期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Comprehensive Overview and Analytical Study on Automatic Bird Repellent Laser System for Crop Protection
1
作者 Sireesha Abotula Srinivas Gorla +1 位作者 Prasad Reddy PVGD Mohankrishna S 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第1期38-53,共16页
Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This... Birds are a huge hazard to agriculture all around the world,causing harm to profitable field crops.Growers use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This study presents a comprehensive overview of current bird repellant approaches used in agricultural contexts,as well as potential new ways. The bird repellent techniques include Internet of Things technology,Deep Learning,Convolutional Neural Network,Unmanned Aerial Vehicles,Wireless Sensor Networks and Laser biotechnology. This study’s goal is to find and review about previous approach towards repellent of birds in the crop fields using various technologies. 展开更多
关键词 Bird repellent crop protection IOT UAV Deep Learning
下载PDF
Enhancing Renewable Energy Integration:A Gaussian-Bare-Bones Levy Cheetah Optimization Approach to Optimal Power Flow in Electrical Networks
2
作者 Ali S.Alghamdi Mohamed A.Zohdy Saad Aldoihi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1339-1370,共32页
In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for n... In the contemporary era,the global expansion of electrical grids is propelled by various renewable energy sources(RESs).Efficient integration of stochastic RESs and optimal power flow(OPF)management are critical for network optimization.This study introduces an innovative solution,the Gaussian Bare-Bones Levy Cheetah Optimizer(GBBLCO),addressing OPF challenges in power generation systems with stochastic RESs.The primary objective is to minimize the total operating costs of RESs,considering four functions:overall operating costs,voltage deviation management,emissions reduction,voltage stability index(VSI)and power loss mitigation.Additionally,a carbon tax is included in the objective function to reduce carbon emissions.Thorough scrutiny,using modified IEEE 30-bus and IEEE 118-bus systems,validates GBBLCO’s superior performance in achieving optimal solutions.Simulation results demonstrate GBBLCO’s efficacy in six optimization scenarios:total cost with valve point effects,total cost with emission and carbon tax,total cost with prohibited operating zones,active power loss optimization,voltage deviation optimization and enhancing voltage stability index(VSI).GBBLCO outperforms conventional techniques in each scenario,showcasing rapid convergence and superior solution quality.Notably,GBBLCO navigates complexities introduced by valve point effects,adapts to environmental constraints,optimizes costs while considering prohibited operating zones,minimizes active power losses,and optimizes voltage deviation by enhancing the voltage stability index(VSI)effectively.This research significantly contributes to advancing OPF,emphasizing GBBLCO’s improved global search capabilities and ability to address challenges related to local minima.GBBLCO emerges as a versatile and robust optimization tool for diverse challenges in power systems,offering a promising solution for the evolving needs of renewable energy-integrated power grids. 展开更多
关键词 Renewable energy integration optimal power flow stochastic renewable energy sources gaussian-bare-bones levy cheetah optimizer electrical network optimization carbon tax optimization
下载PDF
A Hierarchical Image Annotation Method Based on SVM and Semi-supervised EM 被引量:8
3
作者 GAO Yan-Yu YIN Yi-Xin UOZUMI Takashi 《自动化学报》 EI CSCD 北大核心 2010年第7期960-967,共8页
关键词 数字图像 自动化系统 准确性 意义 图像标注
下载PDF
密封舱室内氧气再生过程的模拟计算 被引量:2
4
作者 于志家 F Shiraishi 《工程热物理学报》 EI CAS CSCD 北大核心 2005年第5期808-810,共3页
建立了封闭舱室内氧气再生与二氧化碳降浓的数学模型,采用S-系统在对数空间内对模型进行了数值解析,通过计算机模拟计算,讨论了系统中氧气和二氧化碳浓度随时间的变化情况,以及小球藻的液相培植对气相中氧气浓度的影响。计算结果表明通... 建立了封闭舱室内氧气再生与二氧化碳降浓的数学模型,采用S-系统在对数空间内对模型进行了数值解析,通过计算机模拟计算,讨论了系统中氧气和二氧化碳浓度随时间的变化情况,以及小球藻的液相培植对气相中氧气浓度的影响。计算结果表明通过培植小球藻来再生氧气并减少二氧化碳,维持密封舱内生命生存是可能的。 展开更多
关键词 氧气再生 模拟计算 S-系统 密封舱室
下载PDF
A Refinement of Extracting Approximate Symmetry Planes Based on Least Square
5
作者 Jun Mao Hiroyuki Shioya 《Journal of Computer and Communications》 2014年第4期188-195,共8页
Extracting approximate symmetry planes is a challenge due to the difficulty of accurately measuring numerical values. Introducing the approximate symmetry planes of a 3D point set, this paper presents a new method by ... Extracting approximate symmetry planes is a challenge due to the difficulty of accurately measuring numerical values. Introducing the approximate symmetry planes of a 3D point set, this paper presents a new method by gathering normal vectors of potential of the planes, clustering the high probability ones, and then testing and verifying the planes. An experiment showed that the method is effective, robust and universal for extracting the complete approximate planes of symmetry of a random 3D point set. 展开更多
关键词 APPROXIMATE SYMMETRY Plane 3D Point Set Least SQUARES
下载PDF
Heart Rate Variability Applied to Short-Term Cardiovascular Event Risk Assessment
6
作者 Simao Paredes Teresa Rocha +3 位作者 Paulo de Carvalho Jorge Henriques Ramona Cabiddu Joao Morais 《Engineering(科研)》 2013年第10期237-243,共7页
Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital ... Cardiovascular disease (CVD) risk assessment is an important instrument to enhance the clinical decision in the daily practice as well as to improve the preventive health care promoting the transfer from the hospital to patient’s home. Due to its importance, clinical guidelines recommend the use of risk scores to predict the risk of a cardiovascular disease event. Therefore, there are several well known risk assessment tools, unfortunately they present some limitations.This work addresses this problem with two different methodologies:1) combination of risk assessment tools based on fusion of Bayesian classifiers complemented with genetic algorithm optimization;2) personalization of risk assessment through the creation of groups of patients that maximize the performance of each risk assessment tool. This last approach is implemented based on subtractive clustering applied to a reduced-dimension space.Both methodologies were developed to short-term CVD risk prediction for patients with Acute Coronary Syndromes without ST segment eleva-tion (ACS-NSTEMI). Two different real patients’ datasets were considered to validate the developed strategies:1) Santa Cruz Hospital, Portugal, N=460 patients;2)LeiriaPombal Hospital Centre, Portugal, N=99 patients.This work improved the performance in relation to current risk assessment tools reaching maximum values of sensitivity, specificity and geometric mean of, respectively, 80.0%, 82.9%, 81.5%. Besides this enhancement, the proposed methodologies allow the incorporation of new risk factors, deal with missing risk factors and avoid the selection of a single tool to be applied in the daily clinical practice. In spite of these achievements, the CVD risk assessment (patient stratification) should be improved. The incorporation of new risk factors recognized as clinically significant, namely parameters derived from heart rate variability (HRV), is introduced in this work. HRV is a strong and independent predictor of mortality in patients following acute myocardial infarction. The impact of HRV parameters in the characterization of coronary artery disease (CAD) patients will be conducted during hospitalization of these patients in the Leiria-Pombal Hospital Centre (LPHC). 展开更多
关键词 CVD Risk Assessment Knowledge Management Management of Cardiovascular Diseases Decision-Support Systems
下载PDF
Efficient Handling of Lock Hand-off in DSM Multiprocessors with Buffering Coherence Controllers 被引量:1
7
作者 Benjamín Sahelices Agustín de Dios +2 位作者 Pablo Ibáez Víctor Vials-Yúfera José María Llabería 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第1期75-91,共17页
Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order ... Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order to be serialized, requests to the same cache line can either be bounced (NACKed) or buffered in the coherence controller. In this paper, we focus mainly on systems whose coherence controllers buffer requests. In a lock hand-off, a burst of requests to the same line arrive at the coherence controller. During lock hand-off only the requests from the winning processor contribute to progress of the computation, since the winning processor is the only one that will advance the work. This key observation leads us to propose a hardware mechanism we call request bypassing, which allows requests from the winning processor to bypass the requests buffered in the coherence controller keeping the lock line. We present an inexpensive implementation of request bypassing that reduces the time spent on all the execution phases of a critical section (acquiring the lock, accessing shared data, and releasing the lock) and which, as a consequence, speeds up the whole parallel computation. This mechanism requires neither compiler or programmer support nor ISA or coherence protocol changes. By simulating a 32-processor system, we show that using request bypassing does not degrade but rather improves performance in three applications with low synchronization rates, while in those having a large amount of synchronization activity (the remaining four), we see reductions in execution time and in lock stall time ranging from 14% to 39% and from 52% to 7170, respectively. We compare request bypassing with a previously proposed technique called read combining and with a system that bounces requests, observing a significantly lower execution time with the bypassing scheme. Finally, we analyze the sensitivity of our results to some key hardware and software parameters. 展开更多
关键词 distributed shared memory multiprocessors synchronization buffer coherence controller request bypass
原文传递
LSGAN-AT:enhancing malware detector robustness against adversarial examples
8
作者 Jianhua Wang Xiaolin Chang +2 位作者 Yixiang Wang Ricardo J.Rodriguez Jianan Zhang 《Cybersecurity》 EI CSCD 2022年第1期94-108,共15页
Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.... Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME. 展开更多
关键词 Adversarial malware example Generative adversarial network Machine learning Malware detector Transferability
原文传递
LSGAN‑AT:enhancing malware detector robustness against adversarial examples
9
作者 Jianhua Wang Xiaolin Chang +2 位作者 Yixiang Wang Ricardo JRodríguez Jianan Zhang 《Cybersecurity》 EI CSCD 2021年第1期594-608,共15页
Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.... Adversarial Malware Example(AME)-based adversarial training can effectively enhance the robustness of Machine Learning(ML)-based malware detectors against AME.AME quality is a key factor to the robustness enhancement.Generative Adversarial Network(GAN)is a kind of AME generation method,but the existing GAN-based AME generation methods have the issues of inadequate optimization,mode collapse and training instability.In this paper,we propose a novel approach(denote as LSGAN-AT)to enhance ML-based malware detector robustness against Adversarial Examples,which includes LSGAN module and AT module.LSGAN module can generate more effective and smoother AME by utilizing brand-new network structures and Least Square(LS)loss to optimize boundary samples.AT module makes adversarial training using AME generated by LSGAN to generate ML-based Robust Malware Detector(RMD).Extensive experiment results validate the better transferability of AME in terms of attacking 6 ML detectors and the RMD transferability in terms of resisting the MalGAN black-box attack.The results also verify the performance of the generated RMD in the recognition rate of AME. 展开更多
关键词 Adversarial malware example Generative adversarial network Machine learning Malware detector Transferability
原文传递
On the generalized derivations of bimodules
10
作者 Hiroaki KOMATSU 《Frontiers of Mathematics in China》 SCIE CSCD 2017年第1期135-142,共8页
Recently, we introduced the notion of a generalized derivation from a bimodule to a bimodule. In this paper, we give a more general notion based on commutators which covers generalized derivations as a special case. U... Recently, we introduced the notion of a generalized derivation from a bimodule to a bimodule. In this paper, we give a more general notion based on commutators which covers generalized derivations as a special case. Using it, we show that the separability of an algebra extension is characterized by generalized derivations. 展开更多
关键词 Generalized derivation separable algebra extension
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部