期刊文献+
共找到1,404篇文章
< 1 2 71 >
每页显示 20 50 100
Aggregation operators and CRITIC-VIKOR method for confidence complex q-rung orthopair normal fuzzy information and their applications
1
作者 Tahir Mahmood Zeeshan Ali Muhammad Naeem 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第1期40-63,共24页
Supply chain management is an essential part of an organisation's sustainable programme.Understanding the concentration of natural environment,public,and economic influence and feasibility of your suppliers and pu... Supply chain management is an essential part of an organisation's sustainable programme.Understanding the concentration of natural environment,public,and economic influence and feasibility of your suppliers and purchasers is becoming progressively familiar as all industries are moving towards a massive sustainable potential.To handle such sort of developments in supply chain management the involvement of fuzzy settings and their generalisations is playing an important role.Keeping in mind this role,the aim of this study is to analyse the role and involvement of complex q-rung orthopair normal fuzzy(CQRONF)information in supply chain management.The major impact of this theory is to analyse the notion of confidence CQRONF weighted averaging,confidence CQRONF ordered weighted averaging,confidence CQRONF hybrid averaging,confidence CQRONF weighted geometric,confidence CQRONF ordered weighted geometric,confidence CQRONF hybrid geometric operators and try to diagnose various properties and results.Furthermore,with the help of the CRITIC and VIKOR models,we diagnosed the novel theory of the CQRONF-CRITIC-VIKOR model to check the sensitivity analysis of the initiated method.Moreover,in the availability of diagnosed operators,we constructed a multi-attribute decision-making tool for finding a beneficial sustainable supplier to handle complex dilemmas.Finally,the initiated operator's efficiency is proved by comparative analysis. 展开更多
关键词 averaging/geometric aggregation operators complex q-rung orthopair normal fuzzy information confidence levels strategic decision-making methods
下载PDF
Simulating the Spreading of Two Competing Public Opinion Information on Complex Network 被引量:9
2
作者 Mengshu Xie Zhen Jia +1 位作者 Yanfei Chen Qixiang Deng 《Applied Mathematics》 2012年第9期1074-1078,共5页
In this paper, we investigate the regularity of spreading of information and public opinions towards two competing products in complex networks. By building its mathematical model and simulating its evolution process,... In this paper, we investigate the regularity of spreading of information and public opinions towards two competing products in complex networks. By building its mathematical model and simulating its evolution process, we have found the statistical regularity for support rates of two different products at a steady stage. The research shows that strength of the public opinion spreading is proportional to the final support rates of a product. 展开更多
关键词 complex Network PUBLIC OPINION information Competing SPREADING
下载PDF
Research on Extraction Method of Surface Information Based on Multi-Feature Combination Such as Fractal Texture
3
作者 Zhen Chen Yiyang Zheng 《Journal of Geoscience and Environment Protection》 2023年第10期50-66,共17页
Because of the developed economy and lush vegetation in southern China, the following obstacles or difficulties exist in remote sensing land surface classification: 1) Diverse surface composition types;2) Undulating t... Because of the developed economy and lush vegetation in southern China, the following obstacles or difficulties exist in remote sensing land surface classification: 1) Diverse surface composition types;2) Undulating terrains;3) Small fragmented land;4) Indistinguishable shadows of surface objects. It is our top priority to clarify how to use the concept of big data (Data mining technology) and various new technologies and methods to make complex surface remote sensing information extraction technology develop in the direction of automation, refinement and intelligence. In order to achieve the above research objectives, the paper takes the Gaofen-2 satellite data produced in China as the data source, and takes the complex surface remote sensing information extraction technology as the research object, and intelligently analyzes the remote sensing information of complex surface on the basis of completing the data collection and preprocessing. The specific extraction methods are as follows: 1) extraction research on fractal texture features of Brownian motion;2) extraction research on color features;3) extraction research on vegetation index;4) research on vectors and corresponding classification. In this paper, fractal texture features, color features, vegetation features and spectral features of remote sensing images are combined to form a combination feature vector, which improves the dimension of features, and the feature vector improves the difference of remote sensing features, and it is more conducive to the classification of remote sensing features, and thus it improves the classification accuracy of remote sensing images. It is suitable for remote sensing information extraction of complex surface in southern China. This method can be extended to complex surface area in the future. 展开更多
关键词 complex Surface Remote Sensing information Extraction Remote Sensing Land Classification Transfer Learning Brownian Motion Fractal Texture
下载PDF
Exploring the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method 被引量:1
4
作者 Jing-Chao Sun Yue-Yao Li +3 位作者 Yu Xia Yi-Di Wang Yi-Xuan Jiang Yu-Qiu Li 《TMR Non-Drug Therapy》 2019年第3期95-102,共8页
Objective:Explore the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method.Methods:The complex network and point wise mutual information system-developed by ... Objective:Explore the characteristics of acupoints in the treatment of stroke with complex network and point mutual information method.Methods:The complex network and point wise mutual information system-developed by Chinese academy of Chinese medical sciences wereused to analyze the specific acupoints,compatibility,frequency etc.Results:174 acumoxibustion prescriptions were collected,including 163 acupoints.among them eighteen acupoints were used more than 30 times such as Hegu(LI4),Zusanli(ST36),Quchi(LI11)and Fengshi(GB31).The combinations of 31 acupoints were used more than 15 times,such as the combination of Quchi(LI11)and Zusanli(ST36),the combination of acupoint Quchi(LI11)and Jianyu(LI15),Hegu and Quchi(LI11).The most commonly used treatment method for stroke treatment is to dredge the Yangming meridian and Shaoyang meridian through acupuncture the multiple acupoints located on these two meridians..The commonly used acupoints are mainly distributed in the limbs,head and face.The most commonly used specific acupoint is intersection acupoint.The usage frequency of specific acupoints are higher than that of non-specific acupoints.Conclusion:Dredging the collaterals,dispelling wind-evil and restoring consciousness are the main principle for the treatment of stroke.Specific acupoints in head,face and climbs maybe the main targeted acupoints.Combination of Yang meridians with other meridians is needed to improve the effects.The Yangming meridian and Shaoyang meridian are most used meridians and Hegu(LI4),Quchi(LI11)and Zusanli(ST36)are the most used acupionts. 展开更多
关键词 ACUPUNCTURE STROKE Data MINING complex network POINT mutual information method
下载PDF
Agile Scheduling for MES in a Complex Information Environment 被引量:1
5
作者 LIShu-xia RAOYun-qing ZHANGChao-yong 《Computer Aided Drafting,Design and Manufacturing》 2005年第1期52-58,共7页
关键词 agile scheduling MES complex information game theoretic model
下载PDF
Survivability Mechanisms of Complex Computer Systems Based on Common Information Space
6
作者 DODONOV Oleksandr JIANG Bo DODONOV Vadym 《计算机工程》 CAS CSCD 北大核心 2019年第7期41-45,共5页
The survivability of computer systems should be guaranteed in order to improve its operation efficiency,especially for the efficiency of its critical functions.This paper proposes a decentralized mechanism based on So... The survivability of computer systems should be guaranteed in order to improve its operation efficiency,especially for the efficiency of its critical functions.This paper proposes a decentralized mechanism based on Software-Defined Architecture(SDA).The concepts of critical functions and critical states are defined,and then,the critical functional parameters of the target system are collected and analyzed.Experiments based on the analysis results are performed for reconfiguring the implementations of the whole system.A formal model is presented for analyzing and improving the survivability of the system,and the problem investigated in this paper is reduced to an optimization problem for increasing the system survival time. 展开更多
关键词 SURVIVABILITY evaluation COMMON information space Software-Defined Architecture(SDA) complex COMPUTER systems
下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
7
作者 Jinxin Zuo Yueming Lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
下载PDF
Subtle role of latency for information diffusion in online social networks 被引量:4
8
作者 熊菲 王夕萌 程军军 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期587-595,共9页
Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of lat... Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks. 展开更多
关键词 information diffusion node latency user behavior complex networks
下载PDF
Hierarchical hybrid testability modeling and evaluation method based on information fusion 被引量:3
9
作者 Xishan Zhang Kaoli Huang +1 位作者 Pengcheng Yan Guangyao Lian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第3期523-532,共10页
In order to meet the demand of testability analysis and evaluation for complex equipment under a small sample test in the equipment life cycle, the hierarchical hybrid testability model- ing and evaluation method (HH... In order to meet the demand of testability analysis and evaluation for complex equipment under a small sample test in the equipment life cycle, the hierarchical hybrid testability model- ing and evaluation method (HHTME), which combines the testabi- lity structure model (TSM) with the testability Bayesian networks model (TBNM), is presented. Firstly, the testability network topo- logy of complex equipment is built by using the hierarchical hybrid testability modeling method. Secondly, the prior conditional prob- ability distribution between network nodes is determined through expert experience. Then the Bayesian method is used to update the conditional probability distribution, according to history test information, virtual simulation information and similar product in- formation. Finally, the learned hierarchical hybrid testability model (HHTM) is used to estimate the testability of equipment. Compared with the results of other modeling methods, the relative deviation of the HHTM is only 0.52%, and the evaluation result is the most accu rate. 展开更多
关键词 small sample complex equipment hierarchical hybrid information fusion testability modeling and evaluation.
下载PDF
Competition between two kinds of information among random-walking individuals 被引量:1
10
作者 刘真真 王兴元 王茂基 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期625-630,共6页
A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals re... A model is proposed to describe the competition between two kinds of information among N random-walking individuals in an L x L square, starting from a half-and-half mixture of two kinds of information. Individuals remain or change their information according to their neighbors' information. When the moving speed of individuals v is zero, the two kinds of information typically coexist, and the ratio between them increases with L and decreases with N. In the dynamic case (v 〉 0), only one information eventually remains, and the time required for one information being left scales as Td -v^αL^β^γ. 展开更多
关键词 information spread random walk complex networks power law
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
11
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 complex MODULUS Cryptanalytic Protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information Hiding Key Exchange MODULAR ELLIPTIC Curve Secure Communication
下载PDF
Measuring the Evolution and Influence in Society’s Information Networks
12
作者 Xiaocun Mao Tingting Dong +1 位作者 Meng Li Zhenping Li 《Journal of Applied Mathematics and Physics》 2016年第4期677-685,共9页
We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of infor... We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of information based on model SEIR and improve the diffusion mechanism. In order to explore how inherent value of the information affects the flow of information, we simulate the model by using Matalab. We also use the data that the number of people is connected to Internet in Canada from the year 2009 to 2014 to analysis the model’s reliability. Then we use the model to predict the communication networks’ relationships and capacities around the year 2050. Last we do sensitivity analysis by making small changes in parameters of simulation experiment. The result of the experiment is helpful to model how public interest and opinion can be changed in complex network. 展开更多
关键词 Flow of information SEIR Model Dynamic Equations complex Network
下载PDF
Intelligent Biometric Information Management
13
作者 Harry Wechsler 《Intelligent Information Management》 2010年第9期499-511,共13页
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,... We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics. 展开更多
关键词 Authentication Biometrics Boosting Change DETECTION complexity Cross-Matching Data Fusion Ensemble Methods Forensics Identity MANAGEMENT Imposters Inference INTELLIGENT information MANAGEMENT Margin gain MDL Multi-Sensory Integration Outlier DETECTION P-VALUES Quality Randomness Ranking Score Normalization Semi-Supervised Learning Spectral Clustering STRANGENESS Surveillance Tracking TYPICALITY Transduction
下载PDF
Survivability evaluation for networks carrying complex traffic flows
14
作者 Amin Jamali Mehdi Berenjkoub +1 位作者 Hossein Saidi Behrouz Shahgholi Ghahfarokhi 《Digital Communications and Networks》 SCIE CSCD 2023年第2期534-544,共11页
The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability qua... The capability of a system to fulfill its mission promptly in the presence of attacks,failures,or accidents is one of the qualitative definitions of survivability.In this paper,we propose a model for survivability quantification,which is acceptable for networks carrying complex traffic flows.Complex network traffic is considered as general multi-rate,heterogeneous traffic,where the individual bandwidth demands may aggregate in complex,nonlinear ways.Blocking probability is the chosen measure for survivability analysis.We study an arbitrary topology and some other known topologies for the network.Independent and dependent failure scenarios as well as deterministic and random traffic models are investigated.Finally,we provide survivability evaluation results for different network configurations.The results show that by using about 50%of the link capacity in networks with a relatively high number of links,the blocking probability remains near zero in the case of a limited number of failures. 展开更多
关键词 Blocking probability complex traffic Link failure Network survivability Disaster recovery information assurance
下载PDF
The Study of the Optimal Method for Tibetan Information System Security Resource Allocation
15
作者 Nan Yang Guangrong Shan 《计算机科学与技术汇刊(中英文版)》 2013年第4期77-83,共7页
关键词 信息系统 安全投资 证券 投资风险
下载PDF
基于多维度注意力机制和复数Conformer的单通道语音增强方法
16
作者 高盛祥 莫尚斌 +2 位作者 余正涛 董凌 王文君 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2024年第2期393-403,共11页
为提高被噪声干扰的语音的可理解性和语音质量,针对用于语音增强的深度复数网络对语音复数谱中关键声学特征提取不充分、关联信息建模不合理的问题,提出了基于多维度注意力机制和复数Conformer的单通道语音增强方法(SE-MDACC)。在复数U-... 为提高被噪声干扰的语音的可理解性和语音质量,针对用于语音增强的深度复数网络对语音复数谱中关键声学特征提取不充分、关联信息建模不合理的问题,提出了基于多维度注意力机制和复数Conformer的单通道语音增强方法(SE-MDACC)。在复数U-Net架构下引入复数Conformer,对语音幅度和相位的相关性进行建模;利用多维度注意力机制,构造更加丰富的特征来增强卷积层的表示能力;在残差连接中加入注意力门控机制强化重构语音的细节信息。实验结果显示,相比于深度复数卷积递归网络,SE-MDACC的客观评价指标语音质量感知评估和短时客观可懂度分别提升15.299%、1.462%,表明SE-MDACC可充分提取语音声学特征并对幅度和相位相关性进行合理建模,有效提升语音质量和可理解性。 展开更多
关键词 深度复数网络 声学特征 关联信息 多维度注意力机制 语音增强
下载PDF
复杂信息环境下的情报快速反应机制研究
17
作者 苏成 赵润博 +1 位作者 黄雁宁 赵筱媛 《情报学报》 CSCD 北大核心 2024年第5期528-537,共10页
在科技飞速发展和大国博弈日益白热化的背景下,情报成为抢占国家发展先机的重要工具之一。在复杂信息环境的情报生产新环境和决策新要求下,本文以如何实现情报支撑国家战略决策为研究问题,通过文献调研与案例分析等方法,在总结梳理相关... 在科技飞速发展和大国博弈日益白热化的背景下,情报成为抢占国家发展先机的重要工具之一。在复杂信息环境的情报生产新环境和决策新要求下,本文以如何实现情报支撑国家战略决策为研究问题,通过文献调研与案例分析等方法,在总结梳理相关理论和实践经验的基础上,对情报快速反应机制的内涵、特征和决策支撑场景进行深入探究。本文创新性地提出一套适用于复杂信息环境下的“3+5+9情报快速反应机制”,以“早发现、早预判、早报告、早决策、早应对”为五大核心目标,以“联动协调、信息监测、信息资源、情报分析、应急处置、技术支撑、专家协作、组织保障、跟踪评估监督”为九大支撑子体系,适用于常态化监测、回应关切和突发应急三类重要决策支撑场景的情报工作机制,以期为未来相关实践提供较为扎实的理论基础。 展开更多
关键词 情报快速反应机制 复杂信息环境 常态化监测 回应关切 突发应急 决策支持
下载PDF
车载信息交互系统复杂性设计管理发展研究
18
作者 艾险峰 郑静娴 《包装工程》 CAS 北大核心 2024年第6期14-23,共10页
目的梳理车载信息交互系统及其复杂性管理的发展脉络,并提出多元设计策略以指导车载信息交互系统设计。方法首先利用Vosviewer进行文献检索,梳理出目前车载信息交互领域的研究热点;然后通过文献回顾的方式总结传统车载信息交互系统的复... 目的梳理车载信息交互系统及其复杂性管理的发展脉络,并提出多元设计策略以指导车载信息交互系统设计。方法首先利用Vosviewer进行文献检索,梳理出目前车载信息交互领域的研究热点;然后通过文献回顾的方式总结传统车载信息交互系统的复杂性演变;最后利用Design X的设计策略,从用户、系统、信息等角度,分析数智时代下的车载信息交互系统存在的任务复杂性及交互复杂性。结论基于Design X的设计策略,从用户群体分析、车载信息优化、智慧交通系统搭建等角度,提出有关管理车载信息交互系统复杂性的多元设计策略,为后续车载信息交互设计提供参考。 展开更多
关键词 车载信息交互系统 复杂性管理 Design X
下载PDF
基于支持向量机的油气生产复杂系统信息物理攻击识别方法
19
作者 胡瑾秋 张来斌 +1 位作者 李瑜环 李馨怡 《安全与环境学报》 CAS CSCD 北大核心 2024年第8期3053-3062,共10页
在数据驱动的复杂油气生产系统中,存在故障数据干扰攻击识别的问题,忽视系统内部可能存在的故障数据对攻击检测的影响,则难以及时防御攻击或解决故障。因此,为了提高复杂油气生产系统中信息物理攻击检测的准确性,提出了一种基于支持向... 在数据驱动的复杂油气生产系统中,存在故障数据干扰攻击识别的问题,忽视系统内部可能存在的故障数据对攻击检测的影响,则难以及时防御攻击或解决故障。因此,为了提高复杂油气生产系统中信息物理攻击检测的准确性,提出了一种基于支持向量机的无向图联合检测方法。首先,对复杂油气生产系统中的关键传感器拓扑化形成无向图,建立传感器之间的连接关系并捕捉数据交互。然后,利用支持向量机检测传感器系统异常原因,并选择接收站低压泵及接收站储罐系统作为示例验证,前者的准确率、精确度、召回率和F1分数均高于99%,后者F1分数高于99%,其余均高于97%。与传统方法K均值聚类相比,本方法具有更高的准确性、鲁棒性和完整性,有助于防范攻击和生产事故,保障油气生产系统的安全。 展开更多
关键词 安全工程 油气生产复杂系统 信息物理攻击:异常检测 支持向量机
下载PDF
复杂环境下基于自适应极线约束的AGV视觉SLAM算法
20
作者 崔岸 张新颖 马耀辉 《中国惯性技术学报》 EI CSCD 北大核心 2024年第3期234-241,共8页
针对传统视觉同步定位与地图构建(SLAM)算法不能有效处理复杂环境中的动态及潜在动态目标而影响定位与建图性能的问题,提出一种基于Mask R-CNN神经网络以及ORB-SLAM3算法改进的视觉SLAM方法。针对动态目标,提出一种基于语义信息的运动... 针对传统视觉同步定位与地图构建(SLAM)算法不能有效处理复杂环境中的动态及潜在动态目标而影响定位与建图性能的问题,提出一种基于Mask R-CNN神经网络以及ORB-SLAM3算法改进的视觉SLAM方法。针对动态目标,提出一种基于语义信息的运动一致性检验算法,使用自适应阈值的极线约束方法实现图像中动态特征点的精确剔除;针对潜在动态目标,提出一种改进的长期数据关联方法,通过增大关键帧选取密度及优化关键帧中的潜在动态目标信息,对算法的回环优化和地图融合过程进行改进,提高回环优化效果与地图复用性。在TUM数据集和真实场景中进行验证,实验结果表明与ORB-SLAM3算法相比,采用TUM数据集在低动态场景和高动态场景中的绝对轨迹均方根误差分别减小8.5%和65.6%;在真实场景下测试,所提算法的定位精度提高了62.5%。 展开更多
关键词 同步定位与地图构建 复杂环境 语义信息 自适应阈值 极线约束
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部