Microwave reflectometry is a powerful diagnostic that can measure the density profile and localized turbulence with high spatial and temporal resolution and will be used in ITER,so understanding the influence of plasm...Microwave reflectometry is a powerful diagnostic that can measure the density profile and localized turbulence with high spatial and temporal resolution and will be used in ITER,so understanding the influence of plasma perturbations on the reflect signal is important.The characteristics of the reflect signal from profile reflectometry,the time-of-flight(TOF)signal associated with the MHD instabilities,are investigated in EAST.Using a 1D full-wave simulation code by the Finite-DifferenceTime-Domain(FDTD)method,it is well validated that the local density flattening could induce the discontinuity of the simulated TOF signal and an obvious change of reflect amplitude.Experimental TOF signals under different types of MHD instabilities(sawtooth,sawtooth precursors and tearing mode)are studied in detail and show agreement with the simulation.Two new improved algorithms for detecting and localizing the radial positions of the low-order rational surface,the cross-correlation and gradient threshold(CGT)method and the 2D convolutional neural network approach(CNN)are presented for the first time.It is concluded that TOF signal analysis from profile reflectometry can provide a straightforward and localized measurement of the plasma perturbation from the edge to the core simultaneously and may be a complement or correction to the q-profile control,which will be beneficial for the advanced tokamak operation.展开更多
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses ...The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date.展开更多
Transient Rayleigh wave detection is a high-precision nondestructive detection method.At present,it has been widely used in shallow exploration,but rarely used in tunnel lining quality detection.Through the tunnel lin...Transient Rayleigh wave detection is a high-precision nondestructive detection method.At present,it has been widely used in shallow exploration,but rarely used in tunnel lining quality detection.Through the tunnel lining physical model experiment,the layout defects of the double-layer reinforcement lining area were detected and the Rayleigh wave velocity profile and dispersion curve were analyzed after data process-ing,which finally verified the feasibility and accuracy of Rayleigh wave method in detecting the tunnel lining void area.The results show that the method is not affected by the reinforcement inside the lining,the shallow detection is less disturbed and the accuracy is higher,and the data will fluctuate slightly with the deepening of the detection depth.At the same time,this method responds quite accurately to the thickness of the concrete,allowing for the assessment of the tunnel lining’s lack of compactness.This method has high efficiency,good reliability,and simple data processing,and is suitable for nondestructive detection of internal defects of tun-nel lining structure.展开更多
The sensitivity of magnetic Barkhausen noise (MBN) profile to changes in the excitation field strength and the number of turns of the detection coil was investigated in inhomogeneous material. Generally, the 0.5 mm ca...The sensitivity of magnetic Barkhausen noise (MBN) profile to changes in the excitation field strength and the number of turns of the detection coil was investigated in inhomogeneous material. Generally, the 0.5 mm case depth EN 36 steel specimen shows a double peak profile indicative of inhomogeneity through the detected depth the magnetized landscape. Various excitation field amplitudes were applied to the specimen and the induced MBN emission was analyzed for each magnetizing current. Excitation field at the lowest level induced an MBN emission of two peaks of equivalent heights. The first peak occurs at lower field than the second peak in the magnetization period. As the excitation field increased, the height of both peaks increased but the second peak increased in a higher rate than that of the first peak. Beyond certain excitation level, both peaks began to saturate and no increase in the MBN intensity was observed with increased excitation field strength. However, peak position and the number of Barkhausen events, indicated linearly as a function of the applied field strength. The experiment also establishes that the number of turns in the detection coil is important parameter which controls the height of the first peak. Low field peak height increases as the number of turn of the detection coil increases. The results indicate that the potential difference applied to the electromagnet and the sensitivity of the detection coil, determine the MBN profile characteristics.展开更多
Vehicle detection has been the critical part of the traffic surveillance system for many years. However, vehicle detection method is still challenging. In this paper, differential morphology closing profile is used to...Vehicle detection has been the critical part of the traffic surveillance system for many years. However, vehicle detection method is still challenging. In this paper, differential morphology closing profile is used to extract the vehicle automatically from the traffic image. Along with closing profile, some addition operation has been applied as a part of the algorithm to get the high detection and quality rate. Result demonstrated that the novel method has an excellent detection and quality percentage. We also have compared our automated detection method with other traditional image processing based methods and the results indicate that our proposed method provides better results than traditional image processing based methods.展开更多
In this paper, the temporal different characteristics between the target and background pixels are used to detect dim moving targets in the slow-evolving complex background. A local and global variance filter on tempo...In this paper, the temporal different characteristics between the target and background pixels are used to detect dim moving targets in the slow-evolving complex background. A local and global variance filter on temporal profiles is presented that addresses the temporal characteristics of the target and background pixels to eliminate the large variation of background temporal profiles. Firstly, the temporal behaviors of different types of image pixels of practical infrared scenes are analyzed.Then, the new local and global variance filter is proposed. The baseline of the fluctuation level of background temporal profiles is obtained by using the local and global variance filter. The height of the target pulse signal is extracted by subtracting the baseline from the original temporal profiles. Finally, a new target detection criterion is designed. The proposed method is applied to detect dim and small targets in practical infrared sequence images. The experimental results show that the proposed algorithm has good detection performance for dim moving small targets in the complex background.展开更多
A multichannel noncoherent integration detection method based on high range resolution profile was presented in this paper. According to the property of the moment generating function, the distribution characteristics...A multichannel noncoherent integration detection method based on high range resolution profile was presented in this paper. According to the property of the moment generating function, the distribution characteristics of the noncoherent integrated signals with or without target presence were derived under the circumstance with noncorrelated Gaussian distribution noises. The loss of noncoherent integration was due to improper selection of integration range of cell numbers. A multi channel noncoherent integration detection scheme where the integration number in each channel va ries was proposed to solve this problem. The quality of this method for detection of various targets was evaluated. A comparison of fixed integration range cell number detection and multichannel inte gration detection for a high range resolution profile was presented. Simulation results indicated that the principle of the method was correct and performed well for unknown physical dimension targets. The method required little prior knowledge about target and was convenient for practical implementa tion.展开更多
<span style="font-family:Verdana;font-size:12px;">The Federal Office for Economic Affairs and Export Control (BAFA) of</span><span style="font-family:Verdana;font-size:12px;"> Ger...<span style="font-family:Verdana;font-size:12px;">The Federal Office for Economic Affairs and Export Control (BAFA) of</span><span style="font-family:Verdana;font-size:12px;"> Germany promotes digital concepts for increasing energy efficiency as part of the “Pilotprogramm Einsparz<span style="white-space:nowrap;">ä</span>hler”. Within this program, Limón GmbH is developing software solutions in cooperation with the University of Kassel to identify efficiency potentials in load profiles by means of automated anomaly detection. Therefore, in this study two strategies for anomaly detection in load profiles are evaluated. To estimate the monthly load profile, strategy 1 uses the artificial neural network LSTM (Long Short-Term Memory), with a data period of one month (1</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) or three months (3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M), and strategy 2 uses the smoothing method PEWMA (Probalistic Exponential Weighted Moving Average). By comparing with original load profile data, residuals or summed residuals of the sequence lengths of two, four, six and eight hours are identified as an anomaly by exceeding a predefined threshold. The thresholds are defined by the Z-Score test, </span><i><span style="font-size:12px;font-family:Verdana;">i</span></i><span style="font-size:12px;font-family:Verdana;">.</span><i><span style="font-size:12px;font-family:Verdana;">e</span></i><span style="font-size:12px;font-family:Verdana;">., residuals greater than 2, 2.5 or 3 standard deviations are considered anomalous. Furthermore, the ESD (Extreme Studentized Deviate) test is used to set thresholds by means of three significance level values of 0.05, 0.10 and 0.15, with a maximum of </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;"> = 40 iterations. Five load profiles are examined, which were obtained by the cluster method </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;">-Means as a representative sample from all available data sets of the Limón GmbH. The evaluation shows that for strategy 1 a maximum </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.4 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M) and for all examined companies an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of maximum 0.24 and standard deviation of 0.09 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) could be achieved for the investigation on single residuals. In variant 3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M the highest </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value could be achieved with an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.21 and standard deviation of 0.06 (3</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) for summed residuals of the partial sequence length of four hours. The PEWMA-based strategy 2 did not show a higher anomaly detection efficacy compared to strategy 1 in any of the investigated companies.</span>展开更多
Purpose–This study aims to solve the problem of weld quality inspection,for the aluminum alloy profile welding structure of high-speed train body has complex internal shape and thin plate thickness(2–4 mm),the conve...Purpose–This study aims to solve the problem of weld quality inspection,for the aluminum alloy profile welding structure of high-speed train body has complex internal shape and thin plate thickness(2–4 mm),the conventional nondestructive testing method of weld quality is difficult to implement.Design/methodology/approach–In order to solve this problem,the ultrasonic creeping wave detection technology was proposed.The impact of the profile structure on the creeping wave detection was studied by designing profile structural test blocks and artificial simulation defect test blocks.The detection technology was used to test the actual welded test blocks,and compared with the results of X-ray test and destructive test(tensile test)to verify the accuracy of the ultrasonic creeping wave test results.Findings–It is indicated that that X-ray has better effect on the inspection of porosities and incomplete penetration defects.However,due to special detection method and protection,the detection speed is slow,which cannot meet the requirements of field inspection of the welding structure of aluminum alloy thin-walled profile for high-speed train body.It can be used as an auxiliary detection method for a small number of sampling inspection.The ultrasonic creeping wave can be used to detect the incomplete penetration welds with the equivalent of 0.25 mm or more,the results of creeping wave detection correspond well with the actual incomplete penetration defects.Originality/value–The results show that creeping wave detection results correspond well with the actual non-penetration defects and can be used for welding quality inspection of aluminum alloy thin-wall profile composite welding joints.It is recommended to use the echo amplitude of the 10 mm 30.2 mm 30.5 mm notch as the criterion for weld qualification.展开更多
With the presence of wind waves, the swaying of survey vessel may effect the quality of sub-bottom profiler records and, therefore, it is necessary to correct the distortions induced by wave action. A major issue is t...With the presence of wind waves, the swaying of survey vessel may effect the quality of sub-bottom profiler records and, therefore, it is necessary to correct the distortions induced by wave action. A major issue is to distinguish wind wave effect and real bedforms such as sand waves. In this paper, a bandstop filter is designed according to the frequency features of wind wave effect to treat the distortion of seabed topography by wind waves. The technique is used to correct the sub-bottom profile in order to eliminate the wave-induced distortions for the sub-bottom profile records from the Yangtze Estuary. This study shows that the undulate seabed record is resulted from wave action, rather than the presence of sand waves, and the filtration technique helps to eliminate the wave effect and recover the real morphology of seabed and the sediment sequence underneath. In addition, a method for data processing is proposed for the case that the record indeed represents a combination of wave effects and real bedforms.展开更多
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detec...In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks.展开更多
A high-performance capillary electrophoresis with amperometric detection(CE-AD) method has been developed for the analysis of seven bioactive ingredients,namely ferulic acid(FA),vanillin,vanillic acid,p-hydroxybenzoic...A high-performance capillary electrophoresis with amperometric detection(CE-AD) method has been developed for the analysis of seven bioactive ingredients,namely ferulic acid(FA),vanillin,vanillic acid,p-hydroxybenzoic acid,caffeic acid,gallic acid and protocatechuic acid,in Rhizoma Chuanxiong.The effects of several factors such as the acidity and concentration of running buffer,the separation voltage,the applied potential to working electrode and the injection time were investigated.Under the optimum condit...展开更多
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I...Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.展开更多
This paper studies a detection method of targets of high resolution radar operating at the band of millimeter-wave(32-38GHz) under the background of the clutters, and proposes a new nonparametric detection method, whi...This paper studies a detection method of targets of high resolution radar operating at the band of millimeter-wave(32-38GHz) under the background of the clutters, and proposes a new nonparametric detection method, which not only does less computation, but also is able to detect multiple extended targets radially distributed along distance "corridor", based on the position (range) correlation information of one-dimensional range images(or called range profiles) of high resolution radar targets. The experimental results, on the real echo data of tank illuminated by the millimeter-wave stepped frequency high resolution radar, have certified that such a method presented in this paper is a very effective detection method for multiple extended targets.展开更多
Planetary boundary layer height(PBLH) is an important input parameter for any boundary layer study or model, either climate or atmospheric. The variation of the PBLH is also of great significance to the physical proce...Planetary boundary layer height(PBLH) is an important input parameter for any boundary layer study or model, either climate or atmospheric. The variation of the PBLH is also of great significance to the physical processes of numerical prediction, diagnosis of weather forecasting and monitoring urban pollutants. However, effective ways to monitor the PBLH continuously are lack. Wind profilers are commonly used in monitoring PBLH continuously because of its high temporal and spatial resolution, coupled with capability of continuous detection. In this paper, the covariance wavelet transform(CWT) is used to analyze the range-corrected signal-to-noise ratio(SNR) of the wind profiler to determine the PBLH, which is then compared with the results measured by the gradient method and the radiosonde. The conclusions are as follows:(1) The scaling parameter a and translation parameter b of the wavelet are critical in determination of the PBLH by applying the CWT as different values may get completely different results, which requires to select appropriate values in the calculation carefully.(2) Quality control is crucial in determining the PBLH because good quality control can help remove mutation points, which makes the determined PBLH more consistent with the actual situation.(3) In clear-air, the gradient method is not applicable if the boundary layer turbulence is inhomogeneous and the impact of noise is large for that it is easy to be impacted by the mutation of SNR caused by the atmosphere turbulence instability and other factors, which will cause large errors, while the CWT method as an improvement of the gradient method can determine the PBLH quite well.(4) Through quality control, the PBLHs determined by the CWT are consistent with those of radiosonde, and the correlation coefficient between them is 0.87.展开更多
Up to now, detailedstrategies and algorithms of automaticchange detection for road networksbased on GIS have not been discussed.This paper discusses two differentstrategies of automatic change detec-tion for images wi...Up to now, detailedstrategies and algorithms of automaticchange detection for road networksbased on GIS have not been discussed.This paper discusses two differentstrategies of automatic change detec-tion for images with low resolution andhigh resolution using old GIS data,and presents a buffer detection andtracing algorithm for detecting roadfrom low-resolution images and a newprofile tracing algorithm for detectingroad from high-resolution images. Forfeature-level change detection (FL-CD), a so-called buffer detection algo-rithm is proposed to detect changes offeatures. Some ideas and algorithms ofusing GIS prior information and somecontext information such as substructures of road in high-resolution imagesto assist road detection and extractionare described in detail.展开更多
Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a py...Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a pyramid structure is used to represent an image and the features of the text are extracted using SUSAN edge detector. Text regions at each level of the pyramid are identified according to the autocorrelation analysis. New techniques are introduced to split the text regions into basic ones and merge them into text lines. By evaluating the method on a set of images, we obtain a very good performance of text detection.展开更多
In this paper, an elastic recoil detection analysis method is described using 35 MeV <sup>35</sup>Cl as incident ions. This method can determine and profile simultaneously H, D, He, C and O or in the other...In this paper, an elastic recoil detection analysis method is described using 35 MeV <sup>35</sup>Cl as incident ions. This method can determine and profile simultaneously H, D, He, C and O or in the other case, H, C, N and O. The depth resolution for the elements heavier than He is better than 20 nm. It has been applied to study the Co/Si and TiN thin films, and the depth profiles of He implanted in monocrystal silicon.展开更多
A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experime...A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experiments demonstrate that the detection effect usingenriched sequences is better than that of using truncated sequences. As a SVDD profile is composedof a small amount of support vectors, our SVDD-based method can achieve computation and storageadvantage when the detection performance issimilar to existing method.展开更多
基金supported by the Open Fund of Magnetic Confinement Laboratory of Anhui Province(No.2023 AMF03005)the China Postdoctoral Science Foundation(No.2021M703256)+4 种基金the Director Funding of Hefei Institutes of Physical Science,Chinese Academy of Sciences(No.YZJJ2022QN16)the National Key R&D Program of China(Nos.2022YFE03050003,2019YFE03080200,2019Y FE03040002,and 2022YFE03070004)National Natural Science Foundation of China(Nos.12075284,12175277,12275315 and 12275311)the National Magnetic Confinement Fusion Science Program of China(No.2022YFE03040001)the Science Foundation of the Institute of Plasma Physics,Chinese Academy of Sciences(No.DSJJ-2021-08)。
文摘Microwave reflectometry is a powerful diagnostic that can measure the density profile and localized turbulence with high spatial and temporal resolution and will be used in ITER,so understanding the influence of plasma perturbations on the reflect signal is important.The characteristics of the reflect signal from profile reflectometry,the time-of-flight(TOF)signal associated with the MHD instabilities,are investigated in EAST.Using a 1D full-wave simulation code by the Finite-DifferenceTime-Domain(FDTD)method,it is well validated that the local density flattening could induce the discontinuity of the simulated TOF signal and an obvious change of reflect amplitude.Experimental TOF signals under different types of MHD instabilities(sawtooth,sawtooth precursors and tearing mode)are studied in detail and show agreement with the simulation.Two new improved algorithms for detecting and localizing the radial positions of the low-order rational surface,the cross-correlation and gradient threshold(CGT)method and the 2D convolutional neural network approach(CNN)are presented for the first time.It is concluded that TOF signal analysis from profile reflectometry can provide a straightforward and localized measurement of the plasma perturbation from the edge to the core simultaneously and may be a complement or correction to the q-profile control,which will be beneficial for the advanced tokamak operation.
文摘The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date.
基金Supported by Project of Natural Science Foundation of Jilin Province(No.20220101172JC).
文摘Transient Rayleigh wave detection is a high-precision nondestructive detection method.At present,it has been widely used in shallow exploration,but rarely used in tunnel lining quality detection.Through the tunnel lining physical model experiment,the layout defects of the double-layer reinforcement lining area were detected and the Rayleigh wave velocity profile and dispersion curve were analyzed after data process-ing,which finally verified the feasibility and accuracy of Rayleigh wave method in detecting the tunnel lining void area.The results show that the method is not affected by the reinforcement inside the lining,the shallow detection is less disturbed and the accuracy is higher,and the data will fluctuate slightly with the deepening of the detection depth.At the same time,this method responds quite accurately to the thickness of the concrete,allowing for the assessment of the tunnel lining’s lack of compactness.This method has high efficiency,good reliability,and simple data processing,and is suitable for nondestructive detection of internal defects of tun-nel lining structure.
文摘The sensitivity of magnetic Barkhausen noise (MBN) profile to changes in the excitation field strength and the number of turns of the detection coil was investigated in inhomogeneous material. Generally, the 0.5 mm case depth EN 36 steel specimen shows a double peak profile indicative of inhomogeneity through the detected depth the magnetized landscape. Various excitation field amplitudes were applied to the specimen and the induced MBN emission was analyzed for each magnetizing current. Excitation field at the lowest level induced an MBN emission of two peaks of equivalent heights. The first peak occurs at lower field than the second peak in the magnetization period. As the excitation field increased, the height of both peaks increased but the second peak increased in a higher rate than that of the first peak. Beyond certain excitation level, both peaks began to saturate and no increase in the MBN intensity was observed with increased excitation field strength. However, peak position and the number of Barkhausen events, indicated linearly as a function of the applied field strength. The experiment also establishes that the number of turns in the detection coil is important parameter which controls the height of the first peak. Low field peak height increases as the number of turn of the detection coil increases. The results indicate that the potential difference applied to the electromagnet and the sensitivity of the detection coil, determine the MBN profile characteristics.
文摘Vehicle detection has been the critical part of the traffic surveillance system for many years. However, vehicle detection method is still challenging. In this paper, differential morphology closing profile is used to extract the vehicle automatically from the traffic image. Along with closing profile, some addition operation has been applied as a part of the algorithm to get the high detection and quality rate. Result demonstrated that the novel method has an excellent detection and quality percentage. We also have compared our automated detection method with other traditional image processing based methods and the results indicate that our proposed method provides better results than traditional image processing based methods.
基金National Natural Science Foundation of China(61774120)
文摘In this paper, the temporal different characteristics between the target and background pixels are used to detect dim moving targets in the slow-evolving complex background. A local and global variance filter on temporal profiles is presented that addresses the temporal characteristics of the target and background pixels to eliminate the large variation of background temporal profiles. Firstly, the temporal behaviors of different types of image pixels of practical infrared scenes are analyzed.Then, the new local and global variance filter is proposed. The baseline of the fluctuation level of background temporal profiles is obtained by using the local and global variance filter. The height of the target pulse signal is extracted by subtracting the baseline from the original temporal profiles. Finally, a new target detection criterion is designed. The proposed method is applied to detect dim and small targets in practical infrared sequence images. The experimental results show that the proposed algorithm has good detection performance for dim moving small targets in the complex background.
基金Supported by the Advanced Research Foundation of General Armament Department(51307020101)
文摘A multichannel noncoherent integration detection method based on high range resolution profile was presented in this paper. According to the property of the moment generating function, the distribution characteristics of the noncoherent integrated signals with or without target presence were derived under the circumstance with noncorrelated Gaussian distribution noises. The loss of noncoherent integration was due to improper selection of integration range of cell numbers. A multi channel noncoherent integration detection scheme where the integration number in each channel va ries was proposed to solve this problem. The quality of this method for detection of various targets was evaluated. A comparison of fixed integration range cell number detection and multichannel inte gration detection for a high range resolution profile was presented. Simulation results indicated that the principle of the method was correct and performed well for unknown physical dimension targets. The method required little prior knowledge about target and was convenient for practical implementa tion.
文摘<span style="font-family:Verdana;font-size:12px;">The Federal Office for Economic Affairs and Export Control (BAFA) of</span><span style="font-family:Verdana;font-size:12px;"> Germany promotes digital concepts for increasing energy efficiency as part of the “Pilotprogramm Einsparz<span style="white-space:nowrap;">ä</span>hler”. Within this program, Limón GmbH is developing software solutions in cooperation with the University of Kassel to identify efficiency potentials in load profiles by means of automated anomaly detection. Therefore, in this study two strategies for anomaly detection in load profiles are evaluated. To estimate the monthly load profile, strategy 1 uses the artificial neural network LSTM (Long Short-Term Memory), with a data period of one month (1</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) or three months (3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M), and strategy 2 uses the smoothing method PEWMA (Probalistic Exponential Weighted Moving Average). By comparing with original load profile data, residuals or summed residuals of the sequence lengths of two, four, six and eight hours are identified as an anomaly by exceeding a predefined threshold. The thresholds are defined by the Z-Score test, </span><i><span style="font-size:12px;font-family:Verdana;">i</span></i><span style="font-size:12px;font-family:Verdana;">.</span><i><span style="font-size:12px;font-family:Verdana;">e</span></i><span style="font-size:12px;font-family:Verdana;">., residuals greater than 2, 2.5 or 3 standard deviations are considered anomalous. Furthermore, the ESD (Extreme Studentized Deviate) test is used to set thresholds by means of three significance level values of 0.05, 0.10 and 0.15, with a maximum of </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;"> = 40 iterations. Five load profiles are examined, which were obtained by the cluster method </span><i><span style="font-size:12px;font-family:Verdana;">k</span></i><span style="font-size:12px;font-family:Verdana;">-Means as a representative sample from all available data sets of the Limón GmbH. The evaluation shows that for strategy 1 a maximum </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.4 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M) and for all examined companies an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of maximum 0.24 and standard deviation of 0.09 (1</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) could be achieved for the investigation on single residuals. In variant 3</span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:'';font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">M the highest </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value could be achieved with an average </span><i><span style="font-size:12px;font-family:Verdana;">F</span><sub><span style="font-size:12px;font-family:Verdana;">1</span></sub></i><span style="font-size:12px;font-family:Verdana;">-value of 0.21 and standard deviation of 0.06 (3</span></span><span style="font-family:'';font-size:10pt;"> </span><span style="font-family:Verdana;font-size:12px;">M) for summed residuals of the partial sequence length of four hours. The PEWMA-based strategy 2 did not show a higher anomaly detection efficacy compared to strategy 1 in any of the investigated companies.</span>
基金supported by the National Natural Science Foundation of China(51705470).
文摘Purpose–This study aims to solve the problem of weld quality inspection,for the aluminum alloy profile welding structure of high-speed train body has complex internal shape and thin plate thickness(2–4 mm),the conventional nondestructive testing method of weld quality is difficult to implement.Design/methodology/approach–In order to solve this problem,the ultrasonic creeping wave detection technology was proposed.The impact of the profile structure on the creeping wave detection was studied by designing profile structural test blocks and artificial simulation defect test blocks.The detection technology was used to test the actual welded test blocks,and compared with the results of X-ray test and destructive test(tensile test)to verify the accuracy of the ultrasonic creeping wave test results.Findings–It is indicated that that X-ray has better effect on the inspection of porosities and incomplete penetration defects.However,due to special detection method and protection,the detection speed is slow,which cannot meet the requirements of field inspection of the welding structure of aluminum alloy thin-walled profile for high-speed train body.It can be used as an auxiliary detection method for a small number of sampling inspection.The ultrasonic creeping wave can be used to detect the incomplete penetration welds with the equivalent of 0.25 mm or more,the results of creeping wave detection correspond well with the actual incomplete penetration defects.Originality/value–The results show that creeping wave detection results correspond well with the actual non-penetration defects and can be used for welding quality inspection of aluminum alloy thin-wall profile composite welding joints.It is recommended to use the echo amplitude of the 10 mm 30.2 mm 30.5 mm notch as the criterion for weld qualification.
基金The workis supported bythe National Natural Science Foundation of China (Grant Nos 40231010 and 40476041)
文摘With the presence of wind waves, the swaying of survey vessel may effect the quality of sub-bottom profiler records and, therefore, it is necessary to correct the distortions induced by wave action. A major issue is to distinguish wind wave effect and real bedforms such as sand waves. In this paper, a bandstop filter is designed according to the frequency features of wind wave effect to treat the distortion of seabed topography by wind waves. The technique is used to correct the sub-bottom profile in order to eliminate the wave-induced distortions for the sub-bottom profile records from the Yangtze Estuary. This study shows that the undulate seabed record is resulted from wave action, rather than the presence of sand waves, and the filtration technique helps to eliminate the wave effect and recover the real morphology of seabed and the sediment sequence underneath. In addition, a method for data processing is proposed for the case that the record indeed represents a combination of wave effects and real bedforms.
文摘In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks.
基金the financial support provided by the National Science Foundation of China(No. 20875032)the Basic Research Fund of the Science and Technology Commission of Shanghai Municipality(No. 09ZR1409700)
文摘A high-performance capillary electrophoresis with amperometric detection(CE-AD) method has been developed for the analysis of seven bioactive ingredients,namely ferulic acid(FA),vanillin,vanillic acid,p-hydroxybenzoic acid,caffeic acid,gallic acid and protocatechuic acid,in Rhizoma Chuanxiong.The effects of several factors such as the acidity and concentration of running buffer,the separation voltage,the applied potential to working electrode and the injection time were investigated.Under the optimum condit...
基金the National Natural Science Foundation of China(69983005)and the Research Fund for the Doctoral Program of Higher Education(RFDP1999048602)
文摘Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.
文摘This paper studies a detection method of targets of high resolution radar operating at the band of millimeter-wave(32-38GHz) under the background of the clutters, and proposes a new nonparametric detection method, which not only does less computation, but also is able to detect multiple extended targets radially distributed along distance "corridor", based on the position (range) correlation information of one-dimensional range images(or called range profiles) of high resolution radar targets. The experimental results, on the real echo data of tank illuminated by the millimeter-wave stepped frequency high resolution radar, have certified that such a method presented in this paper is a very effective detection method for multiple extended targets.
基金Foundation of Beijige for radar meteorology and sever weather in Nanjing(BJG201407)National Natural Science Foundation of China(41475019+1 种基金4130618741505016)
文摘Planetary boundary layer height(PBLH) is an important input parameter for any boundary layer study or model, either climate or atmospheric. The variation of the PBLH is also of great significance to the physical processes of numerical prediction, diagnosis of weather forecasting and monitoring urban pollutants. However, effective ways to monitor the PBLH continuously are lack. Wind profilers are commonly used in monitoring PBLH continuously because of its high temporal and spatial resolution, coupled with capability of continuous detection. In this paper, the covariance wavelet transform(CWT) is used to analyze the range-corrected signal-to-noise ratio(SNR) of the wind profiler to determine the PBLH, which is then compared with the results measured by the gradient method and the radiosonde. The conclusions are as follows:(1) The scaling parameter a and translation parameter b of the wavelet are critical in determination of the PBLH by applying the CWT as different values may get completely different results, which requires to select appropriate values in the calculation carefully.(2) Quality control is crucial in determining the PBLH because good quality control can help remove mutation points, which makes the determined PBLH more consistent with the actual situation.(3) In clear-air, the gradient method is not applicable if the boundary layer turbulence is inhomogeneous and the impact of noise is large for that it is easy to be impacted by the mutation of SNR caused by the atmosphere turbulence instability and other factors, which will cause large errors, while the CWT method as an improvement of the gradient method can determine the PBLH quite well.(4) Through quality control, the PBLHs determined by the CWT are consistent with those of radiosonde, and the correlation coefficient between them is 0.87.
基金the Open Research Fund Program of LIESMARS of Wuhan University (No. (01)0304).
文摘Up to now, detailedstrategies and algorithms of automaticchange detection for road networksbased on GIS have not been discussed.This paper discusses two differentstrategies of automatic change detec-tion for images with low resolution andhigh resolution using old GIS data,and presents a buffer detection andtracing algorithm for detecting roadfrom low-resolution images and a newprofile tracing algorithm for detectingroad from high-resolution images. Forfeature-level change detection (FL-CD), a so-called buffer detection algo-rithm is proposed to detect changes offeatures. Some ideas and algorithms ofusing GIS prior information and somecontext information such as substructures of road in high-resolution imagesto assist road detection and extractionare described in detail.
文摘Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a pyramid structure is used to represent an image and the features of the text are extracted using SUSAN edge detector. Text regions at each level of the pyramid are identified according to the autocorrelation analysis. New techniques are introduced to split the text regions into basic ones and merge them into text lines. By evaluating the method on a set of images, we obtain a very good performance of text detection.
文摘In this paper, an elastic recoil detection analysis method is described using 35 MeV <sup>35</sup>Cl as incident ions. This method can determine and profile simultaneously H, D, He, C and O or in the other case, H, C, N and O. The depth resolution for the elements heavier than He is better than 20 nm. It has been applied to study the Co/Si and TiN thin films, and the depth profiles of He implanted in monocrystal silicon.
基金Supported by the National Natural Science Foundation of China(90104005,66973034,60473023).
文摘A new method using support vector data description (SVDD) to distinguishlegitimate users from mas-queradcrs based on UNIX user command sequences is proposed Sliding windowsare used to get low detection delay. Experiments demonstrate that the detection effect usingenriched sequences is better than that of using truncated sequences. As a SVDD profile is composedof a small amount of support vectors, our SVDD-based method can achieve computation and storageadvantage when the detection performance issimilar to existing method.