Showing 11,541 - 11,560 results of 18,898 for search '"algorithm"', query time: 0.08s Refine Results
  1. 11541

    Fault Diagnosis of Gearbox based on Multi-fractal and PSO-SVM by Li Sha, Pan Hongxia, Zhang Jundong, Zhao Weiwei

    Published 2015-01-01
    “…Aiming at the non-stationary and nonlinear of gearbox vibration signals,a fault diagnosis method based on the multi-fractal and particle swarm optimization support vector machine(PSO-SVM)is put forward.Firstly,the fractal filter with short-time fractal dimension as fuzzy control parameters is used to filtering noise reduction the gearbox vibration signals with bigger background noises.Secondly,the multi-fractal spectrum algorithm is applied to analyze the signal after filtering,the results show that the characteristic parameters:Δa(q)、f(a(q))maxand box dimensions Dbcan give a good presentation for gearbox working condition.Finally,the particle swarm optimization(PSO)is applied to optimize the parameters of support vector machine(SVM).Taking the multi-fractal characteristic vectors as input parameters of PSO-SVM and SVM to recognize the fault types of the gearbox.The results show that SVM based on particle swarm optimization can improve the classification accuracy.Meanwhile,the validity of gearbox fault diagnosis based on muti-fractal and PSO-SVM is proved.…”
    Get full text
    Article
  2. 11542

    Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI

    Published 2019-07-01
    “…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  3. 11543

    An Efficient Hybrid Method for 3D Scattering from Inhomogeneous Object Buried beneath a Dielectric Randomly Rough Surface by Hong-jie He, Li-xin Guo, Wei Liu

    Published 2017-01-01
    “…Several numerical simulations are considered to demonstrate the algorithm’s ability to deal with the scattering from the inhomogeneous target buried beneath a dielectric rough surface, and the effectiveness of our proposed method is also illustrated.…”
    Get full text
    Article
  4. 11544

    Adversarial training driven malicious code detection enhancement method by Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU

    Published 2022-09-01
    “…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
    Get full text
    Article
  5. 11545

    Research on Dry Coupling Technology in the Ultrasonic Non-Destructive Testing of Concrete by Jun Li, Zeyu Chen

    Published 2025-01-01
    “…By combining an array imaging system with a total focusing algorithm, this study not only significantly enhances the convenience and signal-to-noise ratio (SNR) of concrete ultrasonic imaging, but also opens new pathways for ultrasonic NDT technology in concrete.…”
    Get full text
    Article
  6. 11546

    Research of Kinematics and Workspace of 2-SPR/(U+UPR)P(vA) Reconfigurable Parallel Mechanism by Chunsheng Ma, Wenbo Mi, Xiaoqin Yin, Zhendong Ma

    Published 2021-06-01
    “…Secondly,the closed-loop vector method is used to solve the two sets of inverse kinematic solutions of the mechanism and verification,and the particle swarm optimization algorithm is used to study and establish the positive solution model of the mechanism under the R phase and verify. …”
    Get full text
    Article
  7. 11547

    RIS-assisted terahertz frequency band vehicle network capacity optimization by Fatang CHEN, Xiaoling LIU, Dan WANG, Ruofan ZHANG

    Published 2023-10-01
    “…In order to alleviate the spectrum scarcity and capacity limitation of the current wireless system, the terahertz frequency band was introduced and the reconfigurable intelligent surface (RIS) was used for auxiliary communication to construct a downlink vehicle network.Considering the constraints of limited total system power, QoS constraints of cellular mobile users, and randomness constraints of vehicle and user locations, a hybrid optimization model was established for optimal power allocation and optimal deployment of RIS with the aim of maximizing the total rate of vehicle users.Based on the balance method, linear transformation method, and element elimination method, the original NP-hard problem was transformed into a convex optimization problem with complex correlation constraints and multivariate coupling.The inner layer iteration was based on the Lagrange multiplier method to solve the optimal power allocation, and the outer layer iteratively solved the optimal deployment of RIS based on a improved genetic algorithm.The simulation results show that rationally deploying the number and distribution density of RIS nodes based on optimal power allocation can save costs while achieving a higher target total capacity.…”
    Get full text
    Article
  8. 11548

    Application of Optimized BP Neural Network In Financial Alert System by Qiaoyi Gao

    Published 2022-01-01
    “…Considering the shortcomings of BP neural network, genetic algorithm is used to optimize the specification. Finally, a new reference scheme is provided for economic early warning. …”
    Get full text
    Article
  9. 11549

    Review on Social Media and Digital Security by Amar Yahya Hussien

    Published 2022-07-01
    “…The available studies mainly aim at both social media content and user security, including model, protocol, mechanism and algorithm. Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus has effect on their further improvement and evolution. …”
    Get full text
    Article
  10. 11550

    Monitoring Method for Road Waterlogging Based on Improved YOLOv8 by ZHANG Zheng, ZUO Xiangyang, LONG Yan, HUANG Haocheng, HE Lixin, LEI Xiaohui, WANG Mengqian

    Published 2024-10-01
    “…Therefore, this article proposed a real-time monitoring method for road waterlogging based on improved YOLOv8. Through the YOLOv8 algorithm, a convolutional block attention module (CBAM) attention mechanism was added to the neck structure network to enhance the important features of waterlogging areas, suppress general features, and improve the accuracy of identifying road waterlogging. …”
    Get full text
    Article
  11. 11551

    Continuous User Verification in Cloud Storage Services using Deep Learning by burhan albayati

    Published 2025-01-01
    “…The best experimental result achieved an EER of 3.6% based on applying a deep learning algorithm (CNN). This result indicates and encourages the feasibility of using behavioral profiling to protect cloud users from misuse. …”
    Get full text
    Article
  12. 11552

    A Jacobi Collocation Method for Solving Nonlinear Burgers-Type Equations by E. H. Doha, D. Baleanu, A. H. Bhrawy, M. A. Abdelkawy

    Published 2013-01-01
    “…Also the results demonstrate that the proposed method is a powerful algorithm to solve the nonlinear partial differential equations.…”
    Get full text
    Article
  13. 11553

    Evidence-Based Multidisciplinary Design Optimization with the Active Global Kriging Model by Fan Yang, Ming Liu, Lei Li, Hu Ren, Jianbo Wu

    Published 2019-01-01
    “…The numerical results show that the proposed algorithm is effective and valuable, which is valuable in engineering application.…”
    Get full text
    Article
  14. 11554

    A Traction Control Strategy with an Efficiency Model in a Distributed Driving Electric Vehicle by Cheng Lin, Xingqun Cheng

    Published 2014-01-01
    “…In emergency situation, a sliding mode control algorithm was employed to achieve antislip control through keeping the wheels’ slip ratios below 20%. …”
    Get full text
    Article
  15. 11555

    SENSITIVITY ANALYSIS ON STRESS OF FLEXIBLE HINGES TO DESIGN PARAMETERS BASED ON TAGUCHI METHOD by WU JianJun, XIE ZhouWei, HUANG YuLin, WU XiaoMing

    Published 2016-01-01
    “…This method does not depend on optimization algorithm,can be employed for sensitivity analysis of discrete,non-differential or implicit-expression structures,and provides favorable reference to the robust design of the flexible hinges by improving its fatigue life.…”
    Get full text
    Article
  16. 11556

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. …”
    Get full text
    Article
  17. 11557

    A New Type-2 Soft Set: Type-2 Soft Graphs and Their Applications by Khizar Hayat, Muhammad Irfan Ali, Bing-Yuan Cao, Xiao-Peng Yang

    Published 2017-01-01
    “…Finally, we describe an application of type-2 soft graphs in communication networks and present procedure as an algorithm.…”
    Get full text
    Article
  18. 11558

    SBT Approach towards Analog Electronic Circuit Fault Diagnosis by V. Manikandan, N. Devarajan

    Published 2007-01-01
    “…A comparison of the proposed work with the previous works which also employ preprocessing techniques, reveals that our algorithm performs significantly better in fault diagnosis of analog circuits due to our proposed preprocessing techniques.…”
    Get full text
    Article
  19. 11559

    Federated edge learning with reconfigurable intelligent surface and its application in Internet of vehicles by Ping WANG, Zhiwei YANG, Heju LI

    Published 2023-10-01
    “…Aiming at the problem that it is difficult to achieve an optimal trade-off between wireless communication and model accuracy in FEEL training caused by the heterogeneity of wireless links and data distribution, a reconfigurable intelligent surface (RIS) enabled federated edge learning system was proposed, which exploited the channel reconfigurability of RIS to adaptively manipulate the signal propagation environment, and utilized the over-the-air computation (Aircomp) to achieve fast model aggregation.Specifically, the convergence behavior of the FEEL algorithm under the influence of wireless channels and data heterogeneity was rigorously derived, and accordingly, an unified wireless resources optimization problem was constructed with the goal of minimizing the learning loss by jointly designing the transceiver design and the RIS phase shift.Simulation results demonstrate that the proposed scheme achieves substantial performance improvement compared against several baselines, and prove that RIS can play an important role in improving the accuracy of Aircomp enabled FEEL systems under data heterogeneity.Finally, the probability of applying it into Internet of vehicles is discussed.…”
    Get full text
    Article
  20. 11560

    HEVC information hiding approach based on intra prediction modes modulation by Jie YANG, Song-bin LI, Hao-jiang DENG

    Published 2016-09-01
    “…For further improving the embedding efficiency in the processing of HEVC information hiding,a method for HEVC information hiding based on intra prediction models modulation was proposed.The space lattice dimen-sion N(N = 2,3,4)of each CTU was generated according to the key.The selection rule of intra prediction mode was utilized to select N modes which were located at vertex angle.The N modes were mapped to the value F through the space lattice mapping algorithm.Then N bits secret information were read from the bit file and converted to a deci-mal number D.In this way,N secret information bits were embedded in N intra prediction modes by modifying at most one mode.The experimental results approve that the proposed method has high embedding efficiency,small rate increase and minimal influence on the video quality and the anti-steganalysis experiment confirms that the pro-posed method has high concealment.…”
    Get full text
    Article