期刊文献+
共找到541篇文章
< 1 2 28 >
每页显示 20 50 100
Experimental study of core MHD behavior and a novel algorithm for rational surface detection based on profile reflectometry in EAST
1
作者 叶凯萱 周振 +20 位作者 张涛 马九阳 王嵎民 李恭顺 耿康宁 吴茗甫 文斐 黄佳 张洋 邵林明 杨书琪 钟富彬 高善露 喻琳 周子强 向皓明 韩翔 张寿彪 李国强 高翔 the EAST Team 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第3期66-75,共10页
Microwave reflectometry is a powerful diagnostic that can measure the density profile and localized turbulence with high spatial and temporal resolution and will be used in ITER,so understanding the influence of plasm... Microwave reflectometry is a powerful diagnostic that can measure the density profile and localized turbulence with high spatial and temporal resolution and will be used in ITER,so understanding the influence of plasma perturbations on the reflect signal is important.The characteristics of the reflect signal from profile reflectometry,the time-of-flight(TOF)signal associated with the MHD instabilities,are investigated in EAST.Using a 1D full-wave simulation code by the Finite-DifferenceTime-Domain(FDTD)method,it is well validated that the local density flattening could induce the discontinuity of the simulated TOF signal and an obvious change of reflect amplitude.Experimental TOF signals under different types of MHD instabilities(sawtooth,sawtooth precursors and tearing mode)are studied in detail and show agreement with the simulation.Two new improved algorithms for detecting and localizing the radial positions of the low-order rational surface,the cross-correlation and gradient threshold(CGT)method and the 2D convolutional neural network approach(CNN)are presented for the first time.It is concluded that TOF signal analysis from profile reflectometry can provide a straightforward and localized measurement of the plasma perturbation from the edge to the core simultaneously and may be a complement or correction to the q-profile control,which will be beneficial for the advanced tokamak operation. 展开更多
关键词 MHD instabilities profile reflectometry rational surface detection convolutional neural network(CNN) EAST tokamak
下载PDF
A New Framework for Software Vulnerability Detection Based on an Advanced Computing
2
作者 Bui Van Cong Cho Do Xuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3699-3723,共25页
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses ... The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date. 展开更多
关键词 Source code vulnerability source code vulnerability detection code property graph feature profile contrastive learning data rebalancing
下载PDF
Application of transient Rayleigh wave in detection of tunnel lining void area
3
作者 ZHENG Chao WANG Yanlong +1 位作者 ZHANG Baohui DU Lizhi 《Global Geology》 2024年第1期56-62,共7页
Transient Rayleigh wave detection is a high-precision nondestructive detection method.At present,it has been widely used in shallow exploration,but rarely used in tunnel lining quality detection.Through the tunnel lin... Transient Rayleigh wave detection is a high-precision nondestructive detection method.At present,it has been widely used in shallow exploration,but rarely used in tunnel lining quality detection.Through the tunnel lining physical model experiment,the layout defects of the double-layer reinforcement lining area were detected and the Rayleigh wave velocity profile and dispersion curve were analyzed after data process-ing,which finally verified the feasibility and accuracy of Rayleigh wave method in detecting the tunnel lining void area.The results show that the method is not affected by the reinforcement inside the lining,the shallow detection is less disturbed and the accuracy is higher,and the data will fluctuate slightly with the deepening of the detection depth.At the same time,this method responds quite accurately to the thickness of the concrete,allowing for the assessment of the tunnel lining’s lack of compactness.This method has high efficiency,good reliability,and simple data processing,and is suitable for nondestructive detection of internal defects of tun-nel lining structure. 展开更多
关键词 transient Rayleigh wave detection tunnel lining quality detection dispersion curve Rayleigh wave velocity profile
下载PDF
Magnetic Barkhausen Noise Profile Analysis: Effect of Excitation Field Strength and Detection Coil Sensitivity in Case Carburized Steel 被引量:2
4
作者 Mohamed Mehemed Blaow Brian A. Shaw 《Materials Sciences and Applications》 2014年第5期258-266,共9页
The sensitivity of magnetic Barkhausen noise (MBN) profile to changes in the excitation field strength and the number of turns of the detection coil was investigated in inhomogeneous material. Generally, the 0.5 mm ca... The sensitivity of magnetic Barkhausen noise (MBN) profile to changes in the excitation field strength and the number of turns of the detection coil was investigated in inhomogeneous material. Generally, the 0.5 mm case depth EN 36 steel specimen shows a double peak profile indicative of inhomogeneity through the detected depth the magnetized landscape. Various excitation field amplitudes were applied to the specimen and the induced MBN emission was analyzed for each magnetizing current. Excitation field at the lowest level induced an MBN emission of two peaks of equivalent heights. The first peak occurs at lower field than the second peak in the magnetization period. As the excitation field increased, the height of both peaks increased but the second peak increased in a higher rate than that of the first peak. Beyond certain excitation level, both peaks began to saturate and no increase in the MBN intensity was observed with increased excitation field strength. However, peak position and the number of Barkhausen events, indicated linearly as a function of the applied field strength. The experiment also establishes that the number of turns in the detection coil is important parameter which controls the height of the first peak. Low field peak height increases as the number of turn of the detection coil increases. The results indicate that the potential difference applied to the electromagnet and the sensitivity of the detection coil, determine the MBN profile characteristics. 展开更多
关键词 EXCITATION Field EN 36 STEEL MBN profile INHOMOGENEITY detection COIL ELECTROMAGNET Potential DIFFERENCE
下载PDF
The Automated Vehicle Detection of Highway Traffic Images by Differential Morphological Profile 被引量:1
5
作者 Bharti Sharma Vinod Kumar Katiyar +1 位作者 Arvind Kumar Gupta Akansha Singh 《Journal of Transportation Technologies》 2014年第2期150-156,共7页
Vehicle detection has been the critical part of the traffic surveillance system for many years. However, vehicle detection method is still challenging. In this paper, differential morphology closing profile is used to... Vehicle detection has been the critical part of the traffic surveillance system for many years. However, vehicle detection method is still challenging. In this paper, differential morphology closing profile is used to extract the vehicle automatically from the traffic image. Along with closing profile, some addition operation has been applied as a part of the algorithm to get the high detection and quality rate. Result demonstrated that the novel method has an excellent detection and quality percentage. We also have compared our automated detection method with other traditional image processing based methods and the results indicate that our proposed method provides better results than traditional image processing based methods. 展开更多
关键词 AVERAGE Filter DIFFERENTIAL Morphology CLOSING profile Structure Element THRESHOLDING Vehicle detection
下载PDF
Dim Moving Small Target Detection by Local and Global Variance Filtering on Temporal Profiles in Infrared Sequences
6
作者 Chen Hao Liu Delian 《航空兵器》 CSCD 北大核心 2019年第6期43-49,共7页
In this paper, the temporal different characteristics between the target and background pixels are used to detect dim moving targets in the slow-evolving complex background. A local and global variance filter on tempo... In this paper, the temporal different characteristics between the target and background pixels are used to detect dim moving targets in the slow-evolving complex background. A local and global variance filter on temporal profiles is presented that addresses the temporal characteristics of the target and background pixels to eliminate the large variation of background temporal profiles. Firstly, the temporal behaviors of different types of image pixels of practical infrared scenes are analyzed.Then, the new local and global variance filter is proposed. The baseline of the fluctuation level of background temporal profiles is obtained by using the local and global variance filter. The height of the target pulse signal is extracted by subtracting the baseline from the original temporal profiles. Finally, a new target detection criterion is designed. The proposed method is applied to detect dim and small targets in practical infrared sequence images. The experimental results show that the proposed algorithm has good detection performance for dim moving small targets in the complex background. 展开更多
关键词 small target detection infrared image sequences complex background temporal profile variance filtering
下载PDF
Multichannel noncoherent integration detection using high range resolution profile
7
作者 刘泉华 曾大治 龙腾 《Journal of Beijing Institute of Technology》 EI CAS 2011年第1期100-104,共5页
A multichannel noncoherent integration detection method based on high range resolution profile was presented in this paper. According to the property of the moment generating function, the distribution characteristics... A multichannel noncoherent integration detection method based on high range resolution profile was presented in this paper. According to the property of the moment generating function, the distribution characteristics of the noncoherent integrated signals with or without target presence were derived under the circumstance with noncorrelated Gaussian distribution noises. The loss of noncoherent integration was due to improper selection of integration range of cell numbers. A multi channel noncoherent integration detection scheme where the integration number in each channel va ries was proposed to solve this problem. The quality of this method for detection of various targets was evaluated. A comparison of fixed integration range cell number detection and multichannel inte gration detection for a high range resolution profile was presented. Simulation results indicated that the principle of the method was correct and performed well for unknown physical dimension targets. The method required little prior knowledge about target and was convenient for practical implementa tion. 展开更多
关键词 high resolution radar high range resolution profile(HRRP) extended target detection multichannel noncoherent integration
下载PDF
Comparison and Adaptation of Two Strategies for Anomaly Detection in Load Profiles Based on Methods from the Fields of Machine Learning and Statistics
8
作者 Patrick Krawiec Mark Junge Jens Hesselbach 《Open Journal of Energy Efficiency》 2021年第2期37-49,共13页
<span style="font-family:Verdana;font-size:12px;">The Federal Office for Economic Affairs and Export Control (BAFA) of</span><span style="font-family:Verdana;font-size:12px;"> Ger... <span style="font-family:Verdana;font-size:12px;">The Federal Office for Economic Affairs and Export Control (BAFA) of</span><span style="font-family:Verdana;font-size:12px;"> Germany promotes digital concepts for increasing energy efficiency as part of the “Pilotprogramm Einsparz<span style="white-space:nowrap;">&#228;</span>hler”. Within this program, Limón GmbH is developing software solutions in cooperation with the University of Kassel to identify efficiency potentials in load profiles by means of automated anomaly detection. Therefore, in this study two strategies for anomaly detection in load profiles are evaluated. To estimate the monthly load profile, strategy 1 uses the artificial neural network LSTM (Long Short-Term Memory), with a data period of one month (1</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) or three months (3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M), and strategy 2 uses the smoothing method PEWMA (Probalistic Exponential Weighted Moving Average). By comparing with original load profile data, residuals or summed residuals of the sequence lengths of two, four, six and eight hours are identified as an anomaly by exceeding a predefined threshold. The thresholds are defined by the Z-Score test, </span><i><span style="font-size:12px;font-family:Verdana;">i</span></i><span style="font-size:12px;font-family:Verdana;">.</span><i><span style="font-size:12px;font-family:Verdana;">e</span></i><span style="font-size:12px;font-family:Verdana;">., residuals greater than 2, 2.5 or 3 standard deviations are considered anomalous. Furthermore, the ESD (Extreme Studentized Deviate) test is used to set thresholds by means of three significance level values of 0.05, 0.10 and 0.15, with a maximum of </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;"> = 40 iterations. Five load profiles are examined, which were obtained by the cluster method </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;">-Means as a representative sample from all available data sets of the Limón GmbH. The evaluation shows that for strategy 1 a maximum </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.4 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M) and for all examined companies an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of maximum 0.24 and standard deviation of 0.09 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) could be achieved for the investigation on single residuals. In variant 3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M the highest </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value could be achieved with an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.21 and standard deviation of 0.06 (3</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) for summed residuals of the partial sequence length of four hours. The PEWMA-based strategy 2 did not show a higher anomaly detection efficacy compared to strategy 1 in any of the investigated companies.</span> 展开更多
关键词 Energy Efficiency Anomaly detection Load profiles LSTM PEWMA
下载PDF
Detection of butt weld of laser-MIG hybrid welding of thin-walled profile for high-speed train
9
作者 Qingxiang Zhou Fang Liu +3 位作者 Jingming Li Jiankui Li Shuangnan Zhang Guixi Cai 《Railway Sciences》 2022年第1期98-113,共16页
Purpose–This study aims to solve the problem of weld quality inspection,for the aluminum alloy profile welding structure of high-speed train body has complex internal shape and thin plate thickness(2–4 mm),the conve... Purpose–This study aims to solve the problem of weld quality inspection,for the aluminum alloy profile welding structure of high-speed train body has complex internal shape and thin plate thickness(2–4 mm),the conventional nondestructive testing method of weld quality is difficult to implement.Design/methodology/approach–In order to solve this problem,the ultrasonic creeping wave detection technology was proposed.The impact of the profile structure on the creeping wave detection was studied by designing profile structural test blocks and artificial simulation defect test blocks.The detection technology was used to test the actual welded test blocks,and compared with the results of X-ray test and destructive test(tensile test)to verify the accuracy of the ultrasonic creeping wave test results.Findings–It is indicated that that X-ray has better effect on the inspection of porosities and incomplete penetration defects.However,due to special detection method and protection,the detection speed is slow,which cannot meet the requirements of field inspection of the welding structure of aluminum alloy thin-walled profile for high-speed train body.It can be used as an auxiliary detection method for a small number of sampling inspection.The ultrasonic creeping wave can be used to detect the incomplete penetration welds with the equivalent of 0.25 mm or more,the results of creeping wave detection correspond well with the actual incomplete penetration defects.Originality/value–The results show that creeping wave detection results correspond well with the actual non-penetration defects and can be used for welding quality inspection of aluminum alloy thin-wall profile composite welding joints.It is recommended to use the echo amplitude of the 10 mm 30.2 mm 30.5 mm notch as the criterion for weld qualification. 展开更多
关键词 High-speed train Aluminum alloy profile Laser-MIG hybrid welding Nondestructive inspection X-ray radiography Ultrasonic creeping wave detection
下载PDF
Elimination of Wind Wave Effects on Sub-Bottom Profiler Record
10
作者 刘秀娟 高抒 杨旸 《China Ocean Engineering》 SCIE EI 2007年第2期355-362,共8页
With the presence of wind waves, the swaying of survey vessel may effect the quality of sub-bottom profiler records and, therefore, it is necessary to correct the distortions induced by wave action. A major issue is t... With the presence of wind waves, the swaying of survey vessel may effect the quality of sub-bottom profiler records and, therefore, it is necessary to correct the distortions induced by wave action. A major issue is to distinguish wind wave effect and real bedforms such as sand waves. In this paper, a bandstop filter is designed according to the frequency features of wind wave effect to treat the distortion of seabed topography by wind waves. The technique is used to correct the sub-bottom profile in order to eliminate the wave-induced distortions for the sub-bottom profile records from the Yangtze Estuary. This study shows that the undulate seabed record is resulted from wave action, rather than the presence of sand waves, and the filtration technique helps to eliminate the wave effect and recover the real morphology of seabed and the sediment sequence underneath. In addition, a method for data processing is proposed for the case that the record indeed represents a combination of wave effects and real bedforms. 展开更多
关键词 sub-bottom profiler wind wave effect filtering method Yangtze Estuary
下载PDF
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
11
作者 Pablo Velarde-Alvarado Rafael Martinez-Pelaez +1 位作者 Joel Ruiz-Ibarra Victor Morales-Rocha 《Journal of Computer and Communications》 2014年第11期24-30,共7页
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detec... In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks. 展开更多
关键词 INTRUSION detection Traffic profilING Entropy and Network WORMS
下载PDF
Study on Rhizoma Chuanxiong based on capillary electrophoresis with amperometric detection 被引量:3
12
作者 Chu, Qing Cui Zhang, Dong Li +1 位作者 Zhang, Hai Tao Ye, Jian Nong 《Chinese Chemical Letters》 SCIE CAS CSCD 2010年第2期217-220,共4页
A high-performance capillary electrophoresis with amperometric detection(CE-AD) method has been developed for the analysis of seven bioactive ingredients,namely ferulic acid(FA),vanillin,vanillic acid,p-hydroxybenzoic... A high-performance capillary electrophoresis with amperometric detection(CE-AD) method has been developed for the analysis of seven bioactive ingredients,namely ferulic acid(FA),vanillin,vanillic acid,p-hydroxybenzoic acid,caffeic acid,gallic acid and protocatechuic acid,in Rhizoma Chuanxiong.The effects of several factors such as the acidity and concentration of running buffer,the separation voltage,the applied potential to working electrode and the injection time were investigated.Under the optimum condit... 展开更多
关键词 Capillary electrophoresis Amperometric detection Rhizoma Chuanxiong Phenolic acids Electrochemical profiles
下载PDF
An Effective Method to Determine the Distribution Boundary of Cobalt-Rich Fe-Mn Crusts on a Guyot: Synchronous Application of Sub-bottom Profiling and Deep-Sea Video Recording 被引量:3
13
作者 HeGaowen LiangDonghong +4 位作者 SongChengbin SunXiaoming WuShuigen ZhouJianping ZhangXuehua 《Journal of China University of Geosciences》 SCIE CSCD 2005年第2期178-182,共5页
关键词 sub-bottom profiling deep-sea video recording guyot cobalt-rich ferromanganese crust distribution boundary
下载PDF
A Novel Immune System Model and Its Application to Network Intrusion Detection 被引量:2
14
作者 LingJun CaoYang +1 位作者 YinJian-hua HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期393-398,共6页
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I... Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model. 展开更多
关键词 Key words network Intrusion detection System 5 Immune System self profile automated self profile extraction algorithm
下载PDF
A DETECTION METHOD OF HIGH RESOLUTION RADAR TARGETS BASED ON POSITION CORRELATION 被引量:2
15
作者 Huang Deshuang(National Laboratory of Pattern Recognition, Institute of Automation, Academia Sinica, Beijing 100080)Han Yueqiu(Department of Electronic Engineering, Beijing Institute of Technology, Beijing 100081) 《Journal of Electronics(China)》 1998年第2期107-115,共9页
This paper studies a detection method of targets of high resolution radar operating at the band of millimeter-wave(32-38GHz) under the background of the clutters, and proposes a new nonparametric detection method, whi... This paper studies a detection method of targets of high resolution radar operating at the band of millimeter-wave(32-38GHz) under the background of the clutters, and proposes a new nonparametric detection method, which not only does less computation, but also is able to detect multiple extended targets radially distributed along distance "corridor", based on the position (range) correlation information of one-dimensional range images(or called range profiles) of high resolution radar targets. The experimental results, on the real echo data of tank illuminated by the millimeter-wave stepped frequency high resolution radar, have certified that such a method presented in this paper is a very effective detection method for multiple extended targets. 展开更多
关键词 High RESOLUTION radar MILLIMETER-WAVE CLUTTER Range profile POSITION correlation Scattering CENTRE NONPARAMETRIC detection
下载PDF
PLANETARY BOUNDARY LAYER HEIGHT MEASURED BY A WIND PROFILER BASED ON THE WAVELET TRANSFORM 被引量:1
16
作者 艾未华 戈书睿 +1 位作者 魏浩 胡明宝 《Journal of Tropical Meteorology》 SCIE 2017年第4期396-407,共12页
Planetary boundary layer height(PBLH) is an important input parameter for any boundary layer study or model, either climate or atmospheric. The variation of the PBLH is also of great significance to the physical proce... Planetary boundary layer height(PBLH) is an important input parameter for any boundary layer study or model, either climate or atmospheric. The variation of the PBLH is also of great significance to the physical processes of numerical prediction, diagnosis of weather forecasting and monitoring urban pollutants. However, effective ways to monitor the PBLH continuously are lack. Wind profilers are commonly used in monitoring PBLH continuously because of its high temporal and spatial resolution, coupled with capability of continuous detection. In this paper, the covariance wavelet transform(CWT) is used to analyze the range-corrected signal-to-noise ratio(SNR) of the wind profiler to determine the PBLH, which is then compared with the results measured by the gradient method and the radiosonde. The conclusions are as follows:(1) The scaling parameter a and translation parameter b of the wavelet are critical in determination of the PBLH by applying the CWT as different values may get completely different results, which requires to select appropriate values in the calculation carefully.(2) Quality control is crucial in determining the PBLH because good quality control can help remove mutation points, which makes the determined PBLH more consistent with the actual situation.(3) In clear-air, the gradient method is not applicable if the boundary layer turbulence is inhomogeneous and the impact of noise is large for that it is easy to be impacted by the mutation of SNR caused by the atmosphere turbulence instability and other factors, which will cause large errors, while the CWT method as an improvement of the gradient method can determine the PBLH quite well.(4) Through quality control, the PBLHs determined by the CWT are consistent with those of radiosonde, and the correlation coefficient between them is 0.87. 展开更多
关键词 CWT wind profiler PBLH detection
下载PDF
Automatic Change Detection for Road Networks from Images Based on GIS 被引量:2
17
作者 SUIHaigang LIDeren GONGJianya 《Geo-Spatial Information Science》 2003年第4期44-50,共7页
Up to now, detailedstrategies and algorithms of automaticchange detection for road networksbased on GIS have not been discussed.This paper discusses two differentstrategies of automatic change detec-tion for images wi... Up to now, detailedstrategies and algorithms of automaticchange detection for road networksbased on GIS have not been discussed.This paper discusses two differentstrategies of automatic change detec-tion for images with low resolution andhigh resolution using old GIS data,and presents a buffer detection andtracing algorithm for detecting roadfrom low-resolution images and a newprofile tracing algorithm for detectingroad from high-resolution images. Forfeature-level change detection (FL-CD), a so-called buffer detection algo-rithm is proposed to detect changes offeatures. Some ideas and algorithms ofusing GIS prior information and somecontext information such as substructures of road in high-resolution imagesto assist road detection and extractionare described in detail. 展开更多
关键词 GIS 网络 自动化 缓冲器 运算法则
下载PDF
Detection of text in images using SUSAN edge detector 被引量:2
18
作者 毛文革 张田文 王力 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期34-40,共7页
Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a py... Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a pyramid structure is used to represent an image and the features of the text are extracted using SUSAN edge detector. Text regions at each level of the pyramid are identified according to the autocorrelation analysis. New techniques are introduced to split the text regions into basic ones and merge them into text lines. By evaluating the method on a set of images, we obtain a very good performance of text detection. 展开更多
关键词 检波器 数字电视 数字图象 信号 文字
下载PDF
ELASTIC RECOIL DETECTION ANALYSIS OF LIGHT ELEMENTS IN THIN FILMS USING 35 MeV^(35) Cl^(6+) BEAM
19
作者 杨熙宏 韦伦存 +6 位作者 李认兴 于金祥 梁斌 任晓棠 王兆江 洪秀花 张利春 《Nuclear Science and Techniques》 SCIE CAS CSCD 1992年第3期175-181,共7页
In this paper, an elastic recoil detection analysis method is described using 35 MeV <sup>35</sup>Cl as incident ions. This method can determine and profile simultaneously H, D, He, C and O or in the other... In this paper, an elastic recoil detection analysis method is described using 35 MeV <sup>35</sup>Cl as incident ions. This method can determine and profile simultaneously H, D, He, C and O or in the other case, H, C, N and O. The depth resolution for the elements heavier than He is better than 20 nm. It has been applied to study the Co/Si and TiN thin films, and the depth profiles of He implanted in monocrystal silicon. 展开更多
关键词 ELASTIC RECOIL detection analysis DEPTH RESOLUTION Mass RESOLUTION He IMPLANTATION profile Co/Si and TiN thin films
下载PDF
Masquerade Detection Using Support Vector Machine
20
作者 YANG Min WANG Li-na +1 位作者 ZHANG Huan-guo CHEN Wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期103-106,共4页
A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experime... A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experiments demonstrate that the detection effect usingenriched sequences is better than that of using truncated sequences. As a SVDD profile is composedof a small amount of support vectors, our SVDD-based method can achieve computation and storageadvantage when the detection performance issimilar to existing method. 展开更多
关键词 computer security intrusion detection masquerade detection user profiling support vector machine
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部