Suggested Topics within your search.
Suggested Topics within your search.
-
10081
A Method for Finding LR Fuzzy Eigenvectors of Real Symmetric Matrix
Published 2024-11-01“…In this paper, the calculation methods of the real eigenvalues and LR fuzzy eigenvectors of clear real symmetry matrices are deeply considered. The original fuzzy feature problem is extended by using the arithmetic algorithm of LR fuzzy numbers into a simple feature problem with a high-order clear real symmetry matrix. …”
Get full text
Article -
10082
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
10083
Projectile Explosion Weak Firelight Image Recognition Method Using Multi-Scale Adaptive Enhancement Network
Published 2024-01-01“…The traditional VGG16 backbone network is used as the feature extraction network, and the firelight feature extraction network structure of the projectile explosion image is designed by adding the bidirectional aggregation feature pyramid. …”
Get full text
Article -
10084
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
10085
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
10086
Android collusion attack detection model
Published 2018-06-01“…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
Get full text
Article -
10087
Research of the Method of Gear Fault Classification based on Contourlet Transform and Local Binary Pattern
Published 2018-01-01“…For the problem that the gear fault feature is difficult to extract in actual working condition,a fault feature extraction method based on vibration signal time-frequency image is proposed,which is based on the global texture of the contourlet transform and the local texture of the local binary pattern. …”
Get full text
Article -
10088
GENERALIZED ALGORITHM OF COMBINE PROCESS ADJUSTMENT BASED ON FUZZY KNOWLEDGE MODELS
Published 2013-12-01“…The specific feature of the proposed problem-solving algorithm is the hypothesis testing of emerging combining process non-conformances under the machine parameter variations. …”
Get full text
Article -
10089
Research on Target-detection and Tracking of Intelligent Mine Trucks in Open-pit Mines
Published 2022-10-01“…Among them, feature extraction module uses point cloud gradient and distance feature extraction methods to solve the point cloud segmentation problem of small and irregular-shaped obstacles in changing scenes; target tracking module constructs track information for multi-target tracking, which improves the stability of target tracking; an asynchronous fusion strategy of multi-source sensors is designed for heterogeneous sensor fusion module, which overcomes the problem of heterogeneous sensor fusion, and improves the detection and tracking capabilities of small and various targets in unpaved road and dusty environment of open-pit mines. …”
Get full text
Article -
10090
多尺度主元坐标变换在轴承故障声发射信号增强检测中的应用
Published 2014-01-01“…Aiming at the problem of weak feature extraction and recognition in the bearing acoustic emission signal processing,multi-scale principal component coordinate transformation is proposed to enhance fault feature.Firstly,the signal is decomposed by wavelet package,and the sub-band reconstruction component is converted to a new linear space by principal component analysis,and the signal fault feature is enhanced.Finally,the method performance is verified by simulation signal and testing signal,the results show that multi-scale principal component coordinate transformation has obvious enhancement effect in bearing fault detection.…”
Get full text
Article -
10091
Large Language Model-Assisted Deep Reinforcement Learning from Human Feedback for Job Shop Scheduling
Published 2025-04-01“…Deep reinforcement learning has shown great potential in solving this problem. However, it still has challenges in reward function design and state feature representation, which makes it suffer from slow policy convergence and low learning efficiency in complex production environments. …”
Get full text
Article -
10092
Dynamic SLAM algorithm adopt with eliminating mismatched point chains in grid motion statistics
Published 2025-07-01“…And a new fractional statistical model is proposed to increase the number of correct matching pairs, So as to improve the fastness and accuracy of characteristic matching. Aiming at the problem of mismatch caused by local similarity of images, a data set is proposed to determine the data set by using geometric relationship between feature points, which analyzes the similarity between the data by the Person correlation coefficient, and sets the threshold to remove the feature matching pairs with low confidence, so as to improve the accuracy of feature matching. …”
Get full text
Article -
10093
A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks
Published 2022-01-01“…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
Get full text
Article -
10094
Recognition method based on hesitant fuzzy set for unequal length sequences and its application
Published 2021-07-01“…Aiming at the problem that unequal length sequences were difficult to recognize, a recognition method based on hesitant fuzzy distance measure was proposed.Firstly, the problem was described from the perspective of fuzzy value, and the hesitant fuzzy information recognition model of unequal length sequence was established by lattice closeness degree.Secondly, the mean value, variance, relative range and hesitancy degree of hesitant fuzzy values were defined.Combined with membership difference of the shorter part, the generalized integrated feature distance measure and the generalized weighted integrated feature distance measure were defined to meet relevant properties of metric space, and the strict mathematical proof process was given.Finally, entropy measure and support measure were proposed to determine the weight, and the VIKOR recognition method based on hesitant distance measure was given.The simulation results verify the effectiveness and feasibility of proposed method from numerical examples, energy strategy selection and target recognition respectively.…”
Get full text
Article -
10095
Research on transformer operation state prediction based on comprehensive weights and BO-CNN-GRU
Published 2025-03-01“…Firstly, 11 kinds of monitoring data in three categories including oil chromatography gas content, temperature, and electrical quantity are selected as feature parameters; Then, the game theory method is used to integrate the weight values of the three methods of G1 method, entropy weight method and CRITIC method to get the comprehensive weight value of each feature parameter, and the transformer operation state index is constructed based on the comprehensive weight; Finally, the BO-CNN-GRU combination prediction model is built, which solves the problem of difficulty in determining the hyperparameters of the model. …”
Get full text
Article -
10096
Generalized Intuitionistic Fuzzy Normalized Weighted Optimized Geometric Bonferroni Mean and Their Application to MADM
Published 2022-01-01“…Long-term research has proved that information aggregation operator is an effective tool to solve this kind of problem. Bonferroni mean (BM) is an important information aggregation tool which has the main feature of capturing the interrelationships among aggregated arguments. …”
Get full text
Article -
10097
Binary Transformer Based on the Alignment and Correction of Distribution
Published 2024-12-01“…To tackle this problem, the feature distribution alignment operation in binarization is investigated. …”
Get full text
Article -
10098
Planetary Gearbox Fault Diagnosis based on LMD Sample Entropy and ELM
Published 2020-04-01“…In order to solve the difficult problem of early fault feature extraction of planetary gearbox and consider that the planetary gearbox vibration signal is coupling and nonlinear,and the signal has multiple transmission paths,a planetary gearbox fault diagnosis method based on Local Mean Decomposition(LMD) and Sample Entropy and Extreme Learning Machine(ELM) is proposed.Firstly,the vibration signal is adaptively decomposed into a plurality of PF components by LMD,and the first four PF components including the main fault information are selected in combination with the correlation coefficient and the variance contribution rate.Secondly,the Sample Entropy of the signal is calculated to form a feature vector.Finally,the feature vector is input into ELM for fault classification.Experiments are carried out on the planetary gearbox test bench,compared with the probabilistic neural network classification algorithm,and compared with the feature vector based on Singular Value Decomposition (SVD).The results verify the effectiveness of the proposed method.…”
Get full text
Article -
10099
Facial Expression Recognition-You Only Look Once-Neighborhood Coordinate Attention Mamba: Facial Expression Detection and Classification Based on Neighbor and Coordinates Attention...
Published 2024-10-01“…In studying the joint object detection and classification problem for facial expression recognition (FER) deploying the YOLOX framework, we introduce a novel feature extractor, called neighborhood coordinate attention Mamba (NCAMamba) to substitute for the original feature extractor in the Feature Pyramid Network (FPN). …”
Get full text
Article -
10100
Fault Diagnosis Research on Bearingof Motor Based on LMD And Support Vector Machine
Published 2018-10-01“…Secondly,the new kernel function is used to improve the SVM to complete the adaptive training,and the“one to many”method is used to solve the large sample data and multi classification problem. Finally,the energy feature vector is used as the training sample and test sample of SVM,and the fault information of motor bearing is trained and predicted. …”
Get full text
Article