Research Article
Security Analysis of Social Network Topic Mining Using Big Data and Optimized Deep Convolutional Neural Network
Table 2
Data security detection algorithm flow based on semantic feature extraction.
| | (1) Algorithm: DCNN | | (2) Input: the raw points of | | (3) Output: the ground surface points | | (4) Parameters: | | (5) Mapping all the point cloud data into the polar grid | | (6) Initialization | | (7) For do | | (8) For do | | (9) | | (10) The z-coordinate value of the point plus the laser installation | | (11) Order the points in the grid at height | | (12) n = 1 | | (13) IF | | (14) return | | (15) Else | | (16) While | | (17) N = n + 1; | | (18) End while | | (19) End IF | | (20) End For | | (21) End For | | (22) Return |
|
|