Research Article

Security Analysis of Social Network Topic Mining Using Big Data and Optimized Deep Convolutional Neural Network

Table 2

Data security detection algorithm flow based on semantic feature extraction.

(1) Algorithm: DCNN
(2) Input: the raw points of
(3) Output: the ground surface points
(4) Parameters:
(5) Mapping all the point cloud data into the polar grid
(6) Initialization
(7) For do
(8) For do
(9)      
(10)  The z-coordinate value of the point plus the laser installation
(11)     Order the points in the grid at height
(12)    n = 1
(13)   IF
(14)    return
(15)   Else
(16)       While
(17)        N = n +1;
(18)       End while
(19)   End IF
(20) End For
(21) End For
(22) Return