期刊文献+
共找到1,124篇文章
< 1 2 57 >
每页显示 20 50 100
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
1
作者 Xiaozhong Yu Jinhua Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期197-225,共29页
In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s... In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests. 展开更多
关键词 Deep learning rice diseases and pests image recognition object detection
下载PDF
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
2
作者 Renwan Bi Mingfeng Zhao +2 位作者 Zuobin Ying Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2024年第2期380-388,共9页
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders... With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in IoT.However,sensing users as data uploaders lack a balance between data benefits and privacy threats,leading to conservative data uploads and low revenue or excessive uploads and privacy breaches.To solve this problem,a Dynamic Privacy Measurement and Protection(DPMP)framework is proposed based on differential privacy and reinforcement learning.Firstly,a DPM model is designed to quantify the amount of data privacy,and a calculation method for personalized privacy threshold of different users is also designed.Furthermore,a Dynamic Private sensing data Selection(DPS)algorithm is proposed to help sensing users maximize data benefits within their privacy thresholds.Finally,theoretical analysis and ample experiment results show that DPMP framework is effective and efficient to achieve a balance between data benefits and sensing user privacy protection,in particular,the proposed DPMP framework has 63%and 23%higher training efficiency and data benefits,respectively,compared to the Monte Carlo algorithm. 展开更多
关键词 Mobile edge crowdsensing Dynamic privacy measurement Personalized privacy threshold Privacy protection Reinforcement learning
下载PDF
Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles 被引量:1
3
作者 Bingcai Wei Di Wang +1 位作者 Zhuang Wang Liye Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1975-1988,共14页
With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential pa... With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential part of the IoV,smart transportation relies heavily on information obtained from images.However,inclement weather,such as snowy weather,negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information.Not only that,but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of the Internet of Vehicles adverse.This paper describes the single image snowremoval task and the use of a vision transformer to generate adversarial networks.The residual structure is used in the algorithm,and the Transformer structure is used in the network structure of the generator in the generative adversarial networks,which improves the accuracy of the snow removal task.Moreover,the vision transformer has good scalability and versatility for larger models and has a more vital fitting ability than the previously popular convolutional neural networks.The Snow100K dataset is used for training,testing and comparison,and the peak signal-to-noise ratio and structural similarity are used as evaluation indicators.The experimental results show that the improved snow removal algorithm performs well and can obtain high-quality snow removal images. 展开更多
关键词 Artificial intelligence Internet of Things vision transformer deep learning image desnow
下载PDF
Application of improved virtual sample and sparse representation in face recognition 被引量:1
4
作者 Yongjun Zhang Zewei Wang +4 位作者 Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1391-1402,共12页
Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face ... Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face recognition,differences in expression,angle,posture,and lighting conditions have become key factors that affect recognition accuracy.Essentially,there may be significant differences between different image samples of the same face,which makes image classification very difficult.Therefore,how to build a robust virtual image representation becomes a vital issue.To solve the above problems,this paper proposes a novel image classification algorithm.First,to better retain the global features and contour information of the original sample,the algorithm uses an improved non‐linear image representation method to highlight the low‐intensity and high‐intensity pixels of the original training sample,thus generating a virtual sample.Second,by the principle of sparse representation,the linear expression coefficients of the original sample and the virtual sample can be calculated,respectively.After obtaining these two types of coefficients,calculate the distances between the original sample and the test sample and the distance between the virtual sample and the test sample.These two distances are converted into distance scores.Finally,a simple and effective weight fusion scheme is adopted to fuse the classification scores of the original image and the virtual image.The fused score will determine the final classification result.The experimental results show that the proposed method outperforms other typical sparse representation classification methods. 展开更多
关键词 REPRESENTATION SAMPLE IMAGE
下载PDF
An object detection approach with residual feature fusion and second-order term attention mechanism
5
作者 Cuijin Li Zhong Qu Shengye Wang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期411-424,共14页
Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging research.Since the boundary box location is not sufficiently accurate a... Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging research.Since the boundary box location is not sufficiently accurate and it is difficult to distinguish overlapping and occluded objects,the authors propose a network model with a second-order term attention mechanism and occlusion loss.First,the backbone network is built on CSPDarkNet53.Then a method is designed for the feature extraction network based on an item-wise attention mechanism,which uses the filtered weighted feature vector to replace the original residual fusion and adds a second-order term to reduce the information loss in the process of fusion and accelerate the convergence of the model.Finally,an objected occlusion regression loss function is studied to reduce the problems of missed detections caused by dense objects.Sufficient experimental results demonstrate that the authors’method achieved state-of-the-art performance without reducing the detection speed.The mAP@.5 of the method is 85.8%on the Foggy_cityscapes dataset and the mAP@.5 of the method is 97.8%on the KITTI dataset. 展开更多
关键词 artificial intelligence computer vision image processing machine learning neural network object recognition
下载PDF
A Time Series Short-Term Prediction Method Based on Multi-Granularity Event Matching and Alignment
6
作者 Haibo Li Yongbo Yu +1 位作者 Zhenbo Zhao Xiaokang Tang 《Computers, Materials & Continua》 SCIE EI 2024年第1期653-676,共24页
Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same g... Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same granularity,segmenting them into different granularity events can effectively mitigate the impact of varying time scales on prediction accuracy.However,these events of varying granularity frequently intersect with each other,which may possess unequal durations.Even minor differences can result in significant errors when matching time series with future trends.Besides,directly using matched events but unaligned events as state vectors in machine learning-based prediction models can lead to insufficient prediction accuracy.Therefore,this paper proposes a short-term forecasting method for time series based on a multi-granularity event,MGE-SP(multi-granularity event-based short-termprediction).First,amethodological framework for MGE-SP established guides the implementation steps.The framework consists of three key steps,including multi-granularity event matching based on the LTF(latest time first)strategy,multi-granularity event alignment using a piecewise aggregate approximation based on the compression ratio,and a short-term prediction model based on XGBoost.The data from a nationwide online car-hailing service in China ensures the method’s reliability.The average RMSE(root mean square error)and MAE(mean absolute error)of the proposed method are 3.204 and 2.360,lower than the respective values of 4.056 and 3.101 obtained using theARIMA(autoregressive integratedmoving average)method,as well as the values of 4.278 and 2.994 obtained using k-means-SVR(support vector regression)method.The other experiment is conducted on stock data froma public data set.The proposed method achieved an average RMSE and MAE of 0.836 and 0.696,lower than the respective values of 1.019 and 0.844 obtained using the ARIMA method,as well as the values of 1.350 and 1.172 obtained using the k-means-SVR method. 展开更多
关键词 Time series short-term prediction multi-granularity event ALIGNMENT event matching
下载PDF
An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
7
作者 Linlin Yuan Tiantian Zhang +2 位作者 Yuling Chen Yuxiang Yang Huang Li 《Computers, Materials & Continua》 SCIE EI 2024年第4期1561-1579,共19页
The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an eff... The development of technologies such as big data and blockchain has brought convenience to life,but at the same time,privacy and security issues are becoming more and more prominent.The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’privacy by anonymizing big data.However,the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability.In addition,ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced.Based on this,we propose a new K-anonymity algorithm to solve the privacy security problem in the context of big data,while guaranteeing improved data usability.Specifically,we construct a new information loss function based on the information quantity theory.Considering that different quasi-identification attributes have different impacts on sensitive attributes,we set weights for each quasi-identification attribute when designing the information loss function.In addition,to reduce information loss,we improve K-anonymity in two ways.First,we make the loss of information smaller than in the original table while guaranteeing privacy based on common artificial intelligence algorithms,i.e.,greedy algorithm and 2-means clustering algorithm.In addition,we improve the 2-means clustering algorithm by designing a mean-center method to select the initial center of mass.Meanwhile,we design the K-anonymity algorithm of this scheme based on the constructed information loss function,the improved 2-means clustering algorithm,and the greedy algorithm,which reduces the information loss.Finally,we experimentally demonstrate the effectiveness of the algorithm in improving the effect of 2-means clustering and reducing information loss. 展开更多
关键词 Blockchain big data K-ANONYMITY 2-means clustering greedy algorithm mean-center method
下载PDF
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
8
作者 Jingjing Nie Zhenhua Chen 《Computers, Materials & Continua》 SCIE EI 2024年第6期4763-4779,共17页
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ... The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme. 展开更多
关键词 Internet of Things(IoT) Internet of Medical Things(IoMT) vector dominance with threshold searchable encryption(VDTSE) threshold comparison electronic healthcare
下载PDF
Improved simulation of winter wheat yield in North China Plain by using PRYM-Wheat integrated dry matter distribution coefficient
9
作者 Xuan Li Shaowen Wang +6 位作者 Yifan Chen Danwen Zhang Shanshan Yang Jingwen Wang Jiahua Zhang Yun Bai Sha Zhang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第4期1381-1392,共12页
The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass... The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass×harvest index(HI)”method to simulate regional-scale winter wheat yield.However,spatiotemporal differences in HI contribute to inaccuracies in yield simulation at the regional scale.Time-series dry matter partition coefficients(Fr)can dynamically reflect the dry matter partition of winter wheat.In this study,Fr equations were fitted for each organ of winter wheat using site-scale data.These equations were then coupled into a process-based and remote sensingdriven crop yield model for wheat(PRYM-Wheat)to improve the regional simulation of winter wheat yield over the North China Plain(NCP).The improved PRYM-Wheat model integrated with the fitted Fr equations(PRYM-Wheat-Fr)was validated using data obtained from provincial yearbooks.A 3-year(2000-2002)averaged validation showed that PRYM-Wheat-Fr had a higher coefficient of determination(R^(2)=0.55)and lower root mean square error(RMSE=0.94 t ha^(-1))than PRYM-Wheat with a stable HI(abbreviated as PRYM-Wheat-HI),which had R^(2) and RMSE values of 0.30 and 1.62 t ha^(-1),respectively.The PRYM-Wheat-Fr model also performed better than PRYM-Wheat-HI for simulating yield in verification years(2013-2015).In conclusion,the PRYM-Wheat-Fr model exhibited a better accuracy than the original PRYM-Wheat model,making it a useful tool for the simulation of regional winter wheat yield. 展开更多
关键词 dry matter partition remote sensing model winter wheat yield North China Plain
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
10
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
Side-Channel Leakage Analysis of Inner Product Masking
11
作者 Yuyuan Li Lang Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第4期1245-1262,共18页
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent. 展开更多
关键词 Side-channel analysis inner product masking mutual information nonlinear leakage
下载PDF
Fuzzing:Progress,Challenges,and Perspectives
12
作者 Zhenhua Yu Zhengqi Liu +2 位作者 Xuya Cong Xiaobo Li Li Yin 《Computers, Materials & Continua》 SCIE EI 2024年第1期1-29,共29页
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr... As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system.In recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the technique.This paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its performance.Finally,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers. 展开更多
关键词 FUZZING VULNERABILITY software testing software security
下载PDF
Identification of Important FPGA Modules Based on Complex Network
13
作者 Senjie Zhang Jinbo Wang +3 位作者 Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1027-1047,共21页
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi... The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes. 展开更多
关键词 Hardware security FPGA circuits node importance interdependent network
下载PDF
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
14
作者 Shiyan Zhang Ruohan Xu +3 位作者 Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第2期2287-2308,共22页
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms. 展开更多
关键词 MULTI-DOMAIN data center networks AUTONOMOUS ROUTING
下载PDF
A Survey of Web Information Technology and Application 被引量:1
15
作者 MENG Xiao-feng XU Bao-wen +4 位作者 LIU Qing YU Ge SHEN Jun-yi LU Zheng-ding HE Yan-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期1-5,共5页
0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big cha... 0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big challenges to us. Since the Web provides cross-platform universal access to resources for the massive user population, even greater demand is requested to manage data and services effectively. 展开更多
下载PDF
Analysis of Heavy Precipitation Event in Northeast China from August 1 to 5, 2023
16
作者 Songyang Wang 《Journal of Geoscience and Environment Protection》 2024年第5期176-187,共12页
This study delves into the multiple weather systems and their interaction mechanisms that caused the severe rainfall event in Northeast China in early August 2023. The analysis reveals that the atmospheric circulation... This study delves into the multiple weather systems and their interaction mechanisms that caused the severe rainfall event in Northeast China in early August 2023. The analysis reveals that the atmospheric circulation in the mid-to-high latitudes of the Eurasian continent exhibited a significant “two troughs and two ridges” structure, with Northeast China located precisely in the peripheral region of the subtropical high, significantly influenced by its marginal airflows. Additionally, the residual circulation of Typhoon “Doksuri” interacting with the subtropical high and upper-level troughs significantly increased the rainfall intensity and duration in the region. In particular, the continuous and powerful transport of the southwest jet provided the necessary moisture and unstable conditions for the generation and development of convective systems. The rainfall event resulted in nearly 40,000 people affected and crop damage covering an area of approximately 4000 hectares, demonstrating the severity of extreme weather. The study emphasizes that strengthening meteorological monitoring and early warning systems, as well as formulating and improving emergency response mechanisms, are crucial for reducing potential disaster losses caused by heavy rainfall. Future research can further explore the interaction mechanisms among weather systems, limitations of data sources, and the connection between long-term trends of heavy rainfall events and global climate change. 展开更多
关键词 Heavy Precipitation Eurasian Circulation Typhoon Doksuri Water Vapor Transport Regional Heavy Rainfall Mechanism
下载PDF
Simulation and Field Testing of Multiple Vehicles Collision Avoidance Algorithms 被引量:8
17
作者 Chaoyue Zu Chao Yang +3 位作者 Jian Wang Wenbin Gao Dongpu Cao Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1045-1063,共19页
A global planning algorithm for intelligent vehicles is designed based on the A* algorithm, which provides intelligent vehicles with a global path towards their destinations. A distributed real-time multiple vehicle c... A global planning algorithm for intelligent vehicles is designed based on the A* algorithm, which provides intelligent vehicles with a global path towards their destinations. A distributed real-time multiple vehicle collision avoidance(MVCA)algorithm is proposed by extending the reciprocal n-body collision avoidance method. MVCA enables the intelligent vehicles to choose their destinations and control inputs independently,without needing to negotiate with each other or with the coordinator. Compared to the centralized trajectory-planning algorithm, MVCA reduces computation costs and greatly improves the robustness of the system. Because the destination of each intelligent vehicle can be regarded as private, which can be protected by MVCA, at the same time MVCA can provide a real-time trajectory planning for intelligent vehicles. Therefore,MVCA can better improve the safety of intelligent vehicles. The simulation was conducted in MATLAB, including crossroads scene simulation and circular exchange position simulation. The results show that MVCA behaves safely and reliably. The effects of latency and packet loss on MVCA are also statistically investigated through theoretically formulating broadcasting process based on one-dimensional Markov chain. The results uncover that the tolerant delay should not exceed the half of deciding cycle of trajectory planning, and shortening the sending interval could alleviate the negative effects caused by the packet loss to an extent. The cases of short delay(< 100100 ms) and low packet loss(< 5%) can bring little influence to those trajectory planning algorithms that only depend on V2 V to sense the context, but the unpredictable collision may occur if the delay and packet loss are further worsened. The MVCA was also tested by a real intelligent vehicle, the test results prove the operability of MVCA. 展开更多
关键词 Collision avoidance intelligent vehicles intervehicle communication SIMULATION TESTING trajectory planning
下载PDF
Coverage of communication-based sensor nodes deployed location and energy efficient clustering algorithm in WSN 被引量:6
18
作者 Xiang Gao Yintang Yang Duan Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期698-704,共7页
An effective algorithm based on signal coverage of effective communication and local energy-consumption saving strategy is proposed for the application in wireless sensor networks.This algorithm consists of two sub-al... An effective algorithm based on signal coverage of effective communication and local energy-consumption saving strategy is proposed for the application in wireless sensor networks.This algorithm consists of two sub-algorithms.One is the multi-hop partition subspaces clustering algorithm for ensuring local energybalanced consumption ascribed to the deployment from another algorithm of distributed locating deployment based on efficient communication coverage probability(DLD-ECCP).DLD-ECCP makes use of the characteristics of Markov chain and probabilistic optimization to obtain the optimum topology and number of sensor nodes.Through simulation,the relative data demonstrate the advantages of the proposed approaches on saving hardware resources and energy consumption of networks. 展开更多
关键词 wireless sensor network probability distribution function Markov chain received signal strength indicator Gaussian distribution.
下载PDF
Seepage law and permeability calculation of coal gas based on Klinkenberg effect 被引量:6
19
作者 王登科 魏建平 +2 位作者 付启超 刘勇 夏玉玲 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第5期1973-1978,共6页
Focused on the Klinkenberg effect on gas seepage, the independently developed triaxial experimental system of gas seepage was applied to conduct research on the seepage characteristics of coal seam gas. By means of ex... Focused on the Klinkenberg effect on gas seepage, the independently developed triaxial experimental system of gas seepage was applied to conduct research on the seepage characteristics of coal seam gas. By means of experimental data analysis and theoretical derivation, a calculation method of coal seam gas permeability was proposed, which synthesized the respective influences of gas dynamic viscosity, compressibility factor and Klinkenberg effect. The study results show that the Klinkenberg effect has a significant influence on the coal seam gas seepage, the permeability estimated with the method considering the Klinkenberg effect is correct, and this permeability can fully reflect the true seepage state of the gas. For the gas around the standard conditions, the influences of dynamic viscosity and compressibility factor on the permeability may be ignored. For the gas deviating far away from the standard conditions, the influences of dynamic viscosity and compressibility factor on the permeability must be considered. The research results have certain guiding significance in forming a correct understanding of the Klinkenberg effect and selecting a more accurate calculation method for the permeability of coal containing gas. 展开更多
关键词 coalbed gas seepage law Klinkenberg effect gas adsorption-desorption PERMEABILITY
下载PDF
Systematic analyses of glutamine and glutamate metabolisms across different cancer types 被引量:5
20
作者 Yuan Tian Wei Du +4 位作者 Sha Cao Yue Wu Ning Dong Yan Wang Ying Xu 《Chinese Journal of Cancer》 SCIE CAS CSCD 2017年第12期712-725,共14页
Background: Glutamine and glutamate are known to play important roles in cancer biology. However, no detailed information is available in terms of their levels of involvement in various biological processes across dif... Background: Glutamine and glutamate are known to play important roles in cancer biology. However, no detailed information is available in terms of their levels of involvement in various biological processes across different cancer types, whereas such knowledge could be critical for understanding the distinct characteristics of different cancer types. Our computational study aimed to examine the functional roles of glutamine and glutamate across different cancer types.Methods: We conducted a comparative analysis of gene expression data of cancer tissues versus normal control tissues of 11 cancer types to understand glutamine and glutamate metabolisms in cancer. Specifically, we developed a linear regression model to assess differential contributions by glutamine and/or glutamate to each of seven biological processes in cancer versus control tissues.Results: While our computational predictions were consistent with some of the previous observations, multiple novel predictions were made:(1) glutamine is generally not involved in purine synthesis in cancer except for breast cancer, and is similarly not involved in pyridine synthesis except for kidney cancer;(2) glutamine is generally not involved in ATP production in cancer;(3) glutamine's contribution to nucleotide synthesis is minimal if any in cancer;(4) glutamine is not involved in asparagine synthesis in cancer except for bladder and lung cancers; and(5) glutamate does not contribute to serine synthesis except for bladder cancer.Conclusions: We comprehensively predicted the roles of glutamine and glutamate metabolisms in selected metabolic pathways in cancer tissues versus control tissues, which may lead to novel approaches to therapeutic development targeted at glutamine and/or glutamate metabolism. However, our predictions need further functional validation. 展开更多
关键词 GLUTAMINE METABOLISM Glutamate METABOLISM Nucleotide SYNTHESIS Lipid SYNTHESIS URIDINE diphosphate N-ACETYLGLUCOSAMINE (UDP-GlcNAc) METABOLISM
下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部