首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
为了解在线学习者在遭遇高程度认知冲突网络学习行为的变化,并探究免传感器条件下基于行为序列的预测模型在识别正遭遇认知冲突的学习者的可行性,本文通过聚类分析和过程挖掘,研究了学习者的资源访问模式具有的差异化特点.研究发现,当学习者遭遇高程度的认知冲突时,两者均表现出了大量的回溯型导航行为,但其行为模式仍保持固有的学习策略,并基于学习者的资源访问序列构建认知冲突识别模型.实验结果验证了该方法的可行性.  相似文献   

2.
在评分记录的识别处理中,如何快速、准确地识别出记录结果并不容易.针对实际应用解释了采用分档次评分方式的原因,讨论了应用图像处理技术来识别评分记录时的难点,提出了基于分档的识别方法.试验结果表明,提出的方法能保证识别过程的准确性与灵敏度,且符合比赛评分的实时性要求.  相似文献   

3.
需要进行人体异常行为识别的视频一般都是未标记的序列图像,传统的有监督的识别方法往往不能较好地反映其行为的特征,识别率不高.提出了一种基于半监督学习的人体异常行为识别方法,首先使用基于DTW距离的self-training进行标记数据扩充,然后用此扩充的序列图像样本集合训练对应的HMM,最终进行异常行为识别.实验结果证明该方法有效且识别率较高.  相似文献   

4.
针对传统行为识别方法仅利用底层特征识别的不足,提出了一种将动作属性与贝叶斯网络相结合的行为识别方法.首先,提取视频中的时空兴趣点及其3D-SIFT特征描述符,用词袋的方法建立时空词典对视频序列进行表示;然后,利用底层特征训练属性分类器,构造由底层特征到高层特征的映射,将底层特征样本经过属性分类器后得到行为—属性的样本信息,并采用MAP(最大后验概率)准则学习贝叶斯网络结构,从而建立一种基于属性贝叶斯网络的行为识别模型.实验结果表明该模型能有效地进行行为识别.  相似文献   

5.
异常行为识别与检测在安防领域有广泛的应用前景,但现有的异常行为识别方法时序信息利用率低,准确率和处理速度还难以满足实际需要.本文采用三维密集连接深度网络结构对采集视频的时序和空间特征进行基于深度学习的建模,对打架、徘徊、抢劫这三类异常行为以及正常行为类进行识别,采用多个可变时序深度的卷积核,并结合深度可分离卷积层重新设计了时序过渡层,更多地利用输入信号中的时序信息.模拟实验结果表明,本文提出的改进方法准确率达92.5%,进一步提高了模型的准确率和泛化性能.  相似文献   

6.
大多数针对恶意软件识别的研究都是基于应用程序接口(Application Program Interface,API)调用来实现的,但是目前基于API的研究大都没有考虑到设备的状态,设备状态能够直接体现程序运行的外部环境,这对分析应用的行为有着重要作用。本文提出一种基于传感器的应用行为识别技术,首先,通过传感器数据来判断设备实时状态;然后,结合API调用时序和图形用户界面(Graphic User Interface,GUI)首屏时序产生的多元时序数据,设计算法识别应用行为的恶意性;最后,设计实现包括静态打桩、动态行为监控和传感器实时状态采集的恶意行为分析原型系统,选取典型案例验证了本文提出方法的准确性,并通过黑盒测试验证了本文恶意应用识别方法的有效性。  相似文献   

7.
网络协议流量识别旨在识别流量所属的网络应用或者协议,进而及时发现和处理网络故障和安全漏洞,提高网络服务质量和保障网络空间安全.首先总结4种主要网络协议流量识别方法:基于行为的识别方法、基于负载随机性的识别方法、基于有效负载的识别方法和基于统计学特征的识别方法;然后分别基于在线加密流量、在线非加密流量、离线加密流量和离线非加密流量4种应用场景,对相关研究成果进行归类总结和讨论;最后总结全文并展望未来网络协议流量识别方法的研究方向.  相似文献   

8.
人体行为识别是计算机视觉领域研究的一个热点,为了提高视频中的人体行为识别的准确率,提出了一种基于3D卷积神经网络的行为识别方法,首先构建3D CNN模型,通过三维卷积核,来提取视频中人体行为的时-空域信息,最终并在UCF-101数据集上进行训练与测试,证明了该方法具有较好的识别效果。  相似文献   

9.
采用基于独立子空间分析(ISA)模型与神经网络理论形成的ISA深度网络模型特征提取方法,并结合数据预处理方法、K-means聚类方法以及支持向量机(SVM)分类器等实现对视频人体行为的分类识别.将本研究方法应用到Hollywood2人体行为数据集上进行人体行为识别实验,并与其他常用人体行为特征提取和识别方法进行对比,实验结果验证了本研究方法在人体行为分类识别中的有效性.  相似文献   

10.
针对印制板编程对象的特点,提出了一种利用计算视觉系统实现计算机自动提取特征与打孔信息的方法,讨论了特征的提取与分析过程,设计了基于二值图像的滤波技术和基于重心的位置识别方法,在增强抗算法抗干扰能力的同时也提高了识别精度,并讨论了输出数据的格式.系统投运效果说明,该系统分辨清晰度更好、控制精度高,对硬件要求低、编程效率高,相当于人工编程速度的20倍.  相似文献   

11.
The discovery of the prolific Ordovician Red River reservoirs in 1995 in southeastern Saskatchewan was the catalyst for extensive exploration activity which resulted in the discovery of more than 15 new Red River pools. The best yields of Red River production to date have been from dolomite reservoirs. Understanding the processes of dolomitization is, therefore, crucial for the prediction of the connectivity, spatial distribution and heterogeneity of dolomite reservoirs.The Red River reservoirs in the Midale area consist of 3~4 thin dolomitized zones, with a total thickness of about 20 m, which occur at the top of the Yeoman Formation. Two types of replacement dolomite were recognized in the Red River reservoir: dolomitized burrow infills and dolomitized host matrix. The spatial distribution of dolomite suggests that burrowing organisms played an important role in facilitating the fluid flow in the backfilled sediments. This resulted in penecontemporaneous dolomitization of burrow infills by normal seawater. The dolomite in the host matrix is interpreted as having occurred at shallow burial by evaporitic seawater during precipitation of Lake Almar anhydrite that immediately overlies the Yeoman Formation. However, the low δ18O values of dolomited burrow infills (-5.9‰~ -7.8‰, PDB) and matrix dolomites (-6.6‰~ -8.1‰, avg. -7.4‰ PDB) compared to the estimated values for the late Ordovician marine dolomite could be attributed to modification and alteration of dolomite at higher temperatures during deeper burial, which could also be responsible for its 87Sr/86Sr ratios (0.7084~0.7088) that are higher than suggested for the late Ordovician seawaters (0.7078~0.7080). The trace amounts of saddle dolomite cement in the Red River carbonates are probably related to "cannibalization" of earlier replacement dolomite during the chemical compaction.  相似文献   

12.
AcomputergeneratorforrandomlylayeredstructuresYUJia shun1,2,HEZhen hua2(1.TheInstituteofGeologicalandNuclearSciences,NewZealand;2.StateKeyLaboratoryofOilandGasReservoirGeologyandExploitation,ChengduUniversityofTechnology,China)Abstract:Analgorithmisintrod…  相似文献   

13.
本文叙述了对海南岛及其毗邻大陆边缘白垩纪到第四纪地层岩石进行古地磁研究的全部工作过程。通过分析岩石中剩余磁矢量的磁偏角及磁倾角的变化,提出海南岛白垩纪以来经历的构造演化模式如下:早期伴随顺时针旋转而向南迁移,后期伴随逆时针转动并向北运移。联系该地区及邻区的地质、地球物理资料,对海南岛上述的构造地体运动提出以下认识:北部湾内早期有一拉张作用,主要是该作用使湾内地壳显著伸长减薄,形成北部湾盆地。从而导致了海南岛的早期构造运动,而海南岛后期的构造运动则主要是受南海海底扩张的影响。海南地体运动规律的阐明对于了解北部湾油气盆地的形成演化有重要的理论和实际意义。  相似文献   

14.
Various applications relevant to the exciton dynamics,such as the organic solar cell,the large-area organic light-emitting diodes and the thermoelectricity,are operating under temperature gradient.The potential abnormal behavior of the exicton dynamics driven by the temperature difference may affect the efficiency and performance of the corresponding devices.In the above situations,the exciton dynamics under temperature difference is mixed with  相似文献   

15.
The elongation method,originally proposed by Imamura was further developed for many years in our group.As a method towards O(N)with high efficiency and high accuracy for any dimensional systems.This treatment designed for one-dimensional(ID)polymers is now available for three-dimensional(3D)systems,but geometry optimization is now possible only for 1D-systems.As an approach toward post-Hartree-Fock,it was also extended to  相似文献   

16.
17.
The explosive growth of the Internet and database applications has driven database to be more scalable and available, and able to support on-line scaling without interrupting service. To support more client's queries without downtime and degrading the response time, more nodes have to be scaled up while the database is running. This paper presents the overview of scalable and available database that satisfies the above characteristics. And we propose a novel on-line scaling method. Our method improves the existing on-line scaling method for fast response time and higher throughputs. Our proposed method reduces unnecessary network use, i.e. , we decrease the number of data copy by reusing the backup data. Also, our on-line scaling operation can be processed parallel by selecting adequate nodes as new node. Our performance study shows that our method results in significant reduction in data copy time.  相似文献   

18.
R-Tree is a good structure for spatial searching. But in this indexing structure,either the sequence of nodes in the same level or sequence of traveling these nodes when queries are made is random. Since the possibility that the object appears in different MBR which have the same parents node is different, if we make the subnode who has the most possibility be traveled first, the time cost will be decreased in most of the cases. In some case, the possibility of a point belong to a rectangle will shows direct proportion with the size of the rectangle. But this conclusion is based on an assumption that the objects are symmetrically distributing in the area and this assumption is not always coming into existence. Now we found a more direct parameter to scale the possibility and made a little change on the structure of R-tree, to increase the possibility of founding the satisfying answer in the front sub trees. We names this structure probability based arranged R-tree (PBAR-tree).  相似文献   

19.
The geographic information service is enabled by the advancements in general Web service technology and the focused efforts of the OGC in defining XML-based Web GIS service. Based on these models, this paper addresses the issue of services chaining,the process of combining or pipelining results from several interoperable GIS Web Services to create a customized solution. This paper presents a mediated chaining architecture in which a specific service takes responsibility for performing the process that describes a service chain. We designed the Spatial Information Process Language (SIPL) for dynamic modeling and describing the service chain, also a prototype of the Spatial Information Process Execution Engine (SIPEE) is implemented for executing processes written in SIPL. Discussion of measures to improve the functionality and performance of such system will be included.  相似文献   

20.
Advances in wireless technologies and positioning technologies and spread of wireless devices, an interest in LBS (Location Based Service) is arising. To provide location based service, tracking data should have been stored in moving object database management system (called MODBMS) with proper policies and managed efficiently. So the methods which acquire the location information at regular time intervals then, store and manage have been studied. In this paper, we suggest tracking data management techniques using topology that is corresponding to the moving path of moving object. In our techniques, we update the MODBMS when moving object arrived at a street intersection or a curved road which is represented as the node in topology and predict the location at past and future with attribute of topology and linear function. In this technique, location data that are corresponding to the node in topology are stored, thus reduce the number of update and amount of data. Also in case predicting the location,because topology are used as well as existing location information, accuracy for prediction is increased than applying linear function or spline function.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号