Satellite remote sensing will have certain errors in data retrieval accuracy, which requires further ground observation verification. This paper examines and verifies 2019 Jiangsu provincial Ground-level monitoring da...
Satellite remote sensing will have certain errors in data retrieval accuracy, which requires further ground observation verification. This paper examines and verifies 2019 Jiangsu provincial Ground-level monitoring data and TROPOMI data to evaluate the applicability of TROPOMI tropospheric NO2 Vertical Column Density (VCD) data and compares the results to OMI dataanalysis verification results. The results show that the correlation coefficient r between the TROPOMI NO2 data and Ground-level monitoring data at the monthly mean scale is as high as 0.9, and consistent seasonal cyclic changes are observed. The correlation between Ground-level monitoring data and OMI NO2 data is lower than TROPOMI (r=0.78 < 0.9). Compared to OMI satellites, the TROPOMI attains a smaller deviation in tropospheric NO2 monitoring. Jiangsu Province had the highest monthly average concentration in January, which were 38.67 ug/m3 (Ground-level), 17.35 × 1015 molec/cm2 (TROPOMI) and 20.04 × 1015 molec/cm2 (OMI). The lowest concentration in August was 13.39 ug/m3 (Ground-level), 5.2 × 1015 molec/cm2 (TROPOMI) and 7.03 × 1015 molec/cm2 (OMI).
With the blooming development of Industry 4.0, the management of industrial processes has drawn a lot of research attention. We employed the Gaussian process regression model to predict the key indicators of an indust...
详细信息
ISBN:
(数字)9781728126296
ISBN:
(纸本)9781728126302
With the blooming development of Industry 4.0, the management of industrial processes has drawn a lot of research attention. We employed the Gaussian process regression model to predict the key indicators of an industrial process. To facilitate the description of the data characteristics in an industrial process, the kernel function is reconstructed with respect to different kinds of data. We propose a novel structure based on the Gaussian process regression model which incorporates the previously predicted values into the input data of subsequent prediction. A series of contrastive experiments are conducted on the Tennessee Eastman process simulator. Experimental results show that the proposed method possesses a higher prediction accuracy than several notable prediction methods.
Layer 2 network technology is extending beyond its traditional local area implementation and finding wider acceptance in provider's metropolitan area networks and large-scale cloud data center networks. This is mainl...
详细信息
Layer 2 network technology is extending beyond its traditional local area implementation and finding wider acceptance in provider's metropolitan area networks and large-scale cloud data center networks. This is mainly due to its plug-and-play capability and native mobility support. Many efforts have been put to increase the bisection bandwidth in layer 2 network, which has been constrained by the spanning tree protocol (STP) that layer 2 network uses for preventing looping. The recent trend is to incorporate layer 3's routing approach into layer 2 network so that multiple paths can be used for forwarding traffic between any source-destination (S-D) node pair. Equal cost multipath (ECMP) is one such example. However, ECMP may still be limited in generating multiple paths due to its shortest path (lowest cost) requirement. In this paper, we consider a non-shortest-path routing approach, called equal preference multipath (EPMP) based on ordered semi group theory, which can generate more paths than ECMP. In EPMP routing, all the paths with different traditionally-defined costs, such as hops, bandwidth, etc., can be determined equally now and thus they become equal candidate paths. By the comparative tests with ECMP, EPMP routing not only generates more paths, provides 15% higher bisection bandwidth, but also identifies bottleneck links in a hierarchical network when different traffic patterns are applied EPMP is more flexible in controlling the number and length of multipath generation. Simulation results indicate the effectiveness of the proposed algorithm. It is a good reference for non-blocking running of big datacenter networks.
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bi...
详细信息
ISBN:
(纸本)9781510871076
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two *** matrix M *,horizontal and vertical coordinate range from 0 to 255,and the pixel pairs in the cover image are used to help hide the secret message bytes in our *** paired pixel points into single and double number hidden in two *** show that the program can hide relatively more pixels in a cover image with less losing image quality.
This paper addresses the simultaneous localization and mapping (SLAM) of a robot in an unknown environment. Several techniques were proposed in the researches to solve this problem employ the different representations...
详细信息
ISBN:
(纸本)9781728131573
This paper addresses the simultaneous localization and mapping (SLAM) of a robot in an unknown environment. Several techniques were proposed in the researches to solve this problem employ the different representations of the environment either by points or lines with their information on the extreme geometric positions. The objective of this paper has proposed a solution based on Extended Kalman Filter (EKF) for a single robot. The algorithm developed in our work is the EKF-SLAM which is implemented experimentally using a Pioneer 3-AT mobile robot equipped with a 2D laser telemeter. The obtained results using EKF-SLAM based lines shows the improvements in terms of accuracy and smoothness compared to the EKF-SLAM based points and odometer.
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoi...
详细信息
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the viewpoint of sparse subspace learning. By minimizing the reconstruction residual, the learned feature weight matrix with the l 2,1 -norm and the non-negative constraints not only removes the irrelevant features, but also captures the underlying low dimensional structure of the data points. Meanwhile in order to enhance the model's robustness, l 1 -norm error function is used to resistant to outliers and sparse noise. An efficient iterative algorithm is introduced to optimize this non-convex and non-smooth objective function and the proof of its convergence is given. Although, there is a subtraction item in our multiplicative update rule, we validate its non-negativity. The superiority of our model is demonstrated by comparative experiments on various original datasets with and without malicious pollution.
—Existing generalization theories analyze the generalization performance mainly based on the model complexity and training process. The ignorance of the task properties, which results from the widely used IID assumpt...
详细信息
The issue of bank safety has always been one of the key contents of financial and economic ***,this paper establishes the bank macro safety status index system,obtain robust covariance matrix based on the Fast-MCD ***...
详细信息
The issue of bank safety has always been one of the key contents of financial and economic ***,this paper establishes the bank macro safety status index system,obtain robust covariance matrix based on the Fast-MCD *** this basis,construct robust process control model of the bank macro safety status,analyze bank macro safety's antecedent status,consistent status and the lagging *** research shows that,the unsafe period of bank's macro safety status is mainly concentrated in the middle of 2005,end of 2008 to early 2009,end of 2011 to early 2012,which is basically consistent with China's actual financial *** addition,the antecedent status index is about 3 months ahead of the consistent index,and the lagging status index is roughly 6.3 months behind the consistent status *** results can be used to predict the macro safety status of the bank and take the corresponding policy measures in advance.
With the development of 5G, cloud computing, and artificial intelligence (AI) technology, cloud game has become a hotspot about application and innovation of Gigabit bandwidth. This paper, firstly, analyses the presen...
With the development of 5G, cloud computing, and artificial intelligence (AI) technology, cloud game has become a hotspot about application and innovation of Gigabit bandwidth. This paper, firstly, analyses the present situation and development of cloud game to clarify the key business and key technology of cloud game, then, proposes an operational framework of cloud game, finally, the feasibility of the proposed framework is discussed and several suggestions about the operation of cloud game are given.
暂无评论