-
12141
FAULT DIAGNOSIS OF ROLLING BEARINGS BASED ON SDP AND IMPROVED SAM⁃MobileNetv2
Published 2024-08-01“…Traditional fault diagnosis methods for rolling bearings are difficult to accurately and efficiently achieve fault classification.A method of rolling bearing fault classification based on symmetrized dot pattern(SDP)and improved SAM⁃MobileNetv2 was proposed.Firstly,the bearing vibration signal was transformed into two⁃dimensional images with rich characteristic information by SDP algorithm.Secondly,the two⁃dimensional images were fed into the SAM⁃MobileNetv2 network model,which extracted and classified fault feature information.Improved SAM⁃MobileNetv2 networks used the adaptive activation function ACON to replace the ReLU6 activation function in SAM⁃MobileNetv2 to improve model classification performance.Finally,this model was compared with various models.The experimental results show that this model can accurately and efficiently realize the classification of rolling bearing faults,using Case Western Reserve University bearing fault data with an accuracy rate of 99.5%,using the University of Ottawa bearing failure data with an accuracy rate of 97.2%.…”
Get full text
Article -
12142
Person re-identification with intra-domain similarity grouping based on semantic fusion
Published 2022-07-01“…Unsupervised cross-domain person re-identification aims to adapt a model trained on a labeled source-domain dataset to a target-domain dataset.However, the cluster-based unsupervised cross-domain pedestrian re-identification algorithm often generates noise due to the different input pedestrian pictures during the network feature learning process, which affects the clustering results.To solve this problem, An intra-domain similarity grouping pedestrian re-identification network based on semantic fusion was proposed.Firstly, a semantic fusion layer was added on the basis of the Baseline network, and the semantic fusion of similar features was performed on the intermediate feature maps from the two aspects of space and channel in turn, so as to improve the adaptive perception ability of the network.In addition, by making full use of the fine-grained information of intra-domain similarity, the network’s clustering accuracy of global and local features was improved.Experiments were carried out on three public datasets, DukeMTMC-ReID, Market1501, MSMT17, and the results demonstrate that the mAP and Rank recognition accuracy are significantly improved compared with recent unsupervised cross-domain person re-identification algorithms.…”
Get full text
Article -
12143
A Novel BA Complex Network Model on Color Template Matching
Published 2014-01-01“…The proposed BA complex network model of color space can be easily integrated into many traditional template matching algorithms, such as SSD based matching and SAD based matching. …”
Get full text
Article -
12144
Optimal Power Management via Dynamic Power Pools in DC MG Clusters
Published 2025-01-01“…This paper introduces a methodology for managing and controlling microgrid (MG) clusters through the establishment of diverse power pools and optimizing resource allocation based on available generation. The proposed algorithm, incorporating equivalent droop control, facilitates integrated economic optimization by the MG cluster operator (MCO), considering market participation through generation and consumer bids. …”
Get full text
Article -
12145
Fuzzy Dynamic Parameter Adaptation in ACO and PSO for Designing Fuzzy Controllers: The Cases of Water Level and Temperature Control
Published 2018-01-01“…The main contribution of this work is the use of fuzzy systems to dynamically update the parameters for the ACO and PSO algorithms. In the case of ACO, two fuzzy systems are designed for the Ant Colony System (ACS) algorithm variant. …”
Get full text
Article -
12146
A Combined Average-Case and Worst-Case Analysis for an Integrated Hub Location and Revenue Management Problem
Published 2019-01-01“…To solve this problem, a genetic algorithm is applied. Computational results demonstrate the outperformance of the proposed formulation.…”
Get full text
Article -
12147
Robust Framework to Combine Diverse Classifiers Assigning Distributed Confidence to Individual Classifiers at Class Level
Published 2014-01-01“…For this purpose, we applied genetic algorithm to search for an optimal weight vector on which classifier ensemble is expected to give the best accuracy. …”
Get full text
Article -
12148
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. …”
Get full text
Article -
12149
The Evidence of Cooperative Binding of a Ligand to G4 DNA
Published 2017-01-01“…The cross-validation between a new hard + soft modelling and conventional stepwise complex formation algorithm has been conducted. A number of simulated examples will illustrate the methodology. …”
Get full text
Article -
12150
Research of Multi-objective Parameter Decoupled Optimization Method for Hybrid Electric Vehicle
Published 2019-06-01“…Aiming at this problem, a multi-parameter decouped optimization method is proposed, which adopts hybrid optimization strategy, taking the dynamic targets as constraint conditions and using particle swarm optimization algorithm to optimize powertrain parameter, the Particle swarm optimization (PSO) is used to optimize the energy management strategy and shifting strategy under different parameters. …”
Get full text
Article -
12151
Stochastic Generation of Subsurface Profiles for Realistic Simulation of Through-the-Earth Communication Systems
Published 2019-01-01“…Given the difficulties in implementing underground measurements taking years to achieve enough database for a variety of mines and depths, we propose, as a more versatile solution, realistic simulations of a variety of underground structures to statistically characterize magnetic field attenuation. An algorithm based on the Monte Carlo method is presented and uses the Finite Element Method (FEM) to compute field propagation through each random structure. …”
Get full text
Article -
12152
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
12153
Optimal Simulation of Sandcastle Life in Dynamic Environment Based on Stability Principle
Published 2020-01-01“…Secondly, by limiting the degree of allowable aggregation, the discrete global optimization algorithm based on the continuous descent method is adopted to find out the optimal water-sand ratio. …”
Get full text
Article -
12154
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
Get full text
Article -
12155
Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks
Published 2015-07-01“…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
Get full text
Article -
12156
Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level
Published 2019-01-01“…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
Get full text
Article -
12157
An active detection of compromised nodes based on en-route trap in wireless sensor network
Published 2021-08-01“…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
Get full text
Article -
12158
From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry
Published 2024-10-01“…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
Get full text
Article -
12159
Key technologies of satellite communications aided by reconfigurable holographic surfaces
Published 2022-10-01“…Ultra-dense low earth orbit (LEO) satellite communication networks can overcome the scarcity of spectrum resources and the limited coverage of traditional terrestrial networks, and thus have the potential to provide high data rate services and global massive connectivity for terrestrial users.However, due to the high mobility of the satellites, LEO satellite networks put more stringent requirements on antenna technologies in terms of accurate beam steering and high antenna gain.Reconfigurable holographic surface (RHS), as a new type of metamaterial antenna, is investigated to assist LEO satellite communications.The RHS can electronically control the metamaterial units by leveraging the holographic principle to generate desired directional beams.Based on the hardware structure and holographic working principle of RHS, an RHS-assisted multi-satellite communication scheme was proposed, which considered both the LEO satellite tracking scheme and the data transmission scheme.A holographic beamforming optimization algorithm was also designed to maximize the sum rate.Simulation results verify the effectiveness of the proposed scheme and demonstrat that the RHS provids a more cost-effective way to support satellite communications than the conventional phased array antennas.…”
Get full text
Article -
12160
RPR:high-reliable low-cost geographical routing protocol in wireless sensor networks
Published 2012-05-01“…Geographical routing mechanisms were widely used in wireless sensor networks(WSN),by which data packets could be routed to the destination sensor node through a small amount of local routing information.Geographic routing algorithms usually required planar graphs derived the original network topologies.However,most planarization algorithms assumed a fixed communication radius of the sensor nodes,which mismatched real applications.The only practical algorithm brought in overheads in delet g and adding cross links.To provide a solution to the problem of existing algorithms,RPR (region partitioning-based routing) was introduced.RPR was a high-reliable and low-cost geographic routing protocol,which divided the whole network into of regular regions,and tried to perform a region-greedy routing on the virtual node of a region when th node-greedy routing failed.RPR had high reliability since the transmissions between regions could reduce the average length of the routing paths.Furthermore,RPR had low cost because its planarization phase did not check or delete cross links.Experiments show that RPR performs better than existing algorithms.…”
Get full text
Article