期刊文献+
共找到3,491篇文章
< 1 2 175 >
每页显示 20 50 100
Open-Source Software Defined Networking Controllers:State-of-the-Art,Challenges and Solutions for Future Network Providers
1
作者 Johari Abdul Rahim Rosdiadee Nordin Oluwatosin Ahmed Amodu 《Computers, Materials & Continua》 SCIE EI 2024年第7期747-800,共54页
Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN t... Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article. 展开更多
关键词 ONOS open source software SDN software defined networking
下载PDF
Source localization in signed networks with effective distance
2
作者 马志伟 孙蕾 +2 位作者 丁智国 黄宜真 胡兆龙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期577-585,共9页
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ... While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage. 展开更多
关键词 complex networks signed networks source localization effective distance
下载PDF
Identify information sources with different start times in complex networks based on sparse observers
3
作者 Yuan-Zhang Deng Zhao-Long Hu +3 位作者 Feilong Lin Chang-Bing Tang Hui Wang Yi-Zhen Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期467-479,共13页
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio... The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2. 展开更多
关键词 complex networks information spread source identification backward spread centricity
下载PDF
Automatic modulation recognition of radiation source signals based on two-dimensional data matrix and improved residual neural network
4
作者 Guanghua Yi Xinhong Hao +3 位作者 Xiaopeng Yan Jian Dai Yangtian Liu Yanwen Han 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期364-373,共10页
Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the ... Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the AMR method of radiation source signals based on two-dimensional data matrix and improved residual neural network is proposed in this paper.First,the time series of the radiation source signals are reconstructed into two-dimensional data matrix,which greatly simplifies the signal preprocessing process.Second,the depthwise convolution and large-size convolutional kernels based residual neural network(DLRNet)is proposed to improve the feature extraction capability of the AMR model.Finally,the model performs feature extraction and classification on the two-dimensional data matrix to obtain the recognition vector that represents the signal modulation type.Theoretical analysis and simulation results show that the AMR method based on two-dimensional data matrix and improved residual network can significantly improve the accuracy of the AMR method.The recognition accuracy of the proposed method maintains a high level greater than 90% even at -14 dB SNR. 展开更多
关键词 Automatic modulation recognition Radiation source signals Two-dimensional data matrix Residual neural network Depthwise convolution
下载PDF
Determination of Gamma point source efficiency based on a backpropagation neural network 被引量:4
5
作者 Hong-Long Zheng Xian-Guo Tuo +4 位作者 Shu-Ming Peng Rui Shi Huai-Liang Li Jing Lu Jin-Fu Li 《Nuclear Science and Techniques》 SCIE CAS CSCD 2018年第5期1-9,共9页
Efficiency is an important factor in quantitative and qualitative analysis of radionuclides, and the gamma point source efficiency is related to the radial angle,detection distance, and gamma-ray energy. In this work,... Efficiency is an important factor in quantitative and qualitative analysis of radionuclides, and the gamma point source efficiency is related to the radial angle,detection distance, and gamma-ray energy. In this work, on the basis of a back-propagation(BP) neural network model,a method to determine the gamma point source efficiency is developed and validated. The efficiency of the point sources ^(137)Cs and ^(60)Co at discrete radial angles, detection distances, and gamma-ray energies is measured, and the BP neural network prediction model is constructed using MATLAB. The gamma point source efficiencies at different radial angles, detection distances, and gamma-ray energies are predicted quickly and accurately using this nonlinear prediction model. The results show that the maximum error between the predicted and experimental values is 3.732% at 661.661 keV, 11π/24, and 35 cm, and those under other conditions are less than 3%. The gamma point source efficiencies obtained using the BP neural network model are in good agreement with experimental data. 展开更多
关键词 EFFICIENCY BP NEURAL network HPGE DETECTOR GAMMA point source
下载PDF
Fast recognition using convolutional neural network for the coal particle density range based on images captured under multiple light sources 被引量:6
6
作者 Feiyan Bai Minqiang Fan +1 位作者 Hongli Yang Lianping Dong 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2021年第6期1053-1061,共9页
A method based on multiple images captured under different light sources at different incident angles was developed to recognize the coal density range in this study.The innovation is that two new images were construc... A method based on multiple images captured under different light sources at different incident angles was developed to recognize the coal density range in this study.The innovation is that two new images were constructed based on images captured under four single light sources.Reconstruction image 1 was constructed by fusing greyscale versions of the original images into one image,and Reconstruction image2 was constructed based on the differences between the images captured under the different light sources.Subsequently,the four original images and two reconstructed images were input into the convolutional neural network AlexNet to recognize the density range in three cases:-1.5(clean coal) and+1.5 g/cm^(3)(non-clean coal);-1.8(non-gangue) and+1.8 g/cm^(3)(gangue);-1.5(clean coal),1.5-1.8(middlings),and+1.8 g/cm^(3)(gangue).The results show the following:(1) The reconstructed images,especially Reconstruction image 2,can effectively improve the recognition accuracy for the coal density range compared with images captured under single light source.(2) The recognition accuracies for gangue and non-gangue,clean coal and non-clean coal,and clean coal,middlings,and gangue reached88.44%,86.72% and 77.08%,respectively.(3) The recognition accuracy increases as the density moves further away from the boundary density. 展开更多
关键词 COAL Density range Image Multiple light sources Convolutional neural network
下载PDF
Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion
7
作者 Jianfeng Lu Caijin Li +2 位作者 Xiangye Huang Chen Cui Mahmoud Emam 《Computers, Materials & Continua》 SCIE EI 2024年第8期3047-3065,共19页
The widespread availability of digital multimedia data has led to a new challenge in digital forensics.Traditional source camera identification algorithms usually rely on various traces in the capturing process.Howeve... The widespread availability of digital multimedia data has led to a new challenge in digital forensics.Traditional source camera identification algorithms usually rely on various traces in the capturing process.However,these traces have become increasingly difficult to extract due to wide availability of various image processing algorithms.Convolutional Neural Networks(CNN)-based algorithms have demonstrated good discriminative capabilities for different brands and even different models of camera devices.However,their performances is not ideal in case of distinguishing between individual devices of the same model,because cameras of the same model typically use the same optical lens,image sensor,and image processing algorithms,that result in minimal overall differences.In this paper,we propose a camera forensics algorithm based on multi-scale feature fusion to address these issues.The proposed algorithm extracts different local features from feature maps of different scales and then fuses them to obtain a comprehensive feature representation.This representation is then fed into a subsequent camera fingerprint classification network.Building upon the Swin-T network,we utilize Transformer Blocks and Graph Convolutional Network(GCN)modules to fuse multi-scale features from different stages of the backbone network.Furthermore,we conduct experiments on established datasets to demonstrate the feasibility and effectiveness of the proposed approach. 展开更多
关键词 source camera identification camera forensics convolutional neural network feature fusion transformer block graph convolutional network
下载PDF
Identification of Contaminant Source Characteristics and Monitoring Network Design in Groundwater Aquifers: An Overview 被引量:3
8
作者 Mahsa Amirabdollahian Bithin Datta 《Journal of Environmental Protection》 2013年第5期26-41,共16页
The groundwater system is often polluted by different sources of contamination where the sources are difficult to detect. The presence of contamination in groundwater poses significant challenges to its delineation an... The groundwater system is often polluted by different sources of contamination where the sources are difficult to detect. The presence of contamination in groundwater poses significant challenges to its delineation and quantification. The remediation of a contaminated site requires an optimal decision making system to identify the pollutant source characteristics accurately and efficiently. The source characteristics are generally identified using contaminant concentration measurements from arbitrary or planned monitoring locations. To effectively characterize the sources of pollution, the monitoring locations should be selected appropriately. An efficient monitoring network will result in satisfactory characterization of contaminant sources. On the other hand, an appropriate design of monitoring network requires reliable source characteristics. A coupled iterative sequential source identification and dynamic monitoring network design, improves substantially the accuracy of source identification model. This paper reviews different source identification and monitoring network design methods in groundwater contaminant sites. Further, the models for sequential integration of these two models are presented. The effective integration of source identification and dedicated monitoring network design models, distributed sources, parameter uncertainty, and pollutant geo-chemistry are some of the issues which need to be addressed in efficient, accurate and widely applicable methodologies for identification of unknown pollutant sources in contaminated aquifers. 展开更多
关键词 POLLUTION Detection AQUIFER CONTAMINATION GROUNDWATER source IDENTIFICATION MONITORING network Design
下载PDF
Identification of contamination source in water distribution network based on consumer complaints 被引量:3
9
作者 陶涛 黄海东 +1 位作者 信昆仑 刘书明 《Journal of Central South University》 SCIE EI CAS 2012年第6期1600-1609,共10页
A new methodology was proposed for contamination source identification using information provided by consumer complaints from a probabilistic view.Due to the high uncertainties of information derived from users,the ob... A new methodology was proposed for contamination source identification using information provided by consumer complaints from a probabilistic view.Due to the high uncertainties of information derived from users,the objective of the proposed methodology doesn't aim to capture a unique solution,but to minimize the number of possible contamination sources.In the proposed methodology,all the possible pollution nodes are identified through the CSA methodology firstly.And then based on the principle of total probability formula,the probability of each possible contamination node is obtained through a series of calculation.According to magnitude of the probability,the number of possible pollution nodes is minimized.The effectiveness and feasibility of the methodology is demonstrated through an application to a real case of ZJ City.Four scenarios were designed to investigate the influence of different uncertainties on the results in this case.The results show that pollutant concentration,injection duration,the number of consumer complaints nodes used for calculation and the prior probability with which consumers would complaint have no particular effect on the identification of contamination source.Three nodes were selected as the most possible pollution sources in water pipe network of ZJ City which includes more than 3 000 nodes.The results show the potential of the proposed method to identify contamination source through consumer complaints. 展开更多
关键词 water distribution network contamination source IDENTIFICATION consumer complaints
下载PDF
Multipath Source Self Repair Routing Algorithm for Mobile Ad Hoc Networks 被引量:2
10
作者 吴东亚 侯朝桢 侯紫峰 《Journal of Beijing Institute of Technology》 EI CAS 2005年第2期135-139,共5页
A multipath source self repair routing (MSSRR) algorithm for mobile ad hoc networks is proposed. By using multiple paths which can be repaired by themselves to transmit packets alternately, the network's load is b... A multipath source self repair routing (MSSRR) algorithm for mobile ad hoc networks is proposed. By using multiple paths which can be repaired by themselves to transmit packets alternately, the network's load is balanced, the link state in the network can be checked in time, the number of the times the route discovery mechanism starts is decreased. If only one route which will be broken can be used to transmit the packets, the route discovery mechanism is restarted.The algorithm is implemented on the basis of dynamic source routing (DSR). The effect of MSSRR on lifetime of the access from the source to the destination and the overhead is discussed. Compared with the performance of DSR,it can be seen that the algorithm can improve the performance of the network obviously and the overhead almost does not increase if the average hop count is larger. 展开更多
关键词 mobile ad hoc networks multipath source self repair routing (MSSRR) algorithm DSR routing ptotocol MULTIPATH self repair THRESHOLD
下载PDF
Localization method of subsynchronous oscillation source based on high-resolution time-frequency distribution image and CNN
11
作者 Hui Liu Yundan Cheng +3 位作者 Yanhui Xu Guanqun Sun Rusi Chen Xiaodong Yu 《Global Energy Interconnection》 EI CSCD 2024年第1期1-13,共13页
The penetration of new energy sources such as wind power is increasing,which consequently increases the occurrence rate of subsynchronous oscillation events.However,existing subsynchronous oscillation source-identific... The penetration of new energy sources such as wind power is increasing,which consequently increases the occurrence rate of subsynchronous oscillation events.However,existing subsynchronous oscillation source-identification methods primarily analyze fixed-mode oscillations and rarely consider time-varying features,such as frequency drift,caused by the random volatility of wind farms when oscillations occur.This paper proposes a subsynchronous oscillation sourcelocalization method that involves an enhanced short-time Fourier transform and a convolutional neural network(CNN).First,an enhanced STFT is performed to secure high-resolution time-frequency distribution(TFD)images from the measured data of the generation unit ports.Next,these TFD images are amalgamated to form a subsynchronous oscillation feature map that serves as input to the CNN to train the localization model.Ultimately,the trained CNN model realizes the online localization of subsynchronous oscillation sources.The effectiveness and accuracy of the proposed method are validated via multimachine system models simulating forced and natural oscillation events using the Power Systems Computer Aided Design platform.Test results show that the proposed method can localize subsynchronous oscillation sources online while considering unpredictable fluctuations in wind farms,thus providing a foundation for oscillation suppression in practical engineering scenarios. 展开更多
关键词 Subsynchronous oscillation source localization Synchronous squeezing transform Enhanced short-time Fourier transform Convolutional neural networks
下载PDF
Source Recovery in Underdetermined Blind Source Separation Based on Artificial Neural Network 被引量:3
12
作者 Weihong Fu Bin Nong +2 位作者 Xinbiao Zhou Jun Liu Changle Li 《China Communications》 SCIE CSCD 2018年第1期140-154,共15页
We propose a novel source recovery algorithm for underdetermined blind source separation, which can result in better accuracy and lower computational cost. On the basis of the model of underdetermined blind source sep... We propose a novel source recovery algorithm for underdetermined blind source separation, which can result in better accuracy and lower computational cost. On the basis of the model of underdetermined blind source separation, the artificial neural network with single-layer perceptron is introduced into the proposed algorithm. Source signals are regarded as the weight vector of single-layer perceptron, and approximate ι~0-norm is taken into account for output error decision rule of the perceptron, which leads to the sparse recovery. Then the procedure of source recovery is adjusting the weight vector of the perceptron. What's more, the optimal learning factor is calculated and a descent sequence of smoothed parameter is used during iteration, which improves the performance and significantly decreases computational complexity of the proposed algorithm. The simulation results reveal that the algorithm proposed can recover the source signal with high precision, while it requires lower computational cost. 展开更多
关键词 underdetermined blind source separation ι~0-norm artificial neural network sparse reconstruction
下载PDF
Extracting a Heterogeneous Social Network of AcademicResearchers on the Web Based on Information Retrieved from Multiple Sources 被引量:2
13
作者 Rasim M. Alguliev Ramiz M Aliguliyev Fadai S Ganjaliyev 《American Journal of Operations Research》 2011年第2期33-38,共6页
The majority of academic researchers present the results of their scientific activity on the Web. This trace can be used to derive useful information of their past, present activity and forecast the future intentions.... The majority of academic researchers present the results of their scientific activity on the Web. This trace can be used to derive useful information of their past, present activity and forecast the future intentions. Hence, social network of academic researchers can be of important value for scientific community. This information can be retrieved from various data source currently available on the Web. From each of them a separate net-work can be built. In this paper we present a method which can be used to combine multiple single-relational networks into a single network which will combine all relations, hence it will be multi-relational. 展开更多
关键词 Multi-Relational networks ACADEMIC Researchers’ network Data source CRITERIA
下载PDF
Sound Source Localization Based on SRP-PHAT Spatial Spectrum and Deep Neural Network 被引量:3
14
作者 Xiaoyan Zhao Shuwen Chen +1 位作者 Lin Zhou Ying Chen 《Computers, Materials & Continua》 SCIE EI 2020年第7期253-271,共19页
Microphone array-based sound source localization(SSL)is a challenging task in adverse acoustic scenarios.To address this,a novel SSL algorithm based on deep neural network(DNN)using steered response power-phase transf... Microphone array-based sound source localization(SSL)is a challenging task in adverse acoustic scenarios.To address this,a novel SSL algorithm based on deep neural network(DNN)using steered response power-phase transform(SRP-PHAT)spatial spectrum as input feature is presented in this paper.Since the SRP-PHAT spatial power spectrum contains spatial location information,it is adopted as the input feature for sound source localization.DNN is exploited to extract the efficient location information from SRP-PHAT spatial power spectrum due to its advantage on extracting high-level features.SRP-PHAT at each steering position within a frame is arranged into a vector,which is treated as DNN input.A DNN model which can map the SRP-PHAT spatial spectrum to the azimuth of sound source is learned from the training signals.The azimuth of sound source is estimated through trained DNN model from the testing signals.Experiment results demonstrate that the proposed algorithm significantly improves localization performance whether the training and testing condition setup are the same or not,and is more robust to noise and reverberation. 展开更多
关键词 Sound source localization microphone array steered response power-phase transform(SRP-PHAT)spatial spectrum deep neural network
下载PDF
Effect of observation time on source identification of diffusion in complex networks 被引量:1
15
作者 Chaoyi Shi Qi Zhang Tianguang Chu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第7期97-103,共7页
This paper examines the effect of the observation time on source identification of a discrete-time susceptible-infectedrecovered diffusion process in a network with snapshot of partial nodes.We formulate the source id... This paper examines the effect of the observation time on source identification of a discrete-time susceptible-infectedrecovered diffusion process in a network with snapshot of partial nodes.We formulate the source identification problem as a maximum likelihood(ML)estimator and develop a statistical inference method based on Monte Carlo simulation(MCS)to estimate the source location and the initial time of diffusion.Experimental results in synthetic networks and real-world networks demonstrate evident impact of the observation time as well as the fraction of the observers on the concerned problem. 展开更多
关键词 complex network source identification statistical inference partial observation
下载PDF
Two States CBR Modeling of Data Source in Dynamic Traffic Monitoring Sensor Networks 被引量:1
16
作者 罗俊 蒋铃鸽 +2 位作者 何晨 冯宸 郑春雷 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期618-622,共5页
Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo... Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation. 展开更多
关键词 wireless sensor network (WSN) traffic monitoring data source model AUTOCORRELATION
下载PDF
Distributed Plume Source Localization Using Hierarchical Sensor Networks 被引量:1
17
作者 匡兴红 刘雨青 +1 位作者 吴燕翔 邵惠鹤 《Journal of Donghua University(English Edition)》 EI CAS 2009年第1期56-61,共6页
A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding t... A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding to an accident.The entire surveillant field is divided into several small sub-regions.In each sub-region,the localization algorithm based on the improved particle filter(IPF) was performed to estimate the location.Some improved methods such as weighted centroid,residual resampling were introduced to the IPF algorithm to increase the localization performance.This distributed estimation method eliminates many drawbacks inherent with the traditional centralized optimization method.Simulation results show that localization algorithm is efficient for estimating the plume source location. 展开更多
关键词 wireless sensor networks source localization distributed localization improved particle filter
下载PDF
Microphone Array-Based Sound Source Localization Using Convolutional Residual Network 被引量:1
18
作者 Ziyi Wang Xiaoyan Zhao +2 位作者 Hongjun Rong Ying Tong Jingang Shi 《Journal of New Media》 2022年第3期145-153,共9页
Microphone array-based sound source localization(SSL)is widely used in a variety of occasions such as video conferencing,robotic hearing,speech enhancement,speech recognition and so on.The traditional SSL methods cann... Microphone array-based sound source localization(SSL)is widely used in a variety of occasions such as video conferencing,robotic hearing,speech enhancement,speech recognition and so on.The traditional SSL methods cannot achieve satisfactory performance in adverse noisy and reverberant environments.In order to improve localization performance,a novel SSL algorithm using convolutional residual network(CRN)is proposed in this paper.The spatial features including time difference of arrivals(TDOAs)between microphone pairs and steered response power-phase transform(SRPPHAT)spatial spectrum are extracted in each Gammatone sub-band.The spatial features of different sub-bands with a frame are combine into a feature matrix as the input of CRN.The proposed algorithm employ CRN to fuse the spatial features.Since the CRN introduces the residual structure on the basis of the convolutional network,it reduce the difficulty of training procedure and accelerate the convergence of the model.A CRN model is learned from the training data in various reverberation and noise environments to establish the mapping regularity between the input feature and the sound azimuth.Through simulation verification,compared with the methods using traditional deep neural network,the proposed algorithm can achieve a better localization performance in SSL task,and provide better generalization capacity to untrained noise and reverberation. 展开更多
关键词 Convolutional residual network microphone array spatial features sound source localization
下载PDF
Source Timing Recovery of Constant-bit-rate(CBR) Services in ATM Networks
19
作者 何家福 《High Technology Letters》 EI CAS 1996年第2期43-47,共5页
Asynchronous Transfer Mode(ATM)technique is regarded as an efficient approach forthe integration of diverse types of services in Broadband Integrated Services Digital Network(B-ISDN).The Asynchronous-Time-Division(ATD... Asynchronous Transfer Mode(ATM)technique is regarded as an efficient approach forthe integration of diverse types of services in Broadband Integrated Services Digital Network(B-ISDN).The Asynchronous-Time-Division(ATD)Statistical Multiplexing and FastPacket Switching in ATM networks bring serious uncertainty to the end-to-end Cell DelayVariation(CDV)of the CBR traffic(e.g.voice,audio,CBR video,etc.)and cause troublesfor the Source Timing Recovery(STR)of CBR services.This paper discusses the originsand features of the CDV,two STR implementation methods proposed by the InternationalTelecommunication Union(ITU),and an optimal STR scheme with a Digital-to-AnalogConverter(DAC)based Phase-Locked Loop(PLL). 展开更多
关键词 ATM networks source TIMING recovery CBR SERVICES
下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
20
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
下载PDF
上一页 1 2 175 下一页 到第
使用帮助 返回顶部