler in this case based on a number of factors, such as performance measures, year of publication and journals, achievements of the strategies in numerical assessments, and other factors. A technique analysis that considers the benefits and drawbacks of the strategies is additionally provided. The article also looks at some potential areas for future research as well as the challenges associated with increasing the accuracy of privacy protection techniques. The comparative evaluation of the approaches offers a thorough justification for the research’s purpose. 展开更多
关键词 Privacy Preservation Models multi Institutional data Bio Technologies Clinical Trial and Pharmaceutical Industry
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
6
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission Wireless Sensor Networks(WSNs) elliptic curve cryptography
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time threat Analysis Cyber threats Cyberattacks threat Intelligence Machine Learning Artificial Intelligence threat Detection threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation threat Landscape Cyber-Physical Systems Critical Infrastructure data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME threat Actors threat Modeling Security Architecture
下载PDF
Method of Multi-Mode Sensor Data Fusion with an Adaptive Deep Coupling Convolutional Auto-Encoder
8
作者 Xiaoxiong Feng Jianhua Liu 《Journal of Sensor Technology》 2023年第4期69-85,共17页
To address the difficulties in fusing multi-mode sensor data for complex industrial machinery, an adaptive deep coupling convolutional auto-encoder (ADCCAE) fusion method was proposed. First, the multi-mode features e... To address the difficulties in fusing multi-mode sensor data for complex industrial machinery, an adaptive deep coupling convolutional auto-encoder (ADCCAE) fusion method was proposed. First, the multi-mode features extracted synchronously by the CCAE were stacked and fed to the multi-channel convolution layers for fusion. Then, the fused data was passed to all connection layers for compression and fed to the Softmax module for classification. Finally, the coupling loss function coefficients and the network parameters were optimized through an adaptive approach using the gray wolf optimization (GWO) algorithm. Experimental comparisons showed that the proposed ADCCAE fusion model was superior to existing models for multi-mode data fusion. 展开更多
关键词 multi-Mode data Fusion Coupling Convolutional Auto-Encoder Adaptive Optimization Deep Learning
下载PDF
A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats 被引量:3
9
作者 Yussuf Ahmed A.Taufiq Asyhari Md Arafatur Rahman 《Computers, Materials & Continua》 SCIE EI 2021年第5期2497-2513,共17页
The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex... The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks.This is primarily due to the sophistication of the attacks and the availability of powerful tools.Interconnected devices such as the Internet of Things(IoT)are also increasing attack exposures due to the increase in vulnerabilities.Over the last few years,we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks.Edge technology brings processing power closer to the network and brings many advantages,including reduced latency,while it can also introduce vulnerabilities that could be exploited.Smart cities are also dependent on technologies where everything is interconnected.This interconnectivity makes them highly vulnerable to cyber-attacks,especially by the Advanced Persistent Threat(APT),as these vulnerabilities are amplified by the need to integrate new technologies with legacy systems.Cybercriminals behind APT attacks have recently been targeting the IoT ecosystems,prevalent in many of these cities.In this paper,we used a publicly available dataset on Advanced Persistent Threats(APT)and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.APTs are highly sophisticated and targeted forms of attacks that can evade intrusion detection systems,resulting in one of the greatest current challenges facing security professionals.In this experiment,we used multiple machine learning classifiers,such as Naïve Bayes,Bayes Net,KNN,Random Forest and Support Vector Machine(SVM).We used Weka performance metrics to show the numeric results.The best performance result of 91.1%was obtained with the Naïve Bayes classifier.We hope our proposed solution will help security professionals to deal with APTs in a timely and effective manner. 展开更多
关键词 Advanced persistent threat APT Cyber Kill Chain data breach intrusion detection cyber-attack attack prediction data-driven security and machine learning
下载PDF
A multi-source data fusion modeling method for debris flow prevention engineering 被引量:1
10
作者 XU Qing-yang YE Jian LYU Yi-jie 《Journal of Mountain Science》 SCIE CSCD 2021年第4期1049-1061,共13页
The Digital Elevation Model(DEM)data of debris flow prevention engineering are the boundary of a debris flow prevention simulation,which provides accurate and reliable DEM data and is a key consideration in debris flo... The Digital Elevation Model(DEM)data of debris flow prevention engineering are the boundary of a debris flow prevention simulation,which provides accurate and reliable DEM data and is a key consideration in debris flow prevention simulations.Thus,this paper proposes a multi-source data fusion method.First,we constructed 3D models of debris flow prevention using virtual reality technology according to the relevant specifications.The 3D spatial data generated by 3D modeling were converted into DEM data for debris flow prevention engineering.Then,the accuracy and applicability of the DEM data were verified by the error analysis testing and fusion testing of the debris flow prevention simulation.Finally,we propose the Levels of Detail algorithm based on the quadtree structure to realize the visualization of a large-scale disaster prevention scene.The test results reveal that the data fusion method controlled the error rate of the DEM data of the debris flow prevention engineering within an allowable range and generated 3D volume data(obj format)to compensate for the deficiency of the DEM data whereby the 3D internal entity space is not expressed.Additionally,the levels of detailed method can dispatch the data of a large-scale debris flow hazard scene in real time to ensure a realistic 3D visualization.In summary,the proposed methods can be applied to the planning of debris flow prevention engineering and to the simulation of the debris flow prevention process. 展开更多
关键词 Debris flow prevention Level of detail Debris flow simulation multi platform fusion multi source data fusion
下载PDF
Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets 被引量:45
11
作者 Yongjie XU YongchunWang Xudong Miu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期891-897,共7页
The function of the air target threat evaluation (TE) is the foundation for weapons allocation and senor resources management within the surface air defense. The multi-attribute evaluation methodology is utilized to... The function of the air target threat evaluation (TE) is the foundation for weapons allocation and senor resources management within the surface air defense. The multi-attribute evaluation methodology is utilized to address the issue of the TE in which the tactic features of the detected target are treated as evaluation attributes. Meanwhile, the intuitionistic fuzzy set (IFS) is employed to deal with information uncertainty in the TE process. Furthermore, on the basis of the entropy weight and inclusion-comparison probability, a hybrid TE method is developed. In order to accommodate the demands of naturalistic decision making, the proposed method allows air defense commanders to express their intuitive opinions besides incorporating into the threat features of the detected target. An illustrative example is provided to indicate the feasibility and advantage of the proposed method. 展开更多
关键词 threat evaluation (TE) intuitionistic fuzzy set (IFS) multi-attribute evaluation intuitive opinions entropy weight inclusion-comparison probability (ICP).
下载PDF
Training of Multi-layered Neural Network for Data Enlargement Processing Using an Activity Function 被引量:1
12
作者 Betere Job Isaac Hiroshi Kinjo +1 位作者 Kunihiko Nakazono Naoki Oshiro 《Journal of Electrical Engineering》 2019年第1期1-7,共7页
In this paper, we present a study on activity functions for an MLNN (multi-layered neural network) and propose a suitable activity function for data enlargement processing. We have carefully studied the training perfo... In this paper, we present a study on activity functions for an MLNN (multi-layered neural network) and propose a suitable activity function for data enlargement processing. We have carefully studied the training performance of Sigmoid, ReLu, Leaky-ReLu and L & exp. activity functions for few inputs to multiple output training patterns. Our MLNNs model has L hidden layers with two or three inputs to four or six outputs data variations by BP (backpropagation) NN (neural network) training. We focused on the multi teacher training signals to investigate and evaluate the training performance in MLNNs to select the best and good activity function for data enlargement and hence could be applicable for image and signal processing (synaptic divergence) along with the proposed methods with convolution networks. We specifically used four activity functions from which we found out that L & exp. activity function can suite DENN (data enlargement neural network) training since it could give the highest percentage training abilities compared to the other activity functions of Sigmoid, ReLu and Leaky-ReLu during simulation and training of data in the network. And finally, we recommend L & exp. function to be good for MLNNs and may be applicable for signal processing of data and information enlargement because of its performance training characteristics with multiple teacher training patterns using original generated data and hence can be tried with CNN (convolution neural networks) of image processing. 展开更多
关键词 data ENLARGEMENT PROCESSING MLNN ACTIVITY FUNCTION multi teacher TRAINING signals BP NN CNN
下载PDF
Modified joint probabilistic data association with classification-aided for multitarget tracking 被引量:9
13
作者 Ba Hongxin Cao Lei +1 位作者 He Xinyi Cheng Qun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期434-439,共6页
Joint probabilistic data association is an effective method for tracking multiple targets in clutter, but only the target kinematic information is used in measure-to-track association. If the kinematic likelihoods are... Joint probabilistic data association is an effective method for tracking multiple targets in clutter, but only the target kinematic information is used in measure-to-track association. If the kinematic likelihoods are similar for different closely spaced targets, there is ambiguity in using the kinematic information alone; the correct association probability will decrease in conventional joint probabilistic data association algorithm and track coalescence will occur easily. A modified algorithm of joint probabilistic data association with classification-aided is presented, which avoids track coalescence when tracking multiple neighboring targets. Firstly, an identification matrix is defined, which is used to simplify validation matrix to decrease computational complexity. Then, target class information is integrated into the data association process. Performance comparisons with and without the use of class information in JPDA are presented on multiple closely spaced maneuvering targets tracking problem. Simulation results quantify the benefits of classification-aided JPDA for improved multiple targets tracking, especially in the presence of association uncertainty in the kinematic measurement and target maneuvering. Simulation results indicate that the algorithm is valid. 展开更多
关键词 multi-target tracking data association joint probabilistic data association classification information track coalescence maneuvering target.
下载PDF
FGAs-Based Data Association Algorithm for Multi-sensor Multi-target Tracking 被引量:4
14
作者 朱力立 张焕春 经亚枝 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2003年第3期177-181,共5页
A novel data association algorithm is developed based on fuzzy geneticalgorithms (FGAs). The static part of data association uses one FGA to determine both the lists ofcomposite measurements and the solutions of m-bes... A novel data association algorithm is developed based on fuzzy geneticalgorithms (FGAs). The static part of data association uses one FGA to determine both the lists ofcomposite measurements and the solutions of m-best S-D assignment. In the dynamic part of dataassociation, the results of the m-best S-D assignment are then used in turn, with a Kalman filterstate estimator, in a multi-population FGA-based dynamic 2D assignment algorithm to estimate thestates of the moving targets over time. Such an assignment-based data association algorithm isdemonstrated on a simulated passive sensor track formation and maintenance problem. The simulationresults show its feasibility in multi-sensor multi-target tracking. Moreover, algorithm developmentand real-time problems are briefly discussed. 展开更多
关键词 multi-target tracking data association FGA assignment problem kalmanfilter
下载PDF
Weighted Multi-sensor Data Level Fusion Method of Vibration Signal Based on Correlation Function 被引量:7
15
作者 BIN Guangfu JIANG Zhinong +1 位作者 LI Xuejun DHILLON B S 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2011年第5期899-904,共6页
As the differences of sensor's precision and some random factors are difficult to control,the actual measurement signals are far from the target signals that affect the reliability and precision of rotating machinery... As the differences of sensor's precision and some random factors are difficult to control,the actual measurement signals are far from the target signals that affect the reliability and precision of rotating machinery fault diagnosis.The traditional signal processing methods,such as classical inference and weighted averaging algorithm usually lack dynamic adaptability that is easy for trends to cause the faults to be misjudged or left out.To enhance the measuring veracity and precision of vibration signal in rotary machine multi-sensor vibration signal fault diagnosis,a novel data level fusion approach is presented on the basis of correlation function analysis to fast determine the weighted value of multi-sensor vibration signals.The approach doesn't require knowing the prior information about sensors,and the weighted value of sensors can be confirmed depending on the correlation measure of real-time data tested in the data level fusion process.It gives greater weighted value to the greater correlation measure of sensor signals,and vice versa.The approach can effectively suppress large errors and even can still fuse data in the case of sensor failures because it takes full advantage of sensor's own-information to determine the weighted value.Moreover,it has good performance of anti-jamming due to the correlation measures between noise and effective signals are usually small.Through the simulation of typical signal collected from multi-sensors,the comparative analysis of dynamic adaptability and fault tolerance between the proposed approach and traditional weighted averaging approach is taken.Finally,the rotor dynamics and integrated fault simulator is taken as an example to verify the feasibility and advantages of the proposed approach,it is shown that the multi-sensor data level fusion based on correlation function weighted approach is better than the traditional weighted average approach with respect to fusion precision and dynamic adaptability.Meantime,the approach is adaptable and easy to use,can be applied to other areas of vibration measurement. 展开更多
关键词 vibration signal multi-SENSOR data level fusion correlation function weighted value
下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
16
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
下载PDF
STUDY ON THE COAL-ROCK INTERFACE RECOGNITION METHOD BASED ON MULTI-SENSOR DATA FUSION TECHNIQUE 被引量:7
17
作者 Ren FangYang ZhaojianXiong ShiboResearch Institute of Mechano-Electronic Engineering,Taiyuan University of Technology,Taiyuan 030024, China 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2003年第3期321-324,共4页
The coal-rock interface recognition method based on multi-sensor data fusiontechnique is put forward because of the localization of single type sensor recognition method. Themeasuring theory based on multi-sensor data... The coal-rock interface recognition method based on multi-sensor data fusiontechnique is put forward because of the localization of single type sensor recognition method. Themeasuring theory based on multi-sensor data fusion technique is analyzed, and hereby the testplatform of recognition system is manufactured. The advantage of data fusion with the fuzzy neuralnetwork (FNN) technique has been probed. The two-level FNN is constructed and data fusion is carriedout. The experiments show that in various conditions the method can always acquire a much higherrecognition rate than normal ones. 展开更多
关键词 Coal-rock interface recognition (CIR) data fusion (DF) multi-SENSOR
下载PDF
Signal classification method based on data mining formulti-mode radar 被引量:9
18
作者 qiang guo pulong nan jian wan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第5期1010-1017,共8页
For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to p... For the multi-mode radar working in the modern electronicbattlefield, different working states of one single radar areprone to being classified as multiple emitters when adoptingtraditional classification methods to process intercepted signals,which has a negative effect on signal classification. A classificationmethod based on spatial data mining is presented to address theabove challenge. Inspired by the idea of spatial data mining, theclassification method applies nuclear field to depicting the distributioninformation of pulse samples in feature space, and digs out thehidden cluster information by analyzing distribution characteristics.In addition, a membership-degree criterion to quantify the correlationamong all classes is established, which ensures classificationaccuracy of signal samples. Numerical experiments show that thepresented method can effectively prevent different working statesof multi-mode emitter from being classified as several emitters,and achieve higher classification accuracy. 展开更多
关键词 multi-mode radar signal classification data mining nuclear field cloud model membership.
下载PDF
Sampled-data Consensus of Multi-agent Systems with General Linear Dynamics Based on a Continuous-time Mo del 被引量:14
19
作者 ZHANG Xie-Yan ZHANG Jing 《自动化学报》 EI CSCD 北大核心 2014年第11期2549-2555,共7页
关键词 多Agent系统 采样数据 连续时间 线性 LYAPUNOV函数 LMI方法 采样间隔 通用
下载PDF
Cycle-by-Cycle Queue Length Estimation for Signalized Intersections Using Multi-Source Data 被引量:4
20
作者 Zhongyu Wang Qing Cai +2 位作者 Bing Wu Yinhai Wang Linbo Li 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第2期86-93,共8页
In order to estimate vehicular queue length at signalized intersections accurately and overcome the shortcomings and restrictions of existing studies especially those based on shockwave theory,a new methodology is pre... In order to estimate vehicular queue length at signalized intersections accurately and overcome the shortcomings and restrictions of existing studies especially those based on shockwave theory,a new methodology is presented for estimating vehicular queue length using data from both point detectors and probe vehicles. The methodology applies the shockwave theory to model queue evolution over time and space. Using probe vehicle locations and times as well as point detector measured traffic states,analytical formulations for calculating the maximum and minimum( residual) queue length are developed. The proposed methodology is verified using ground truth data collected from numerical experiments conducted in Shanghai,China. It is found that the methodology has a mean absolute percentage error of 17. 09%,which is reasonably effective in estimating the queue length at traffic signalized intersections. Limitations of the proposed models and algorithms are also discussed in the paper. 展开更多
关键词 QUEUE LENGTH estimation multi-SOURCE data TRAFFIC SIGNALS TRAFFIC SHOCKWAVE theory
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部