Showing 12,141 - 12,160 results of 19,511 for search '"Algorithm"', query time: 0.16s Refine Results
  1. 12141

    FAULT DIAGNOSIS OF ROLLING BEARINGS BASED ON SDP AND IMPROVED SAM⁃MobileNetv2 by ZHANG TianYuan, SUN HuEr, ZHU JiYang, ZHAO Yang

    Published 2024-08-01
    “…Traditional fault diagnosis methods for rolling bearings are difficult to accurately and efficiently achieve fault classification.A method of rolling bearing fault classification based on symmetrized dot pattern(SDP)and improved SAM⁃MobileNetv2 was proposed.Firstly,the bearing vibration signal was transformed into two⁃dimensional images with rich characteristic information by SDP algorithm.Secondly,the two⁃dimensional images were fed into the SAM⁃MobileNetv2 network model,which extracted and classified fault feature information.Improved SAM⁃MobileNetv2 networks used the adaptive activation function ACON to replace the ReLU6 activation function in SAM⁃MobileNetv2 to improve model classification performance.Finally,this model was compared with various models.The experimental results show that this model can accurately and efficiently realize the classification of rolling bearing faults,using Case Western Reserve University bearing fault data with an accuracy rate of 99.5%,using the University of Ottawa bearing failure data with an accuracy rate of 97.2%.…”
    Get full text
    Article
  2. 12142

    Person re-identification with intra-domain similarity grouping based on semantic fusion by Qiqi KOU, Ji HUANG, Deqiang CHENG, Yunlong LI, Jianying ZHANG

    Published 2022-07-01
    “…Unsupervised cross-domain person re-identification aims to adapt a model trained on a labeled source-domain dataset to a target-domain dataset.However, the cluster-based unsupervised cross-domain pedestrian re-identification algorithm often generates noise due to the different input pedestrian pictures during the network feature learning process, which affects the clustering results.To solve this problem, An intra-domain similarity grouping pedestrian re-identification network based on semantic fusion was proposed.Firstly, a semantic fusion layer was added on the basis of the Baseline network, and the semantic fusion of similar features was performed on the intermediate feature maps from the two aspects of space and channel in turn, so as to improve the adaptive perception ability of the network.In addition, by making full use of the fine-grained information of intra-domain similarity, the network’s clustering accuracy of global and local features was improved.Experiments were carried out on three public datasets, DukeMTMC-ReID, Market1501, MSMT17, and the results demonstrate that the mAP and Rank recognition accuracy are significantly improved compared with recent unsupervised cross-domain person re-identification algorithms.…”
    Get full text
    Article
  3. 12143

    A Novel BA Complex Network Model on Color Template Matching by Risheng Han, Shigen Shen, Guangxue Yue, Hui Ding

    Published 2014-01-01
    “…The proposed BA complex network model of color space can be easily integrated into many traditional template matching algorithms, such as SSD based matching and SAD based matching. …”
    Get full text
    Article
  4. 12144

    Optimal Power Management via Dynamic Power Pools in DC MG Clusters by Makarand S. Ballal, Shivpal R. Verma, Sarvesh A. Wakode, Hiralal M. Suryawanshi

    Published 2025-01-01
    “…This paper introduces a methodology for managing and controlling microgrid (MG) clusters through the establishment of diverse power pools and optimizing resource allocation based on available generation. The proposed algorithm, incorporating equivalent droop control, facilitates integrated economic optimization by the MG cluster operator (MCO), considering market participation through generation and consumer bids. …”
    Get full text
    Article
  5. 12145

    Fuzzy Dynamic Parameter Adaptation in ACO and PSO for Designing Fuzzy Controllers: The Cases of Water Level and Temperature Control by Fevrier Valdez, Juan Carlos Vazquez, Fernando Gaxiola

    Published 2018-01-01
    “…The main contribution of this work is the use of fuzzy systems to dynamically update the parameters for the ACO and PSO algorithms. In the case of ACO, two fuzzy systems are designed for the Ant Colony System (ACS) algorithm variant. …”
    Get full text
    Article
  6. 12146

    A Combined Average-Case and Worst-Case Analysis for an Integrated Hub Location and Revenue Management Problem by Jia-Zhen Huo, Yan-Ting Hou, Feng Chu, Jun-Kai He

    Published 2019-01-01
    “…To solve this problem, a genetic algorithm is applied. Computational results demonstrate the outperformance of the proposed formulation.…”
    Get full text
    Article
  7. 12147

    Robust Framework to Combine Diverse Classifiers Assigning Distributed Confidence to Individual Classifiers at Class Level by Shehzad Khalid, Sannia Arshad, Sohail Jabbar, Seungmin Rho

    Published 2014-01-01
    “…For this purpose, we applied genetic algorithm to search for an optimal weight vector on which classifier ensemble is expected to give the best accuracy. …”
    Get full text
    Article
  8. 12148

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. …”
    Get full text
    Article
  9. 12149

    The Evidence of Cooperative Binding of a Ligand to G4 DNA by A. G. Kudrev

    Published 2017-01-01
    “…The cross-validation between a new hard + soft modelling and conventional stepwise complex formation algorithm has been conducted. A number of simulated examples will illustrate the methodology. …”
    Get full text
    Article
  10. 12150

    Research of Multi-objective Parameter Decoupled Optimization Method for Hybrid Electric Vehicle by Yiran Zhang, Han Zhao, Kang Huang, Mingming Qiu

    Published 2019-06-01
    “…Aiming at this problem, a multi-parameter decouped optimization method is proposed, which adopts hybrid optimization strategy, taking the dynamic targets as constraint conditions and using particle swarm optimization algorithm to optimize powertrain parameter, the Particle swarm optimization (PSO) is used to optimize the energy management strategy and shifting strategy under different parameters. …”
    Get full text
    Article
  11. 12151

    Stochastic Generation of Subsurface Profiles for Realistic Simulation of Through-the-Earth Communication Systems by Josua Daniel Pena Carreno, A. Judson De Barros Braga

    Published 2019-01-01
    “…Given the difficulties in implementing underground measurements taking years to achieve enough database for a variety of mines and depths, we propose, as a more versatile solution, realistic simulations of a variety of underground structures to statistically characterize magnetic field attenuation. An algorithm based on the Monte Carlo method is presented and uses the Finite Element Method (FEM) to compute field propagation through each random structure. …”
    Get full text
    Article
  12. 12152

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  13. 12153

    Optimal Simulation of Sandcastle Life in Dynamic Environment Based on Stability Principle by Peng-Hui Yang, Ya-Yu Jiang, Qi Tang, Yi-Fang Li, Jia-Ming Zhu

    Published 2020-01-01
    “…Secondly, by limiting the degree of allowable aggregation, the discrete global optimization algorithm based on the continuous descent method is adopted to find out the optimal water-sand ratio. …”
    Get full text
    Article
  14. 12154

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
    Get full text
    Article
  15. 12155

    Fuzzy-Based Adaptive Countering Method against False Endorsement Insertion Attacks in Wireless Sensor Networks by Hae Young Lee

    Published 2015-07-01
    “…A major benefit of the proposed method is that the fuzzy systems can be optimized automatically by combining a genetic algorithm and a simulation. Thus, users only need to write a model of the WSN to apply the proposed method to a WSN. …”
    Get full text
    Article
  16. 12156

    Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level by Qi Chen, Qi Xu, Wenjie Wang

    Published 2019-01-01
    “…First, we provide a framework for fashion apparel by formulating a model that includes both price and demand at different fashion levels. We then provide an algorithm to derive the optimal dynamic pricing strategy and replenishment cycle. …”
    Get full text
    Article
  17. 12157

    An active detection of compromised nodes based on en-route trap in wireless sensor network by Jiang-Tao Wang, Zhi-Xiong Liu

    Published 2021-08-01
    “…A trust model is used to evaluate trust level of neighbor nodes with respect to their authentication behaviors. A detecting algorithm of compromised node is used to detect compromised nodes. …”
    Get full text
    Article
  18. 12158

    From Incoherence to Sustainability: Performance, Activism, and Social Media in the Most Recent Russian Poetry by Kirill Korchagin

    Published 2024-10-01
    “…The central hypothesis of this article is that all of these poets react differently to the methods of discursive organization provided (and enforced) by social networks and strive in different ways to liberate themselves from the censorship of the algorithm: some emphasize the discursive incoherence of the platform, while others, on the contrary, seek to develop a sustainable manner of uniting private discourses into a new totality. …”
    Get full text
    Article
  19. 12159

    Key technologies of satellite communications aided by reconfigurable holographic surfaces by Xinyuan HU, Ruoqi DENG, Boya DI, Hongliang ZHANG, Lingyang SONG

    Published 2022-10-01
    “…Ultra-dense low earth orbit (LEO) satellite communication networks can overcome the scarcity of spectrum resources and the limited coverage of traditional terrestrial networks, and thus have the potential to provide high data rate services and global massive connectivity for terrestrial users.However, due to the high mobility of the satellites, LEO satellite networks put more stringent requirements on antenna technologies in terms of accurate beam steering and high antenna gain.Reconfigurable holographic surface (RHS), as a new type of metamaterial antenna, is investigated to assist LEO satellite communications.The RHS can electronically control the metamaterial units by leveraging the holographic principle to generate desired directional beams.Based on the hardware structure and holographic working principle of RHS, an RHS-assisted multi-satellite communication scheme was proposed, which considered both the LEO satellite tracking scheme and the data transmission scheme.A holographic beamforming optimization algorithm was also designed to maximize the sum rate.Simulation results verify the effectiveness of the proposed scheme and demonstrat that the RHS provids a more cost-effective way to support satellite communications than the conventional phased array antennas.…”
    Get full text
    Article
  20. 12160

    RPR:high-reliable low-cost geographical routing protocol in wireless sensor networks by Xiao-lin FANG, Hong GAO, Shu-guang XIONG

    Published 2012-05-01
    “…Geographical routing mechanisms were widely used in wireless sensor networks(WSN),by which data packets could be routed to the destination sensor node through a small amount of local routing information.Geographic routing algorithms usually required planar graphs derived the original network topologies.However,most planarization algorithms assumed a fixed communication radius of the sensor nodes,which mismatched real applications.The only practical algorithm brought in overheads in delet g and adding cross links.To provide a solution to the problem of existing algorithms,RPR (region partitioning-based routing) was introduced.RPR was a high-reliable and low-cost geographic routing protocol,which divided the whole network into of regular regions,and tried to perform a region-greedy routing on the virtual node of a region when th node-greedy routing failed.RPR had high reliability since the transmissions between regions could reduce the average length of the routing paths.Furthermore,RPR had low cost because its planarization phase did not check or delete cross links.Experiments show that RPR performs better than existing algorithms.…”
    Get full text
    Article