Computer Science ›› 2021, Vol. 48 ›› Issue (7): 299-307.doi: 10.11896/jsjkx.200600106
• Artificial Intelligence • Previous Articles Next Articles
YIN Yun-fei1, LIN Yue-jiang1, HUANG Fa-liang1,2, BAI Xiang-yu1
CLC Number:
[1]SPYROU K J,KOROMILA J A.A risk model of passenger ship fire safety and its application[J].Reliability Engineering & System Safety,2020,200:1-14. [2]WANG W H,ZHU D H,PENG C H,et al.Uncertainty analysis for parameters of CFAST based on Electrical cabinet firescenarioin main control room[J].Nuclear Power Engineering,2018,39(2):153-156. [3]DING C X,PAN M Z,CHEN H,et al.An anionic polyelectrolyte hybrid for wood-polyethylene composites with high strength and fire safety via self-assembly[J].Construction and Building Materials,2020,249:1-12. [4]COWLARD A,JAHN W,ABECASSIS-EMPIS C,et al.Sensor assisted firefighting[J].Fire Technology,2010,46(3):719-741. [5]PEACOCK R D,RENEKE P A,FORNEY G P.CFAST-Consolidated Fire and Smoke Transport (Version 7)-Volume 3:Verification and Validation Guide[R].National Institute of Standards and Technology,MD,USA,2015. [6]PEACOCK R D,RENEKE P A,FORNEY G P.CFAST-Consoli-dated Model of Fire Growth and Smoke Transport (Version 7) Volume 2:User’s Guide[R].National Institute of Standards and Technology,MD,USA,2017. [7]WANG W G,GUO Y,PENG C H.Uncertainty Analysis for Parameters of CFAST in the Main Control Room Fire Scenario [J].Atw-International Journal for Nuclear Power,2017,62(7):461-465. [8]HAN S,XIAO L,LI H Y,et al.Simulation research on safetyevacuation in the underground commercial building fire [J].Fire Science and Technology,2018,37(7):910-914. [9]MAHJOUR S K,SANTOS A A S,Correia M G.Developing a workflow to select representative reservoir models combining distance-based clustering and data assimilation for decision ma-king process [J].Journal of Petroleum Science and Engineering,2020,190:1-20. [10]CHANDRAMOULI P,MEMIN E,HEITZ D.4D large scalevariational data assimilation of a turbulent flow with a dynamics error model[J].Journal of Computational Physics,2020,412:1-29. [11]BURMAN E,FEIZMOHAMMADI A,OKSANEN L.A Finite Element Data Assimilation Method For The Wave Equation [J].Mathematics of Computation,2020,89(324):1681-1709. [12]LIN C C,WANG L.Forecasting smoke transport during com-partment fires using a data assimilation model[J].Journal of Fire Science,2015,33(1):3-21. [13]LIN C C,ZHAO G C,WANG L Z L.Using real-time sensing data for predicting future state of building fires [C]//Procee-dings of the 2015 IEEE International Conference on Automation Science and Engineering (CASE).Gothenburg,Sweden,2015. [14]JI J,TONG Q,WANG L L,et al.Application of the EnKF method for real-time forecasting of smoke movement during tunnel fires [J].Adv.Eng.Softw.2018,115:398-412. [15]LI X,ZHANG W,XU N X.Deep Learning-Based MachineryFault Diagnostics With Domain Adaptation Across Sensors at Different Places [J].IEEE Transactions on Industrial Electro-nics,2020,67(8):6785-6794. [16]ASSAAD M,BONÉ R,CARDOT H.A new boosting algorithm for improved time-series forecasting with recurrent neural networks [J].Information Fusion,2008,9(1):41-55. [17]YU C Y,QI X,Ma H.LLR:Learning learning rates by LSTM for training neural networks[J].Neurocomputing,2020,394:41-50. [18]GRAVES A,NAVDEEP J.Towards end-to-end speech recognition with recurrent neural networks [C]//Proceedings of the 31st International Conference on Machine Learning.Beijing,China,2014:1764-1772. [19]CAO J,LI Z,LI J.Financial time series forecasting model based on CEEMDAN and LSTM [J].Physica A,2019,519:127-139. [20]VAN HOUDT G,MOSQUERA C,NAPOLES G.A review on the long short-term memory model[J].Artificial Intelligence Review,2020,53:5929-5955. [21]HSIEH P-H,WU O,GEUE C.Economic burden of rheumatoid arthritis:a systematic review of literature in biologic era[J].Annals of the Rheumatic Diseases,2020,79(6):771-777. [22]SHIKWAMBANA L,KGANYAGO M.Trends in atmospheric pollutants from oil refinery processes:a case study over the United Arab Emirates[J].Remote Sensing Letters,2020,11(6):590-597. [23]HU C,BAI Y,LI J,et al.Prognostic value of systemic inflammatory factors NLR,LMR,PLR and LDH in penile cancer [J].BMC Urology,2020,20(1):1-9. [24]FATHIAN F,DEHGHAN Z,BAZRKAR M H,et al.Trends in hydrological and climatic variables affected by four variations of the Mann-Kendall approach in Urmia Lake basin[J].Iran.Hydrolog.Sci.J,2016,61(5):892-904. [25]NOURANI V,MEHR A D,AZAD N.Trend analysis of hydroclimatological variables in Urmia lake basin using hybrid wavelet Mann-Kendall and Sen tests[J].Environ Earth Science,2018,77:1-18. [26]ARAGHI A,MOUSAVI-BAYGI M,ADAMOWSKI J.Detec-ting soil temperature trends in Northeast Iran from 1993 to 2016 [J].Soil.Till.Res.2017,174:177-192. [27]NI X L,XU M,CAO C X,et al.Forest height estimation and change monitoring based on artificial neural network using Geoscience Laser Altimeter System and Landsat data [J].Journal of Applied Remote Sensing,2020,14(2):1-9. [28]JAIN S J.Numerical simulation of fire in a tunnel:Comparative study of CFAST and CFX predictions[J].Tunnelling Underground Space Technology,2018,23(2):160-170. [29]SHEPPARD D T,KLEIN B W.Burn tests in two story structure with hallways [R].Ammendale,Maryland:ATF Laboratories,2009. [30]NOWLEN S P.Enclosure Environment Characterization Testingfor the Base Line Validation of Computer Fire Simulation Codes [R].Albuquerque,NM:Sandia National Laboratories,1987. [31]CHAVEZ J M,NOWLEN S P.An Experimental Investigationof Internally Ignited Fires in Nuclear Power Plant Control Cabi-nets:Part 2,Room Effects Tests [R].Albuquerque,NM:Sandia National Laboratories,1988. [32]HAMINS A P,MARANGHIDES A,JOHNSSON E L,et al.Report of experimental results for the international fire model benchmarking and validation exercise 3 [R].MD,USA:National Institute of Standards and Technology,2003. [33]HAMINS A P,MARANGHIDES A,MCGRATTAN K B,et al.Experiments and Modeling of Structural Steel Elements Exposed to Fire.Federal Building and Fire Safety Investigation of the World Trade Center Disaster (NIST NCSTAR 1-5B) [R].National Institute of Standards and Technology,MD,USA,2005. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324. |
[14] | CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344. |
[15] | ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570. |
|