期刊文献+
共找到1,210篇文章
< 1 2 61 >
每页显示 20 50 100
Reform and Practice of the Course“Introduction to Computer Science”in Universities Based on the Cultivation of Computational Thinking and Systematic Abilities
1
作者 Kun Zhang Zhengjie Deng +2 位作者 Qi Peng Jinyang Zhou Fuyun Li 《Journal of Contemporary Educational Research》 2024年第7期197-203,共7页
Introduction to Computer Science,as one of the fundamental courses in computer-related majors,plays an important role in the cultivation of computer professionals.However,traditional teaching models and content can no... Introduction to Computer Science,as one of the fundamental courses in computer-related majors,plays an important role in the cultivation of computer professionals.However,traditional teaching models and content can no longer fully meet the needs of modern information technology development.In response to these issues,this article introduces the concept of computational creative thinking,optimizes course content,adopts exploratory teaching methods,and innovates course assessment methods,aiming to comprehensively enhance students’computational thinking and innovative abilities.By continuously improving and promoting this teaching model,it will undoubtedly promote computer education in universities to a new level. 展开更多
关键词 Introduction to Computer Science Curriculum reform Computational thinking PRACTICE
下载PDF
Research on the Reform of School-Enterprise Cooperation Teaching and Education Mode for Computer Majors
2
作者 Zichen Xu 《Journal of Contemporary Educational Research》 2024年第2期144-150,共7页
This paper discusses the innovative methods of school-enterprise cooperation education mode in computer applied talent training.An innovative training model based on school-enterprise cooperation is proposed to promot... This paper discusses the innovative methods of school-enterprise cooperation education mode in computer applied talent training.An innovative training model based on school-enterprise cooperation is proposed to promote the cultivation of students’practical and innovative skills,so as to better adapt to the needs of society.By analyzing the key links and influencing factors of the training mode,this paper puts forward some concrete suggestions and measures to provide guidelines for universities and enterprises in personnel training. 展开更多
关键词 School-enterprise cooperation Computer applied talents Innovative training mode
下载PDF
BLS-identification:A device fingerprint classification mechanism based on broad learning for Internet of Things
3
作者 Yu Zhang Bei Gong Qian Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第3期728-739,共12页
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin... The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods. 展开更多
关键词 Device fingerprint Traffic analysis Class imbalance Broad learning system Access authentication
下载PDF
Vehicle Abnormal Behavior Detection Based on Dense Block and Soft Thresholding
4
作者 Yuanyao Lu Wei Chen +2 位作者 Zhanhe Yu Jingxuan Wang Chaochao Yang 《Computers, Materials & Continua》 SCIE EI 2024年第6期5051-5066,共16页
With the rapid advancement of social economies,intelligent transportation systems are gaining increasing atten-tion.Central to these systems is the detection of abnormal vehicle behavior,which remains a critical chall... With the rapid advancement of social economies,intelligent transportation systems are gaining increasing atten-tion.Central to these systems is the detection of abnormal vehicle behavior,which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions.Current research on detecting abnormal traffic behaviors is still nascent,with significant room for improvement in recognition accuracy.To address this,this research has developed a new model for recognizing abnormal traffic behaviors.This model employs the R3D network as its core architecture,incorporating a dense block to facilitate feature reuse.This approach not only enhances performance with fewer parameters and reduced computational demands but also allows for the acquisition of new features while simplifying the overall network structure.Additionally,this research integrates a self-attentive method that dynamically adjusts to the prevailing traffic conditions,optimizing the relevance of features for the task at hand.For temporal analysis,a Bi-LSTM layer is utilized to extract and learn from time-based data nuances.This research conducted a series of comparative experiments using the UCF-Crime dataset,achieving a notable accuracy of 89.30%on our test set.Our results demonstrate that our model not only operates with fewer parameters but also achieves superior recognition accuracy compared to previous models. 展开更多
关键词 Vehicle abnormal behavior deep learning ResNet dense block soft thresholding
下载PDF
Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles
5
作者 Chi Cui Haiping Du +2 位作者 Zhijuan Jia Yuchu He Lipeng Wang 《Computers, Materials & Continua》 SCIE EI 2024年第10期1581-1593,共13页
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the ... The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent decisions.As a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in IoV.Compared to traditional centralized machine learning,FL reduces communication overhead and improves privacy protection.Despite these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security posture.This paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for IoV.In order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public blockchains.In addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy protection.Experiment results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning attacks.On the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of IoV.Furthermore,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model accuracy.This enhancement effectively mitigates the threat of inference attacks on private information. 展开更多
关键词 Blockchain federated learning differential privacy Internet of Vehicles
下载PDF
Experimental realization of fractal fretwork metasurface for sound anomalous modulation
6
作者 何佳杰 于书萌 +1 位作者 江雪 他得安 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期473-478,共6页
Natural creatures and ancient cultures are full of potential sources to provide inspiration for applied sciences.Inspired by the fractal geometry in nature and the fretwork frame in ancient culture,here we design the ... Natural creatures and ancient cultures are full of potential sources to provide inspiration for applied sciences.Inspired by the fractal geometry in nature and the fretwork frame in ancient culture,here we design the acoustic metasurface to realize sound anomalous modulation,which manifests itself as an incident-dependent propagation behavior:sound wave propagating in the forward direction is allowed to transmit with high efficiency while in the backward direction is obviously suppressed.We quantitatively investigate the dependences of asymmetric transmission on the propagation direction,incident angle and operating frequency by calculating sound transmittance and energy contrast.This compact fractal fretwork metasurface for acoustic anomalous modulation would promote the development of integrated acoustic devices and expand versatile applications in acoustic communication and information encryption. 展开更多
关键词 acoustic metasurface fractal geometry sound anomalous modulation
下载PDF
Distributed Minimum-Energy Containment Control of Continuous-Time Multi-Agent Systems by Inverse Optimal Control
7
作者 Fei Yan Xiangbiao Liu Tao Feng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1533-1535,共3页
Dear Editor,This letter focuses on the distributed optimal containment control of continuous-time multi-agent systems(CTMASs)with respect to the minimum-energy performance index over fixed topology.To achieve this,we ... Dear Editor,This letter focuses on the distributed optimal containment control of continuous-time multi-agent systems(CTMASs)with respect to the minimum-energy performance index over fixed topology.To achieve this,we firstly investigate the optimal containment control problem using the inverse optimal control method,where all states of followers asymptotically converge to the convex hull spanned by the leaders while some quadratic performance indexes get minimized.A sufficient condition for existence of the distributed optimal containment control protocol is derived.By introducing the parametric algebraic Riccati equation(PARE),it is strictly proved that the global performance index can be used to approximate the standard minimumenergy performance index as the parameters tends to infinity.In consequence,the standard minimum-energy cooperative containment control can be solved by local steady state feedback protocols. 展开更多
关键词 optimal INFINITY ALGEBRAIC
下载PDF
Joint Design of ISAC Waveform Under PAPR Constraints
8
作者 Chen Yating Wen Cai +4 位作者 Huang Yan Liang Le Li Jie Zhang Hui Hong Wei 《China Communications》 SCIE CSCD 2024年第7期186-211,共26页
In this paper,we formulate the precoding problem of integrated sensing and communication(ISAC)waveform as a non-convex quadratically constrained quadratic programming(QCQP),in which the weighted sum of communication m... In this paper,we formulate the precoding problem of integrated sensing and communication(ISAC)waveform as a non-convex quadratically constrained quadratic programming(QCQP),in which the weighted sum of communication multi-user interference(MUI)and the gap between dual-use waveform and ideal radar waveform is minimized with peak-toaverage power ratio(PAPR)constraints.We propose an efficient algorithm based on alternating direction method of multipliers(ADMM),which is able to decouple multiple variables and provide a closed-form solution for each subproblem.In addition,to improve the sensing performance in both spatial and temporal domains,we propose a new criteria to design the ideal radar waveform,in which the beam pattern is made similar to the ideal one and the integrated sidelobe level of the ambiguity function in each target direction is minimized in the region of interest.The limited memory Broyden-Fletcher-Goldfarb-Shanno(LBFGS)algorithm is applied to the design of the ideal radar waveform which works as a reference in the design of the dual-function waveform.Numerical results indicate that the designed dual-function waveform is capable of offering good communication quality of service(QoS)and sensing performance. 展开更多
关键词 ambiguity function integrated sensing and communication MIMO OFDM PAPR waveform design
下载PDF
Mitigation of Optical Multipath Interference Algorithms in IM-DD Transmission System
9
作者 Huo Jiahao Zhu Jin +4 位作者 Zhu Zuqing Zhang Xiaoying Liu Shaonan Tao Jianlong Wei Huangfu 《China Communications》 SCIE CSCD 2024年第4期1-9,共9页
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati... This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)systems.DA-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting factor.This paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and RF-M.Simulation results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated. 展开更多
关键词 IM-DD multipath interference PAM4
下载PDF
Emission and capture characteristics of deep hole trap in n-GaN by optical deep level transient spectroscopy
10
作者 Jin Sui Jiaxiang Chen +3 位作者 Haolan Qu Yu Zhang Xing Lu Xinbo Zou 《Journal of Semiconductors》 EI CAS CSCD 2024年第3期58-63,共6页
Emission and capture characteristics of a deep hole trap(H1)in n-GaN Schottky barrier diodes(SBDs)have been investigated by optical deep level transient spectroscopy(ODLTS).Activation energy(Eemi)and capture cross-sec... Emission and capture characteristics of a deep hole trap(H1)in n-GaN Schottky barrier diodes(SBDs)have been investigated by optical deep level transient spectroscopy(ODLTS).Activation energy(Eemi)and capture cross-section(σ_(p))of H1 are determined to be 0.75 eV and 4.67×10^(−15)cm^(2),respectively.Distribution of apparent trap concentration in space charge region is demonstrated.Temperature-enhanced emission process is revealed by decrease of emission time constant.Electricfield-boosted trap emission kinetics are analyzed by the Poole−Frenkel emission(PFE)model.In addition,H1 shows point defect capture properties and temperature-enhanced capture kinetics.Taking both hole capture and emission processes into account during laser beam incidence,H1 features a trap concentration of 2.67×10^(15)cm^(−3).The method and obtained results may facilitate understanding of minority carrier trap properties in wide bandgap semiconductor material and can be applied for device reliability assessment. 展开更多
关键词 GaN deep level transient spectroscopy minority carrier trap time constant trap concentration
下载PDF
Iterative physical optics method based on efficient occlusion judgment with bounding volume hierarchy technology
11
作者 Yang Su Yu-Mao Wu Jun Hu 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第1期1-12,共12页
This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the ... This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the original O(N^(3))to O(N^(2)logN).Numerical results show that the proposed method is more efficient than the traditional method.It is verified in multiple examples that the proposed method can complete the convergence of the current.Moreover,the proposed method avoids the error of judging the lit-shadow relationship based on the normal vector,which is beneficial to current iteration and convergence.Compared with the brute force method,the current method can improve the simulation efficiency by 2 orders of magnitude.The proposed method is more suitable for scattering problems in electrically large cavities and complex scenarios. 展开更多
关键词 Bounding volume hierarchy Cavity scattering Iterative physical optics(IPO)
下载PDF
Car-following strategy of intelligent connected vehicle using extended disturbance observer adjusted by reinforcement learning
12
作者 Ruidong Yan Penghui Li +2 位作者 Hongbo Gao Jin Huang Chengbo Wang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期365-373,共9页
Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based cont... Disturbance observer-based control method has achieved good results in the carfollowing scenario of intelligent and connected vehicle(ICV).However,the gain of conventional extended disturbance observer(EDO)-based control method is usually set manually rather than adjusted adaptively according to real time traffic conditions,thus declining the car-following performance.To solve this problem,a car-following strategy of ICV using EDO adjusted by reinforcement learning is proposed.Different from the conventional method,the gain of proposed strategy can be adjusted by reinforcement learning to improve its estimation accuracy.Since the“equivalent disturbance”can be compensated by EDO to a great extent,the disturbance rejection ability of the carfollowing method will be improved significantly.Both Lyapunov approach and numerical simulations are carried out to verify the effectiveness of the proposed method. 展开更多
关键词 adaptive system autonomous vehicle intelligent control
下载PDF
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
13
作者 M.Victoria Luzón Nuria Rodríguez-Barroso +5 位作者 Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期824-850,共27页
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ... When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications. 展开更多
关键词 Data privacy distributed machine learning federated learning software frameworks
下载PDF
Changes of the peripapillary vascular parameters inpremature infants without retinopathy of prematurityusing U-net segmentation
14
作者 Shuai Liu Lei Liu +2 位作者 Cui-Xia Ma Liu-Hui Huang Bin Li 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第8期1453-1461,共9页
AIM:To quantitatively assess the changes in mean vascular tortuosity(mVT)and mean vascular width(mVW)around the optic disc and their correlation with gestational age(GA)and birth weight(BW)in premature infants without... AIM:To quantitatively assess the changes in mean vascular tortuosity(mVT)and mean vascular width(mVW)around the optic disc and their correlation with gestational age(GA)and birth weight(BW)in premature infants without retinopathy of prematurity(ROP).METHODS:A single-center retrospective study included a total of 133(133 eyes)premature infants[mean corrected gestational age(CGA)43.6wk]without ROP as the premature group and 130(130 eyes)CGA-matched fullterm infants as the control group.The peripapillary mVT and mVW were quantitatively measured using computerassisted techniques.RESULTS:Premature infants had significantly higher mVT(P=0.0032)and lower mVW(P=0.0086)by 2.68(10^(4) cm^(-3))and 1.85μm,respectively.Subgroup analysis with GA showed significant differences(P=0.0244)in mVT between the early preterm and middle to late preterm groups,but the differences between mVW were not significant(P=0.6652).The results of the multiple linear regression model showed a significant negative correlation between GA and BW with mVT after adjusting sex and CGA(P=0.0211 and P=0.0006,respectively).For each day increase in GA at birth,mVT decreased by 0.1281(10^(4) cm^(-3))and for each 1 g increase in BW,mVT decreased by 0.006(10^(4) cm^(-3)).However,GA(P=0.9402)and BW(P=0.7275)were not significantly correlated with mVW.CONCLUSION:Preterm birth significantly affects the peripapillary vascular parameters that indicate higher mVT and narrower mVW in premature infants without ROP.Alterations in these parameters may provide new insights into the pathogenesis of ocular vascular disease. 展开更多
关键词 premature infants retinopathy of prematurity retinal vessels parameter computer-assisted techniques
下载PDF
Automatic detection of breast lesions in automated 3D breast ultrasound with cross-organ transfer learning
15
作者 Lingyun BAO Zhengrui HUANG +7 位作者 Zehui LIN Yue SUN Hui CHEN You LI Zhang LI Xiaochen YUAN Lin XU Tao TAN 《虚拟现实与智能硬件(中英文)》 EI 2024年第3期239-251,共13页
Background Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications,particularly in visual recognition tasks such as image and video analyses.There is a growing... Background Deep convolutional neural networks have garnered considerable attention in numerous machine learning applications,particularly in visual recognition tasks such as image and video analyses.There is a growing interest in applying this technology to diverse applications in medical image analysis.Automated three dimensional Breast Ultrasound is a vital tool for detecting breast cancer,and computer-assisted diagnosis software,developed based on deep learning,can effectively assist radiologists in diagnosis.However,the network model is prone to overfitting during training,owing to challenges such as insufficient training data.This study attempts to solve the problem caused by small datasets and improve model detection performance.Methods We propose a breast cancer detection framework based on deep learning(a transfer learning method based on cross-organ cancer detection)and a contrastive learning method based on breast imaging reporting and data systems(BI-RADS).Results When using cross organ transfer learning and BIRADS based contrastive learning,the average sensitivity of the model increased by a maximum of 16.05%.Conclusion Our experiments have demonstrated that the parameters and experiences of cross-organ cancer detection can be mutually referenced,and contrastive learning method based on BI-RADS can improve the detection performance of the model. 展开更多
关键词 Breast ultrasound Automated 3D breast ultrasound Breast cancers Deep learning Transfer learning Convolutional neural networks Computer-aided diagnosis Cross organ learning
下载PDF
Phase engineering of Ni-Mn binary layered oxide cathodes for sodiumion batteries
16
作者 Feifei Hong Xin Zhou +9 位作者 Xiaohong Liu Guilin Feng Heng Zhang Weifeng Fan Bin Zhang Meihua Zuo Wangyan Xing Ping Zhang Hua Yan Wei Xiang 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第4期501-511,共11页
Nickel-manganese binary layered oxides with high working potential and low cost are potential candidates for sodium-ion batteries,but their electrochemical properties are highly related to compositional diversity.Dive... Nickel-manganese binary layered oxides with high working potential and low cost are potential candidates for sodium-ion batteries,but their electrochemical properties are highly related to compositional diversity.Diverse composite materials with various phase structures of P3,P2/P3,P2,P2/O3,and P2/P3/O3 were synthesized by manipulating the sodium content and calcination conditions,leading to the construction of a synthetic phase diagram for Na_(x)Ni_(0.25)Mn_(0.75)O_(2)(0.45≤x≤1.1).Then,we compared the electrochemical characteristics and structural evolution during the desodiation/sodiation process of P2,P2/P3,P2/03,and P2/P3/O3-Na_(x)Ni_(0.25)Mn_(0.75)O_(2).Among them,P2/P3-Na0.75Ni0.25Mn0.75O2exhibits the best rate capability of 90.9 mA h g^(-1)at 5 C,with an initial discharge capacity of 142.62 mA h g^(-1)at 0.1 C and a capacity retention rate of 78.25%after 100 cycles at 1 C in the voltage range of 2-4.3 V.The observed superior sodium storage performance of P2/P3 hybrids compared to other composite phases can be attributed to the enhanced Na^(+)transfer dynamic,reduction of the Jahn-teller effect,and improved reaction reversibility induced by the synergistic effect of P2 and P3 phases.The systematic research and exploration of phases in Na_(x)Ni_(0.25)Mn_(0.75)O_(2)provide new sights into high-performance nickel-manganese binary layered oxide for sodium-ion batteries. 展开更多
关键词 Phase engineering Ni-Mn layered oxide CATHODE Sodium-ion batteries
下载PDF
Vein visualization enhancement by dual-wavelength phase-locked denoising technology
17
作者 Lihua Ruan Zhiqin Yin +4 位作者 Shibing Zhou Weibo Zheng Wei Lu Tao Zhang Shaowei Wang 《Journal of Innovative Optical Health Sciences》 SCIE EI CSCD 2024年第3期73-83,共11页
Visual near-infrared imaging equipment has broad applications in various fields such as venipuncture,facial injections,and safety verification due to its noncontact,compact,and portable design.Currently,most studies u... Visual near-infrared imaging equipment has broad applications in various fields such as venipuncture,facial injections,and safety verification due to its noncontact,compact,and portable design.Currently,most studies utilize near-infrared single-wavelength for image acquisition of veins.However,many substances in the skin,including water,protein,and melanin can create significant background noise,which hinders accurate detection.In this paper,we developed a dual-wavelength imaging system with phase-locked denoising technology to acquire vein image.The signals in the effective region are compared by using the absorption valley and peak of hemoglobin at 700nm and 940nm,respectively.The phase-locked denoising algorithm is applied to decrease the noise and interference of complex surroundings from the images.The imaging results of the vein are successfully extracted in complex noise environment.It is demonstrated that the denoising effect on hand veins imaging can be improved with 57.3%by using our dual-wavelength phase-locked denoising technology.Consequently,this work proposes a novel approach for venous imaging with dual-wavelengths and phase-locked denoising algorithm to extract venous imaging results in complex noisy environment better. 展开更多
关键词 DUAL-WAVELENGTH phase-locked denoising vein visualization enhancement.
下载PDF
The In-Flight Realtime Trigger and Localization Software of GECAM
18
作者 Xiao-Yun Zhao Shao-Lin Xiong +86 位作者 Xiang-Yang Wen Xin-Qiao Li Ce Cai Shuo Xiao Qi Luo Wen-Xi Peng Dong-Ya Guo Zheng-Hua An Ke Gong Jin-Yuan Liao Yan-Qiu Zhang Yue Huang Lu Li Xing Wen Fei Zhang Jing Duan Chen-Wei Wang Dong-Li Shi Peng Zhang Qi-Bin Yi Chao-Yang Li Yan-Bing Xu Xiao-Hua Liang Ya-Qing Liu Da-Li Zhang Xi-Lei Sun Fan Zhang Gang Chen Huan-Yu Wang Sheng Yang Xiao-Jing Liu Min Gao Mao-Shun Li Jin-Zhou Wang Xing Zhou Yi Zhao Wang-Chen Xue Chao Zheng Jia-Cong Liu Xing-Bo Han Jin-Ling Qi Jia Huang Ke-Ke Zhang Can Chen Xiong-Tao Yang Dong-Jie Hou Yu-Sa Wang Rui Qiao Xiang Ma Xiao-Bo Li Ping Wang Xin-Ying Song Li-Ming Song Shi-Jie Zheng Bing Li Hong-Mei Zhang Yue Zhu Wei Chen Jian-Jian He Zhen Zhang Jin Hou Hong-Jun Wang Yan-Chao Hao Xiang-Yu Wang Zong-Yuan Yang Zhi-Long Wen Zhi Chang Yuan-Yuan Du Rui Gao Xiao-Fei Lan Yan-Guo Li Gang Li Xu-Fang Li Fang-Jun Lu Hong Lu Bin Meng Feng Shi Hui Wang Hui-Zhen Wang Yu-Peng Xu Jia-Wei Yang Xue-Juan Yang Shuang-Nan Zhang Chao-Yue Zhang Cheng-Mo Zhang Zhi-Cheng Tang Cheng Cheng 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2024年第10期11-24,共14页
Realtime trigger and localization of bursts are the key functions of GECAM,an all-sky gamma-ray monitor launched on 2020 December 10.We developed a multifunctional trigger and localization software operating in the CP... Realtime trigger and localization of bursts are the key functions of GECAM,an all-sky gamma-ray monitor launched on 2020 December 10.We developed a multifunctional trigger and localization software operating in the CPU of the GECAM Electronic Box.This onboard software has the following features:high trigger efficiency for real celestial bursts with a suppression of false triggers caused by charged particle bursts and background fluctuation,dedicated localization algorithm optimized for both short and long bursts,and low time latency of the trigger information which is downlinked through the Global Short Message Communication service of the global BeiDou navigation system.This paper provides a detailed description of the design and development of the trigger and localization software system for GECAM.It covers the general design,workflow,the main functions,and the algorithms used in the system.The paper also includes on-ground trigger tests using simulated gamma-ray bursts generated by a dedicated X-ray tube,as well as an overview of the performance for real celestial bursts during its in-orbit operation. 展开更多
关键词 telescopes instrumentation:detectors methods:observational
下载PDF
Performance and Complexity Trade-Off between Short-Length Regular and Irregular LDPC
19
作者 Ziyuan Peng Ruizhe Yang 《Journal of Computer and Communications》 2024年第9期208-215,共8页
In this paper, both the high-complexity near-ML list decoding and the low-complexity belief propagation decoding are tested for some well-known regular and irregular LDPC codes. The complexity and performance trade-of... In this paper, both the high-complexity near-ML list decoding and the low-complexity belief propagation decoding are tested for some well-known regular and irregular LDPC codes. The complexity and performance trade-off is shown clearly and demonstrated with the paradigm of hybrid decoding. For regular LDPC code, the SNR-threshold performance and error-floor performance could be improved to the optimal level of ML decoding if the decoding complexity is progressively increased, usually corresponding to the near-ML decoding with progressively increased size of list. For irregular LDPC code, the SNR-threshold performance and error-floor performance could only be improved to a bottle-neck even with unlimited decoding complexity. However, with the technique of CRC-aided hybrid decoding, the ML performance could be greatly improved and approached with reasonable complexity thanks to the improved code-weight distribution from the concatenation of CRC and irregular LDPC code. Finally, CRC-aided 5GNR-LDPC code is evaluated and the capacity-approaching capability is shown. 展开更多
关键词 Regular LDPC Irregular LDPC Near-ML Decoding List Decoding Belief Propagation Algorithm Sum-Product Algorithm CRC-Aided Hybrid Decoding
下载PDF
Optimization and Innovation of the Operation Model of Mobile Social E-commerce under AI Empowerment:Taking the Female Community Platform“Little Red Book”as an Example
20
作者 Mi Liu Jia Yu +1 位作者 Yan Li Jun Zheng 《Proceedings of Business and Economic Studies》 2024年第4期269-274,共6页
This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Fi... This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises. 展开更多
关键词 Mobile social e-commerce Little Red Book Female community platform AI User experience UGC
下载PDF
上一页 1 2 61 下一页 到第
使用帮助 返回顶部