-
16101
Parametric Nonlinear Model Reduction Using K-Means Clustering for Miscible Flow Simulation
Published 2020-01-01“…Next, we perform the K-means clustering algorithm on these parameter vectors to find the centroids. …”
Get full text
Article -
16102
Combined effects of basalt fiber geometrical characteristics on pavement performance of asphalt mixtures.
Published 2025-01-01“…Additionally, a random forest algorithm is adopted to perform a weight analysis of fiber characteristics and their correlation with pavement performance.…”
Get full text
Article -
16103
Motion Deblurring in Image Color Enhancement by WGAN
Published 2020-01-01“…The key idea of this paper is to introduce a novel multitask learning algorithm for image motion deblurring and color enhancement, which enables us to enhance the color effect of an image while eliminating motion blur. …”
Get full text
Article -
16104
Electricity meter area identification technology based on channel coding theory
Published 2021-12-01“…Station area identification has always been a problem in the ubiquitous power Internet of things, a new analytical model similar to fading channel was established for the station area identification, and based on the remote on-load voltage regulation function of on-load capacity and voltage regulation distribution transformer, the channel coding theory was applied to solve the problem.In order to identify station area of the smart meters, different special voltage regulation schemes with the properties of repeated coding and block coding were applied synchronously.At the same time, the power consumption information acquisition system was used to collect the voltage of each smart meter in this period.Finally, the recognition of each meter was realized based on the principle of minimum distance of decoding algorithm.The theoretical analysis and test results show that, compared with the traditional technology, the new technology can realize the high accuracy identification of a large number of meters in the on-load capacity and voltage regulation distribution transformer area in the existing power grid system without upgrading, which has high engineering application value.…”
Get full text
Article -
16105
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Published 2013-08-01“…Finally, as a complementary defensive method to our detection and avoidance approaches, we introduce a prevention routing algorithm that proactively prevents the attack and provide our preliminary results to evaluate its performance.…”
Get full text
Article -
16106
FAULT DIAGNOSIS NEW METHOD OF ROLLING BEARING BASED ON ADAPTIVE REDUNDANT LIFTING SCHEME PACKET
Published 2015-01-01“…Aiming at feature identification of weak signal for rolling bearing fault,an adaptive redundant lifting scheme packet( ARLSP) diagnostic method of undecimated operation was proposed to solve the faults distortion that caused by traditional wavelet packet or lifting wavelet transform using sample operation.ARLSP was based on the principle of lifting scheme.Initial undecimated prediction and update operator were calculated by Lagrange interpolating subdivision,and then constructed an ARLSP decomposition and reconstruction algorithm.Simulation signals were tried out by denoising and anti frequency aliasing,results show that ARLSP method was superior to the traditional wavelet packet in denoising capabilities,and there are no frequency aliasing.Moreover,taking an experiment on an asynchronous motor,the vibration signals of the rolling bearings 6205 under conditions of no fault,the inner ring fault,outer ring fault and rolling fault were measured.ARLSP method has been successfully used to extract characteristic frequency and frequency multiplication for various faults,and has got a higher diagnostic accuracy than traditional wavelet packet.…”
Get full text
Article -
16107
DYNAMIC RELIABILITY ANALYSIS OF PHOTOVOLTAIC SUPPORT SYSTEM CONSIDERING MULTIPLE UNCERTAINTIES
Published 2024-08-01“…Dynamic reliability analysis method of photovoltaic support system(PSS)was proposed considering the multiple uncertainties.Firstly,the reliability analysis model of PSS was constructed based on the probability density evolution method(PDEM),including the probability conservation equation,basic governing equation and density evolution equation.Then,the finite element analysis model of PSS was built,including the structural stress model,load combination form,and mesh generation algorithm.In simulation,the randomness in load combination and structures were incorporated,in which consists of six basic random parameters and 44 representative systems.The solution efficiency was improved by the joint simulation of PDEM and Abaqus.Results show that stress and displacement are two failure modes of PSS,and the influence of the latter is more obvious.The reliability index under the basic load combination condition is 0.928.As wind speed increases,the structural reliability decreases.In the high⁃speed range larger than 40 m/s,the uncertainty in structure itself will overestimate the reliability level of PSS,which should be paid attention in design.…”
Get full text
Article -
16108
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article -
16109
Benchmarking of Multispectral Pansharpening: Reproducibility, Assessment, and Meta-Analysis
Published 2024-12-01“…As a major outcome of this study, an improved version of the additive wavelet luminance proportional (AWLP) pansharpening algorithm offers all of the favorable characteristics of an ideal benchmark, namely, performance, speed, absence of adjustable running parameters, reproducibility of results with varying datasets and landscapes, and automatic correction of the path radiance term introduced by the atmosphere. …”
Get full text
Article -
16110
Sensor Placement Optimization of Vibration Test on Medium-Speed Mill
Published 2015-01-01“…The OSP of medium-speed mill was conducted using the effective independence method (EfI) and QR decomposition algorithm. The results showed that the order of modal shapes had an important influence on the optimization results. …”
Get full text
Article -
16111
Panoramic video coding based on spherical distortion with spatio-temporal dependency
Published 2023-10-01“…The planar coding distortion, which affects objective quality, and spherical distortion, which affects subjective quality, as well as existing independent rate-distortion optimization techniques that fail to consider the temporal propagation of spherical distortion and its impact on coding performance, result in coding performance degradation.To address these issues, a spatio-temporal dependent spherical distortion model was proposed for optimizing panoramic video coding.Firstly, a spatial mapping model was proposed to map spherical distortions to coding distortions, aiming to align subjective and objective quality assessments.Secondly, a temporal propagation model for spherical distortions was introduced to enhance the overall coding performance of all coding units in the propagation chain.Finally, the coding parameters were adjusted by computing the weights for spatial mapping and temporal propagation of spherical distortions.Experimental results demonstrate that, under low-delay encoding configurations, compared to the VTM14.0, a state-of-the-art video coding benchmark, the proposed algorithm achieves an average bitrate savings of 7.4% (up to 22.1%) and reduction in coding time of 9%.…”
Get full text
Article -
16112
Hall Current Effect of Magnetic-Optical-Elastic-Thermal-Diffusive Semiconductor Model during Electrons-Holes Excitation Processes
Published 2022-01-01“…Mathematically, the Laplacian computational inversion algorithm with a numerical approximation is used to achieve the fundamental physical quantities numerically in the time domain. …”
Get full text
Article -
16113
Application of LCD-SVD Technique and CRO-SVM Method to Fault Diagnosis for Roller Bearing
Published 2015-01-01“…Thirdly, a support vector machine (SVM) classifier based on Chemical Reaction Optimization (CRO) algorithm, called CRO-SVM method, is designed for classification of fault location. …”
Get full text
Article -
16114
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). …”
Get full text
Article -
16115
Product Selection and Components Replenishment Model of ATO Manufacturer under Heterogeneous Demand
Published 2013-01-01“…Furthermore, we propose an algorithm to obtain the optimal solution on the set of products and the components replenishment quantities. …”
Get full text
Article -
16116
The tolerance balancing optimization with multiple constraints on the form and function of the discrete functional surface
Published 2025-01-01“…The tolerance contribution is incorporated into the nonlinear inertial weight particle swarm algorithm. By balancing the influence of tolerance on geometric function and surface form, and the extent of the tolerance optimization, the part tolerances that meet the requirements of geometric function and surface form are solved and the tolerance balancing optimization is achieved.…”
Get full text
Article -
16117
Generalized Exponential Fuzzy Entropy Approach for Automatic Segmentation of Chest CT with COVID-19 Infection
Published 2022-01-01“…To address this challenge, we propose a novel framework involving an optimization technique algorithm to solve a multilevel thresholding problem based on information theory to segment abnormal lung CT scans. …”
Get full text
Article -
16118
HARQ scheme for sparse code multiple access based on network coding
Published 2022-09-01“…To fulfill the stringent reliability and throughput demand of the beyond-5G and the forthcoming 6G, a novel network coding (NC) based hybrid automatic retransmission request (HARQ) for low-density parity check (LDPC) coded SCMA was proposed.Two incorrectly received packets from different time slots were retransmitted by using NC principle under multi-user scenario.By doing so, the information came from two packets could be conveyed in one retransmission.Moreover, extra coding gain could be attained at the receiver.Furthermore, since the similarity between SCMA detector and LDPC decoder, and the one check node feature of NC decoder, a SCMA, LDPC and NC joint decoder based on message passing algorithm (MPA) was proposed.The proposed scheme could fully utilize the soft messages come from current and previous transmissions, and thus exploiting satisfied coding gain from NC.Simulation results show that the superiority of the proposed novel HARQ scheme for SCMA over the conventional HARQ on both throughput and reliability.…”
Get full text
Article -
16119
Trajectory Tracking Control of Mecanum Wheels Mobile Platform Based on MPC
Published 2023-11-01“…Simulation experiments demonstrate that the controller designed in this study has better convergence speed and tracking accuracy than the commonly used trajectory algorithm, and it can provide good robustness to control the mobile platform of Mecanum wheels.…”
Get full text
Article -
16120
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01“…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
Get full text
Article