Research Article
Security Analysis of Social Network Topic Mining Using Big Data and Optimized Deep Convolutional Neural Network
Table 2
Data security detection algorithm flow based on semantic feature extraction.
| (1) Algorithm: DCNN | (2) Input: the raw points of | (3) Output: the ground surface points | (4) Parameters: | (5) Mapping all the point cloud data into the polar grid | (6) Initialization | (7) For do | (8) For do | (9) | (10) The z-coordinate value of the point plus the laser installation | (11) Order the points in the grid at height | (12) n = 1 | (13) IF | (14) return | (15) Else | (16) While | (17) N = n + 1; | (18) End while | (19) End IF | (20) End For | (21) End For | (22) Return |
|
|