-
12041
DYNAMIC RELIABILITY ANALYSIS OF PHOTOVOLTAIC SUPPORT SYSTEM CONSIDERING MULTIPLE UNCERTAINTIES
Published 2024-08-01“…Dynamic reliability analysis method of photovoltaic support system(PSS)was proposed considering the multiple uncertainties.Firstly,the reliability analysis model of PSS was constructed based on the probability density evolution method(PDEM),including the probability conservation equation,basic governing equation and density evolution equation.Then,the finite element analysis model of PSS was built,including the structural stress model,load combination form,and mesh generation algorithm.In simulation,the randomness in load combination and structures were incorporated,in which consists of six basic random parameters and 44 representative systems.The solution efficiency was improved by the joint simulation of PDEM and Abaqus.Results show that stress and displacement are two failure modes of PSS,and the influence of the latter is more obvious.The reliability index under the basic load combination condition is 0.928.As wind speed increases,the structural reliability decreases.In the high⁃speed range larger than 40 m/s,the uncertainty in structure itself will overestimate the reliability level of PSS,which should be paid attention in design.…”
Get full text
Article -
12042
Learning-Based Dark and Blurred Underwater Image Restoration
Published 2020-01-01“…Due to the high-quality training data, the proposed restoration algorithm based on deep learning achieves inspiring results for underwater images taken in a low-light environment. …”
Get full text
Article -
12043
Study on High Performance of MPI-Based Parallel FDTD from WorkStation to Super Computer Platform
Published 2012-01-01“…The general rules are presented on how to obtain the highest efficiency of parallel FDTD algorithm by optimizing MPI virtual topology. To show the validity of the presented method, several numerical results are given in the later part. …”
Get full text
Article -
12044
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article -
12045
Benchmarking of Multispectral Pansharpening: Reproducibility, Assessment, and Meta-Analysis
Published 2024-12-01“…As a major outcome of this study, an improved version of the additive wavelet luminance proportional (AWLP) pansharpening algorithm offers all of the favorable characteristics of an ideal benchmark, namely, performance, speed, absence of adjustable running parameters, reproducibility of results with varying datasets and landscapes, and automatic correction of the path radiance term introduced by the atmosphere. …”
Get full text
Article -
12046
Sensor Placement Optimization of Vibration Test on Medium-Speed Mill
Published 2015-01-01“…The OSP of medium-speed mill was conducted using the effective independence method (EfI) and QR decomposition algorithm. The results showed that the order of modal shapes had an important influence on the optimization results. …”
Get full text
Article -
12047
Music Personalized Label Clustering and Recommendation Visualization
Published 2021-01-01“…With the advent of big data, the performance of traditional recommendation algorithms is no longer enough to meet the demand. Most people do not leave too many comments and other data when using the application. …”
Get full text
Article -
12048
Panoramic video coding based on spherical distortion with spatio-temporal dependency
Published 2023-10-01“…The planar coding distortion, which affects objective quality, and spherical distortion, which affects subjective quality, as well as existing independent rate-distortion optimization techniques that fail to consider the temporal propagation of spherical distortion and its impact on coding performance, result in coding performance degradation.To address these issues, a spatio-temporal dependent spherical distortion model was proposed for optimizing panoramic video coding.Firstly, a spatial mapping model was proposed to map spherical distortions to coding distortions, aiming to align subjective and objective quality assessments.Secondly, a temporal propagation model for spherical distortions was introduced to enhance the overall coding performance of all coding units in the propagation chain.Finally, the coding parameters were adjusted by computing the weights for spatial mapping and temporal propagation of spherical distortions.Experimental results demonstrate that, under low-delay encoding configurations, compared to the VTM14.0, a state-of-the-art video coding benchmark, the proposed algorithm achieves an average bitrate savings of 7.4% (up to 22.1%) and reduction in coding time of 9%.…”
Get full text
Article -
12049
A Prediction-Correction Dynamic Method for Large-Scale Generalized Eigenvalue Problems
Published 2013-01-01“…The local superlinear convergence property for this new algorithm is also established. Finally, in comparison with other methods, some promising numerical experiments are presented.…”
Get full text
Article -
12050
Hall Current Effect of Magnetic-Optical-Elastic-Thermal-Diffusive Semiconductor Model during Electrons-Holes Excitation Processes
Published 2022-01-01“…Mathematically, the Laplacian computational inversion algorithm with a numerical approximation is used to achieve the fundamental physical quantities numerically in the time domain. …”
Get full text
Article -
12051
Application of LCD-SVD Technique and CRO-SVM Method to Fault Diagnosis for Roller Bearing
Published 2015-01-01“…Thirdly, a support vector machine (SVM) classifier based on Chemical Reaction Optimization (CRO) algorithm, called CRO-SVM method, is designed for classification of fault location. …”
Get full text
Article -
12052
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
Get full text
Article -
12053
Product Selection and Components Replenishment Model of ATO Manufacturer under Heterogeneous Demand
Published 2013-01-01“…Furthermore, we propose an algorithm to obtain the optimal solution on the set of products and the components replenishment quantities. …”
Get full text
Article -
12054
The tolerance balancing optimization with multiple constraints on the form and function of the discrete functional surface
Published 2025-01-01“…The tolerance contribution is incorporated into the nonlinear inertial weight particle swarm algorithm. By balancing the influence of tolerance on geometric function and surface form, and the extent of the tolerance optimization, the part tolerances that meet the requirements of geometric function and surface form are solved and the tolerance balancing optimization is achieved.…”
Get full text
Article -
12055
Generalized Exponential Fuzzy Entropy Approach for Automatic Segmentation of Chest CT with COVID-19 Infection
Published 2022-01-01“…To address this challenge, we propose a novel framework involving an optimization technique algorithm to solve a multilevel thresholding problem based on information theory to segment abnormal lung CT scans. …”
Get full text
Article -
12056
HARQ scheme for sparse code multiple access based on network coding
Published 2022-09-01“…To fulfill the stringent reliability and throughput demand of the beyond-5G and the forthcoming 6G, a novel network coding (NC) based hybrid automatic retransmission request (HARQ) for low-density parity check (LDPC) coded SCMA was proposed.Two incorrectly received packets from different time slots were retransmitted by using NC principle under multi-user scenario.By doing so, the information came from two packets could be conveyed in one retransmission.Moreover, extra coding gain could be attained at the receiver.Furthermore, since the similarity between SCMA detector and LDPC decoder, and the one check node feature of NC decoder, a SCMA, LDPC and NC joint decoder based on message passing algorithm (MPA) was proposed.The proposed scheme could fully utilize the soft messages come from current and previous transmissions, and thus exploiting satisfied coding gain from NC.Simulation results show that the superiority of the proposed novel HARQ scheme for SCMA over the conventional HARQ on both throughput and reliability.…”
Get full text
Article -
12057
Massive access technology in 6G cellular Internet of things network
Published 2020-03-01“…To realize Internet of everything (IoE),the 6G cellular Internet of things (IoT) network need to provide wireless access with low power,massive connectivity and wide coverage.Through the analysis and research on the massive access technology in 6G cellular IoT network,especially in combination with the sporadic characteristics of IoT applications,a new access framework based on the grant-free random access protocol was designed to facilitate efficient massive access with limited spectrum resources.The proposed framework consisted of two phases.One was joint activity detection and channel estimation.The other was data transmission,which was divided into two categories,uplink data transmission and downlink data transmission,according to the different directions of data transmission.Due to the uncertainty of channel state information at the base station under the massive grant-free random access and considering the low power demand of 6G IoT devices,two robust uplink and downlink access algorithms were designed by maximizing the system energy efficiency.Extensive simulation results validate the effectiveness and robustness of the proposed algorithm.…”
Get full text
Article -
12058
Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks
Published 2010-01-01“…Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. …”
Get full text
Article -
12059
Trajectory Tracking Control of Mecanum Wheels Mobile Platform Based on MPC
Published 2023-11-01“…Simulation experiments demonstrate that the controller designed in this study has better convergence speed and tracking accuracy than the commonly used trajectory algorithm, and it can provide good robustness to control the mobile platform of Mecanum wheels.…”
Get full text
Article -
12060
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01“…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
Get full text
Article