期刊文献+
共找到5,595篇文章
< 1 2 250 >
每页显示 20 50 100
Microstrip Patch Antenna with an Inverted T-Type Notch in the Partial Ground for Breast Cancer Detections
1
作者 Nure Alam Chowdhury Lulu Wang +2 位作者 Md Shazzadul Islam Linxia Gu Mehmet Kaya 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1301-1322,共22页
This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)... This study designs a microstrip patch antenna with an inverted T-type notch in the partial ground to detect tumorcells inside the human breast.The size of the current antenna is small enough(18mm×21mm×1.6mm)todistribute around the breast phantom.The operating frequency has been observed from6–14GHzwith a minimumreturn loss of−61.18 dB and themaximumgain of current proposed antenna is 5.8 dBiwhich is flexiblewith respectto the size of antenna.After the distribution of eight antennas around the breast phantom,the return loss curveswere observed in the presence and absence of tumor cells inside the breast phantom,and these observations showa sharp difference between the presence and absence of tumor cells.The simulated results show that this proposedantenna is suitable for early detection of cancerous cells inside the breast. 展开更多
关键词 Antenna microwave wideband cancer breast phantom tumor detection
下载PDF
Fraud detections for online businesses:a perspective from blockchain technology 被引量:2
2
作者 Yuanfeng Cai Dan Zhu 《Financial Innovation》 2016年第1期256-265,共10页
Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high ... Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high or low ratings to the system so as to promote their own products or demote their competitors.Method:This study explores the rating fraud by differentiating the subjective fraud from objective fraud.Then it discusses the effectiveness of blockchain technology in objective fraud and its limitation in subjective fraud,especially the rating fraud.Lastly,it systematically analyzes the robustness of blockchain-based reputation systems in each type of rating fraud.Results:The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves.We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals:ballot-stuffing and bad-mouthing,and various attack models including constant attack,camouflage attack,whitewashing attack and sybil attack.Blockchain-based reputation systems are more robust against bad-mouthing than ballot-stuffing fraud.Conclusions:Blockchain technology provides new opportunities for redesigning the reputation system.Blockchain systems are very effective in preventing objective information fraud,such as loan application fraud,where fraudulent information is fact-based.However,their effectiveness is limited in subjective information fraud,such as rating fraud,where the ground-truth is not easily validated.Blockchain systems are effective in preventing bad mouthing and whitewashing attack,but they are limited in detecting ballot-stuffing under sybil attack,constant attacks and camouflage attack. 展开更多
关键词 Blockchain Fraud detection Rating fraud Reputation systems
下载PDF
Superhydrophobic Surface-Assisted Preparation of Microspheres and Supraparticles and Their Applications
3
作者 Mengyao Pan Huijuan Shao +11 位作者 Yue Fan Jinlong Yang Jiaxin Liu Zhongqian Deng Zhenda Liu Zhidi Chen Jun Zhang Kangfeng Yi Yucai Su Dehui Wang Xu Deng Fei Deng 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第4期110-138,共29页
Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them... Superhydrophobic surface(SHS) has been well developed, as SHS renders the property of minimizing the water/solid contact interface. Water droplets deposited onto SHS with contact angles exceeding 150°, allow them to retain spherical shapes, and the low adhesion of SHS facilitates easy droplet collection when tilting the substrate. These characteristics make SHS suitable for a wide range of applications. One particularly promising application is the fabrication of microsphere and supraparticle materials. SHS offers a distinct advantage as a universal platform capable of providing customized services for a variety of microspheres and supraparticles. In this review, an overview of the strategies for fabricating microspheres and supraparticles with the aid of SHS, including cross-linking process, polymer melting,and droplet template evaporation methods, is first presented. Then, the applications of microspheres and supraparticles formed onto SHS are discussed in detail, for example, fabricating photonic devices with controllable structures and tunable structural colors, acting as catalysts with emerging or synergetic properties, being integrated into the biomedical field to construct the devices with different medicinal purposes, being utilized for inducing protein crystallization and detecting trace amounts of analytes. Finally,the perspective on future developments involved with this research field is given, along with some obstacles and opportunities. 展开更多
关键词 Superhydrophobic surface Microspheres and supraparticles Photonic devices CATALYSTS Biomedical and trace detections
下载PDF
Characteristics of Lightning Activity in Southeast China and its Relation to the Atmospheric Background
4
作者 支树林 朱杰 +1 位作者 刘岩 毛梦妮 《Journal of Tropical Meteorology》 SCIE 2024年第1期76-88,共13页
Based on the lightning observation data from the Fengyun-4A(FY-4A)Lightning Mapping Imager(FY-4A/LMI)and the Lightning Imaging Sensor(LIS)on the International Space Station(ISS),we extract the“event”type data as the... Based on the lightning observation data from the Fengyun-4A(FY-4A)Lightning Mapping Imager(FY-4A/LMI)and the Lightning Imaging Sensor(LIS)on the International Space Station(ISS),we extract the“event”type data as the lightning detection results.These observations are then compared with the cloud-to-ground(CG)lightning observation data from the China Meteorological Administration.This study focuses on the characteristics of lightning activity in Southeast China,primarily in Jiangxi Province and its adjacent areas,from April to September,2017–2022.In addition,with the fifth-generation European Centre for Medium-Range Weather Forecasts reanalysis data,we further delved into the potential factors influencing the distribution and variations in lightning activity and their primary related factors.Our findings indicate that the lightning frequency and density of the FY-4A/LMI,ISS-LIS and CG data are higher in southern and central Jiangxi,central Fujian Province,and western and central Guangdong Province,while they tend to be lower in eastern Hunan Province.In general,the high-value areas of lightning density for the FY-4A/LMI are located in inland mountainous areas.The lower the latitude is,the higher the CG lightning density is.High-value areas of the CG lightning density are more likely to be located in eastern Fujian and southeastern Zhejiang Province.However,the high-value areas of lightning density for the ISS-LIS are more dispersed,with a scattered distribution in inland mountainous areas and along the coast of eastern Fujian.Thus,the mountainous terrain is closely related to the high-value areas of the lightning density.The locations of the high-value areas of the lightning density for the FY-4A/LMI correspond well with those for the CG observations,and the seasonal variations are also consistent.In contrast,the distribution of the high-value areas of the lightning density for the ISS-LIS is more dispersed.The positions of the peak frequency of the FY-4A/LMI lightning and CG lightning contrast with local altitudes,primarily located at lower altitudes or near mountainsides.K-index and convective available potential energy(CAPE)can better reflect the local boundary layer conditions,where the lightning density is higher and lightning seasonal variations are apparent.There are strong correlations in the annual variations between the dew-point temperature(Td)and CG lightning frequency,and the monthly variations of the dew-point temperature and CAPE are also strongly correlated with monthly variations of CG lightning,while they are weakly correlated with the lightning frequency for the FY-4A/LMI and ISS-LIS.This result reflects that the CAPE shows a remarkable effect on the CG lightning frequency during seasonal transitions. 展开更多
关键词 LIGHTNING satellite and ground detections atmospheric background Southeast China
下载PDF
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops 被引量:1
5
作者 Jinbin Wang Yu Wang +7 位作者 Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期183-190,共8页
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSP... Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and efficient.In this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry1Ab/Ac was proposed and combined with a lateral flow immunochromatographic assay,named“Dual-RPA-LFD”,to visualize the dual detection of genetically modified(GM)crops.In which,the herbicide tolerance gene CP4-EPSPS and the insect resistance gene Cry1Ab/Ac were selected as targets taking into account the current status of the most widespread application of insect resistance and herbicide tolerance traits and their stacked traits.Gradient diluted plasmids,transgenic standards,and actual samples were used as templates to conduct sensitivity,specificity,and practicality assays,respectively.The constructed method achieved the visual detection of plasmid at levels as low as 100 copies,demonstrating its high sensitivity.In addition,good applicability to transgenic samples was observed,with no cross-interference between two test lines and no influence from other genes.In conclusion,this strategy achieved the expected purpose of simultaneous detection of the two popular targets in GM crops within 20 min at 37°C in a rapid,equipmentfree field manner,providing a new alternative for rapid screening for transgenic assays in the field. 展开更多
关键词 Genetically modifi ed crops On-site detection Lateral fl ow test strips Dual recombinase polymerase amplification (RPA)
下载PDF
Analysis of the joint detection capability of the SMILE satellite and EISCAT-3D radar 被引量:1
6
作者 JiaoJiao Zhang TianRan Sun +7 位作者 XiZheng Yu DaLin Li Hang Li JiaQi Guo ZongHua Ding Tao Chen Jian Wu Chi Wang 《Earth and Planetary Physics》 EI CSCD 2024年第1期299-306,共8页
The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology... The Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite is a small magnetosphere–ionosphere link explorer developed cooperatively between China and Europe.It pioneers the use of X-ray imaging technology to perform large-scale imaging of the Earth’s magnetosheath and polar cusp regions.It uses a high-precision ultraviolet imager to image the overall configuration of the aurora and monitor changes in the source of solar wind in real time,using in situ detection instruments to improve human understanding of the relationship between solar activity and changes in the Earth’s magnetic field.The SMILE satellite is scheduled to launch in 2025.The European Incoherent Scatter Sciences Association(EISCAT)-3D radar is a new generation of European incoherent scatter radar constructed by EISCAT and is the most advanced ground-based ionospheric experimental device in the high-latitude polar region.It has multibeam and multidirectional quasi-real-time three-dimensional(3D)imaging capabilities,continuous monitoring and operation capabilities,and multiple-baseline interferometry capabilities.Joint detection by the SMILE satellite and the EISCAT-3D radar is of great significance for revealing the coupling process of the solar wind–magnetosphere–ionosphere.Therefore,we performed an analysis of the joint detection capability of the SMILE satellite and EISCAT-3D,analyzed the period during which the two can perform joint detection,and defined the key scientific problems that can be solved by joint detection.In addition,we developed Web-based software to search for and visualize the joint detection period of the SMILE satellite and EISCAT-3D radar,which lays the foundation for subsequent joint detection experiments and scientific research. 展开更多
关键词 Solar wind Magnetosphere Ionosphere Link Explorer(SMILE)satellite European Incoherent Scatter Sciences Association(EISCAT)-3D radar joint detection
下载PDF
A self-organization formation configuration based assignment probability and collision detection
7
作者 SONG Wei WANG Tong +1 位作者 YANG Guangxin ZHANG Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期222-232,共11页
The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment pro... The formation control of multiple unmanned aerial vehicles(multi-UAVs)has always been a research hotspot.Based on the straight line trajectory,a multi-UAVs target point assignment algorithm based on the assignment probability is proposed to achieve the shortest overall formation path of multi-UAVs with low complexity and reduce the energy consumption.In order to avoid the collision between UAVs in the formation process,the concept of safety ball is introduced,and the collision detection based on continuous motion of two time slots and the lane occupation detection after motion is proposed to avoid collision between UAVs.Based on the idea of game theory,a method of UAV motion form setting based on the maximization of interests is proposed,including the maximization of self-interest and the maximization of formation interest is proposed,so that multi-UAVs can complete the formation task quickly and reasonably with the linear trajectory assigned in advance.Finally,through simulation verification,the multi-UAVs target assignment algorithm based on the assignment probability proposed in this paper can effectively reduce the total path length,and the UAV motion selection method based on the maximization interests can effectively complete the task formation. 展开更多
关键词 straight line trajectory assignment probability collision detection lane occupation detection maximization of interests
下载PDF
SDH-FCOS:An Efficient Neural Network for Defect Detection in Urban Underground Pipelines
8
作者 Bin Zhou Bo Li +2 位作者 Wenfei Lan Congwen Tian Wei Yao 《Computers, Materials & Continua》 SCIE EI 2024年第1期633-652,共20页
Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect... Urban underground pipelines are an important infrastructure in cities,and timely investigation of problems in underground pipelines can help ensure the normal operation of cities.Owing to the growing demand for defect detection in urban underground pipelines,this study developed an improved defect detection method for urban underground pipelines based on fully convolutional one-stage object detector(FCOS),called spatial pyramid pooling-fast(SPPF)feature fusion and dual detection heads based on FCOS(SDH-FCOS)model.This study improved the feature fusion component of the model network based on FCOS,introduced an SPPF network structure behind the last output feature layer of the backbone network,fused the local and global features,added a top-down path to accelerate the circulation of shallowinformation,and enriched the semantic information acquired by shallow features.The ability of the model to detect objects with multiple morphologies was strengthened by introducing dual detection heads.The experimental results using an open dataset of underground pipes show that the proposed SDH-FCOS model can recognize underground pipe defects more accurately;the average accuracy was improved by 2.7% compared with the original FCOS model,reducing the leakage rate to a large extent and achieving real-time detection.Also,our model achieved a good trade-off between accuracy and speed compared with other mainstream methods.This proved the effectiveness of the proposed model. 展开更多
关键词 Urban underground pipelines defect detection SDH-FCOS feature fusion SPPF dual detection heads
下载PDF
Target Detection Algorithm in Foggy Scenes Based on Dual Subnets
9
作者 Yuecheng Yu Liming Cai +3 位作者 Anqi Ning Jinlong Shi Xudong Chen Shixin Huang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1915-1931,共17页
Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the ima... Under the influence of air humidity,dust,aerosols,etc.,in real scenes,haze presents an uneven state.In this way,the image quality and contrast will decrease.In this case,It is difficult to detect the target in the image by the universal detection network.Thus,a dual subnet based on multi-task collaborative training(DSMCT)is proposed in this paper.Firstly,in the training phase,the Gated Context Aggregation Network(GCANet)is used as the supervisory network of YOLOX to promote the extraction of clean information in foggy scenes.In the test phase,only the YOLOX branch needs to be activated to ensure the detection speed of the model.Secondly,the deformable convolution module is used to improve GCANet to enhance the model’s ability to capture details of non-homogeneous fog.Finally,the Coordinate Attention mechanism is introduced into the Vision Transformer and the backbone network of YOLOX is redesigned.In this way,the feature extraction ability of the network for deep-level information can be enhanced.The experimental results on artificial fog data set FOG_VOC and real fog data set RTTS show that the map value of DSMCT reached 86.56%and 62.39%,respectively,which was 2.27%and 4.41%higher than the current most advanced detection model.The DSMCT network has high practicality and effectiveness for target detection in real foggy scenes. 展开更多
关键词 Target detection fog target detection YOLOX twin network multi-task learning
下载PDF
An improved initial rotor position estimation method using high-frequency pulsating voltage injection for PMSM
10
作者 Yang Jiang Ming Cheng 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期19-29,共11页
High frequency pulsating voltage injection method is a good candidate for detecting the initial rotor position of permanent magnet synchronous motor.However,traditional methods require a large number of filters,which ... High frequency pulsating voltage injection method is a good candidate for detecting the initial rotor position of permanent magnet synchronous motor.However,traditional methods require a large number of filters,which leads to the deterioration of system stability and dynamic performance.In order to solve these problems,a new signal demodulation method is proposed in this paper.The proposed new method can directly obtain the amplitude of high-frequency current,thus eliminating the use of filters,improving system stability and dynamic performance and saving the work of adjusting filter parameters.In addition,a new magnetic polarity detection method is proposed,which is robust to current measurement noise.Finally,experiments verify the effectiveness of the method. 展开更多
关键词 Initial position detection Signal demodulation algorithm Magnetic polarity detection Filter elimination
下载PDF
Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method
11
作者 CaiMing Liu Yan Zhang +1 位作者 Zhihui Hu Chunming Xie 《Computers, Materials & Continua》 SCIE EI 2024年第2期2361-2389,共29页
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune de... Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune detection model for network intrusion data based on a quantitative matching method.The proposed model defines the detection process by using network data and decimal values to express features and artificial immune mechanisms are simulated to define immune elements.Then,to improve the accuracy of similarity calculation,a quantitative matching method is proposed.The model uses mathematical methods to train and evolve immune elements,increasing the diversity of immune recognition and allowing for the successful detection of unknown intrusions.The proposed model’s objective is to accurately identify known intrusions and expand the identification of unknown intrusions through signature detection and immune detection,overcoming the disadvantages of traditional methods.The experiment results show that the proposed model can detect intrusions effectively.It has a detection rate of more than 99.6%on average and a false alarm rate of 0.0264%.It outperforms existing immune intrusion detection methods in terms of comprehensive detection performance. 展开更多
关键词 Immune detection network intrusion network data signature detection quantitative matching method
下载PDF
Robust Space-Time Adaptive Track-Before-Detect Algorithm Based on Persymmetry and Symmetric Spectrum
12
作者 Xiaojing Su Da Xu +1 位作者 Dongsheng Zhu Zhixun Ma 《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期65-74,共10页
Underwater monopulse space-time adaptive track-before-detect method,which combines space-time adaptive detector(STAD)and the track-before-detect algorithm based on dynamic programming(DP-TBD),denoted as STAD-DP-TBD,ca... Underwater monopulse space-time adaptive track-before-detect method,which combines space-time adaptive detector(STAD)and the track-before-detect algorithm based on dynamic programming(DP-TBD),denoted as STAD-DP-TBD,can effectively detect low-speed weak targets.However,due to the complexity and variability of the underwater environment,it is difficult to obtain sufficient secondary data,resulting in a serious decline in the detection and tracking performance,and leading to poor robustness of the algorithm.In this paper,based on the adaptive matched filter(AMF)test and the RAO test,underwater monopulse AMF-DP-TBD algorithm and RAO-DP-TBD algorithm which incorporate persymmetry and symmetric spectrum,denoted as PSAMF-DP-TBD and PS-RAO-DP-TBD,are proposed and compared with the AMF-DP-TBD algorithm and RAO-DP-TBD algorithm based on persymmetry array,denoted as P-AMF-DP-TBD and P-RAO-DP-TBD.The simulation results show that the four methods can work normally with sufficient secondary data and slightly insufficient secondary data,but when the secondary data is severely insufficient,the P-AMF-DP-TBD and P-RAO-DP-TBD algorithms has failed while the PSAMF-DP-TBD and PS-RAO-DP-TBD algorithms still have good detection and tracking capabilities. 展开更多
关键词 space-time adaptive detection track before detect ROBUSTNESS persymmetric property symmetric spectrum AMF test RAO test
下载PDF
Identification of earthquake induced structural damage based on synchroextracting transform
13
作者 Roshan Kumar Gaurav Kumar +4 位作者 Wei Zhao Arvind R Yadav Gang Yu Jayendra Kumar Evans Amponsah 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第2期475-487,共13页
Several popular time-frequency techniques,including the Wigner-Ville distribution,smoothed pseudo-Wigner-Ville distribution,wavelet transform,synchrosqueezing transform,Hilbert-Huang transform,and Gabor-Wigner transfo... Several popular time-frequency techniques,including the Wigner-Ville distribution,smoothed pseudo-Wigner-Ville distribution,wavelet transform,synchrosqueezing transform,Hilbert-Huang transform,and Gabor-Wigner transform,are investigated to determine how well they can identify damage to structures.In this work,a synchroextracting transform(SET)based on the short-time Fourier transform is proposed for estimating post-earthquake structural damage.The performance of SET for artificially generated signals and actual earthquake signals is examined with existing methods.Amongst other tested techniques,SET improves frequency resolution to a great extent by lowering the influence of smearing along the time-frequency plane.Hence,interpretation and readability with the proposed method are improved,and small changes in the time-varying frequency characteristics of the damaged buildings are easily detected through the SET method. 展开更多
关键词 CROSS-TERM damage detection earthquake signal synchroextracting transform TIME-FREQUENCY
下载PDF
Finite element model updating for structural damage detection using transmissibility data
14
作者 Ahmad Izadi Akbar Esfandiari 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期87-101,共15页
This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method ... This paper presents a new finite element model updating method for estimating structural parameters and detecting structural damage location and severity based on the structural responses(output-only data).The method uses the sensitivity relation of transmissibility data through a least-squares algorithm and appropriate normalization of the extracted equations.The proposed transmissibility-based sensitivity equation produces a more significant number of equations than the sensitivity equations based on the frequency response function(FRF),which can estimate the structural parameters with higher accuracy.The abilities of the proposed method are assessed by using numerical data of a two-story two-bay frame model and a plate structure model.In evaluating different damage cases,the number,location,and stiffness reduction of the damaged elements and the severity of the simulated damage have been accurately identified.The reliability and stability of the presented method against measurement and modeling errors are examined using error-contaminated data.The parameter estimation results prove the method’s capabilities as an accurate model updating algorithm. 展开更多
关键词 damage detection model updating output-only TRANSMISSIBILITY sensitivity equation
下载PDF
Strengthening Network Security: Deep Learning Models for Intrusion Detectionwith Optimized Feature Subset and Effective Imbalance Handling
15
作者 Bayi Xu Lei Sun +2 位作者 Xiuqing Mao Chengwei Liu Zhiyi Ding 《Computers, Materials & Continua》 SCIE EI 2024年第2期1995-2022,共28页
In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prep... In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security.This paper presents a novel intrusion detection system consisting of a data prepro-cessing stage and a deep learning model for accurately identifying network attacks.We have proposed four deep neural network models,which are constructed using architectures such as Convolutional Neural Networks(CNN),Bi-directional Long Short-Term Memory(BiLSTM),Bidirectional Gate Recurrent Unit(BiGRU),and Attention mechanism.These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the models,we apply various preprocessing techniques and employ the particle swarm optimization algorithm to perform feature selection on the NSL-KDD dataset,resulting in an optimized feature subset.Moreover,we address class imbalance in the dataset using focal loss.Finally,we employ the BO-TPE algorithm to optimize the hyperparameters of the four models,maximizing their detection performance.The test results demonstrate that the proposed model is capable of extracting the spatiotemporal features of network traffic data effectively.In binary and multiclass experiments,it achieved accuracy rates of 0.999158 and 0.999091,respectively,surpassing other state-of-the-art methods. 展开更多
关键词 Intrusion detection CNN BiLSTM BiGRU ATTENTION
下载PDF
Improving Federated Learning through Abnormal Client Detection and Incentive
16
作者 Hongle Guo Yingchi Mao +3 位作者 Xiaoming He Benteng Zhang Tianfu Pang Ping Ping 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期383-403,共21页
Data sharing and privacy protection are made possible by federated learning,which allows for continuous model parameter sharing between several clients and a central server.Multiple reliable and high-quality clients m... Data sharing and privacy protection are made possible by federated learning,which allows for continuous model parameter sharing between several clients and a central server.Multiple reliable and high-quality clients must participate in practical applications for the federated learning global model to be accurate,but because the clients are independent,the central server cannot fully control their behavior.The central server has no way of knowing the correctness of the model parameters provided by each client in this round,so clients may purposefully or unwittingly submit anomalous data,leading to abnormal behavior,such as becoming malicious attackers or defective clients.To reduce their negative consequences,it is crucial to quickly detect these abnormalities and incentivize them.In this paper,we propose a Federated Learning framework for Detecting and Incentivizing Abnormal Clients(FL-DIAC)to accomplish efficient and security federated learning.We build a detector that introduces an auto-encoder for anomaly detection and use it to perform anomaly identification and prevent the involvement of abnormal clients,in particular for the anomaly client detection problem.Among them,before the model parameters are input to the detector,we propose a Fourier transform-based anomaly data detectionmethod for dimensionality reduction in order to reduce the computational complexity.Additionally,we create a credit scorebased incentive structure to encourage clients to participate in training in order tomake clients actively participate.Three training models(CNN,MLP,and ResNet-18)and three datasets(MNIST,Fashion MNIST,and CIFAR-10)have been used in experiments.According to theoretical analysis and experimental findings,the FL-DIAC is superior to other federated learning schemes of the same type in terms of effectiveness. 展开更多
关键词 Federated learning abnormal clients INCENTIVE credit score abnormal score DETECTION
下载PDF
Determination of uncertainties of geomechanical parameters of metamorphic rocks using petrographic analyses
17
作者 Behzad Dastjerdy Ali Saeidi Shahriyar Heidarzadeh 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第2期345-364,共20页
Geomechanical parameters of intact metamorphic rocks determined from laboratory testing remain highly uncertain because of the great intrinsic variability associated with the degrees of metamorphism.The aim of this pa... Geomechanical parameters of intact metamorphic rocks determined from laboratory testing remain highly uncertain because of the great intrinsic variability associated with the degrees of metamorphism.The aim of this paper is to develop a proper methodology to analyze the uncertainties of geomechanical characteristics by focusing on three domains,i.e.data treatment process,schistosity angle,and mineralogy.First,the variabilities of the geomechanical laboratory data of Westwood Mine(Quebec,Canada)were examined statistically by applying different data treatment techniques,through which the most suitable outlier methods were selected for each parameter using multiple decision-making criteria and engineering judgment.Results indicated that some methods exhibited better performance in identifying the possible outliers,although several others were unsuccessful because of their limitation in large sample size.The well-known boxplot method might not be the best outlier method for most geomechanical parameters because its calculated confidence range was not acceptable according to engineering judgment.However,several approaches,including adjusted boxplot,2MADe,and 2SD,worked very well in the detection of true outliers.Also,the statistical tests indicate that the best-fitting probability distribution function for geomechanical intact parameters might not be the normal distribution,unlike what is assumed in most geomechanical studies.Moreover,the negative effects of schistosity angle on the uniaxial compressive strength(UCS)variabilities were reduced by excluding the samples within a specific angle range where the UCS data present the highest variation.Finally,a petrographic analysis was conducted to assess the associated uncertainties such that a logical link was found between the dispersion and the variabilities of hard and soft minerals. 展开更多
关键词 Intact rock parameters Natural variabilities Outlier detection methods UNCERTAINTIES Westwood mine MINERALOGY
下载PDF
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
18
作者 Ahmed Barnawi Krishan Kumar +2 位作者 Neeraj Kumar Bander Alzahrani Amal Almansour 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2117-2137,共21页
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human lives.The detonation of these landmines results in thousands of casualties repo... Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human lives.The detonation of these landmines results in thousands of casualties reported worldwide annually.Therefore,there is a pressing need to employ diverse landmine detection techniques for their removal.One effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic field.It can generate a contour plot or heat map that visually represents the magnetic field strength.Despite the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith risks.Edge computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine detection.By processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field data.It enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the process.Furthermore,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during transmission.This paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and localization.We have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset traces.By simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry images.The trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%. 展开更多
关键词 CNN deep learning landmine detection MAGNETOMETER mean average precision UAV
下载PDF
Development of a High-throughput Sequencing Platform for Detection of Viral Encephalitis Pathogens Based on Amplicon Sequencing
19
作者 ZHANG Ya Li SU Wen Zhe +16 位作者 WANG Rui Chen LI Yan ZHANG Jun Feng LIU Sheng Hui HU Dan He XU Chong Xiao YIN Jia Yu YIN Qi Kai HE Ying LI Fan FU Shi Hong NIE Kai LIANG Guo Dong TAO Yong XU Song Tao MA Chao Feng WANG Huan Yu 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2024年第3期294-302,共9页
Objective Viral encephalitis is an infectious disease severely affecting human health.It is caused by a wide variety of viral pathogens,including herpes viruses,flaviviruses,enteroviruses,and other viruses.The laborat... Objective Viral encephalitis is an infectious disease severely affecting human health.It is caused by a wide variety of viral pathogens,including herpes viruses,flaviviruses,enteroviruses,and other viruses.The laboratory diagnosis of viral encephalitis is a worldwide challenge.Recently,high-throughput sequencing technology has provided new tools for diagnosing central nervous system infections.Thus,In this study,we established a multipathogen detection platform for viral encephalitis based on amplicon sequencing.Methods We designed nine pairs of specific polymerase chain reaction(PCR)primers for the 12 viruses by reviewing the relevant literature.The detection ability of the primers was verified by software simulation and the detection of known positive samples.Amplicon sequencing was used to validate the samples,and consistency was compared with Sanger sequencing.Results The results showed that the target sequences of various pathogens were obtained at a coverage depth level greater than 20×,and the sequence lengths were consistent with the sizes of the predicted amplicons.The sequences were verified using the National Center for Biotechnology Information BLAST,and all results were consistent with the results of Sanger sequencing.Conclusion Amplicon-based high-throughput sequencing technology is feasible as a supplementary method for the pathogenic detection of viral encephalitis.It is also a useful tool for the high-volume screening of clinical samples. 展开更多
关键词 Viral encephalitis Amplicon sequencing High-throughput sequencing Multipathogen detection
下载PDF
Overview of radar detection methods for low altitude targets in marine environments
20
作者 YANG Yong YANG Boyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期1-13,共13页
In this paper,a comprehensive overview of radar detection methods for low-altitude targets in maritime environments is presented,focusing on the challenges posed by sea clutter and multipath scattering.The performance... In this paper,a comprehensive overview of radar detection methods for low-altitude targets in maritime environments is presented,focusing on the challenges posed by sea clutter and multipath scattering.The performance of the radar detection methods under sea clutter,multipath,and combined conditions is categorized and summarized,and future research directions are outlined to enhance radar detection performance for low-altitude targets in maritime environments. 展开更多
关键词 RADAR sea clutter multipath scattering detection low altitude target
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部