期刊文献+
共找到413篇文章
< 1 2 21 >
每页显示 20 50 100
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things
1
作者 Mengmeng Zhao Haipeng Peng +1 位作者 Lixiang Li Yeqing Ren 《Computers, Materials & Continua》 SCIE EI 2024年第8期2815-2837,共23页
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A... In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods. 展开更多
关键词 Multivariate time series anomaly detection spatial-temporal network TRANSFORMER
下载PDF
A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT
2
作者 Yifan Liu Shancang Li +1 位作者 Xinheng Wang Li Xu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1233-1261,共29页
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated... The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats. 展开更多
关键词 Cyber security Industrial Internet of Things artificial intelligence machine learning algorithms hybrid cyber threats
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
3
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Research on Detection Technology of Micro-Components on Circuit Board Based on Digital Image Processing
4
作者 Aibin Tang Yi Liu +1 位作者 Chunyin Liu Libin Yang 《Journal of Electronic Research and Application》 2024年第3期230-233,共4页
Aiming at the stability of the circuit board image in the acquisition process,this paper realizes the accurate registration of the image to be registered and the standard image based on the SIFT feature operator and R... Aiming at the stability of the circuit board image in the acquisition process,this paper realizes the accurate registration of the image to be registered and the standard image based on the SIFT feature operator and RANSAC algorithm.The device detection model and data set are established based on Faster RCNN.Finally,the number of training was continuously optimized,and when the loss function of Faster RCNN converged,the identification result of the device was obtained. 展开更多
关键词 Tiny device recognition Image registration SIFT feature operator RANSAC algorithm Faster RCN
下载PDF
Indirect Vector Control of Linear Induction Motors Using Space Vector Pulse Width Modulation 被引量:1
5
作者 Arjmand Khaliq Syed Abdul Rahman Kashif +5 位作者 Fahad Ahmad Muhammad Anwar Qaisar Shaheen Rizwan Akhtar Muhammad Arif Shah Abdelzahir Abdelmaboud 《Computers, Materials & Continua》 SCIE EI 2023年第3期6263-6287,共25页
Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.T... Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation(SVPWM)inverters.The framework under consideration is developed in four stages.To begin,MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamicmodel.The research presents a modified SVPWM inverter control scheme.By tuning the proportional-integral(PI)controller with a transfer function,optimized values for the PI controller are derived.All the subsystems mentioned above are integrated to create a robust simulation of the LIM’s precise speed and thrust force control scheme.The reference speed values were chosen to evaluate the performance of the respective system,and the developed system’s response was verified using various data sets.For the low-speed range,a reference value of 10m/s is used,while a reference value of 100 m/s is used for the high-speed range.The speed output response indicates that themotor reached reference speed in amatter of seconds,as the delay time is between 8 and 10 s.The maximum amplitude of thrust achieved is less than 400N,demonstrating the controller’s capability to control a high-speed LIM with minimal thrust ripple.Due to the controlled speed range,the developed system is highly recommended for low-speed and high-speed and heavy-duty traction applications. 展开更多
关键词 Space vector pulse width modulation linear induction motor proportional-integral controller indirect vector control electromechanical dynamic modeling
下载PDF
AR Display Method of a Person's Identifier near the Head on a Camera Screen Based on the GPS Information and Face Detection Using Ad hoc and P2P Networking
6
作者 Masahiro Gotou Kazumasa Takami 《Computer Technology and Application》 2016年第4期196-208,共13页
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ... The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments. 展开更多
关键词 Ad hoc networking AR (augmented reality) face detection GPS information person's identifier P2P communication smartphone.
下载PDF
The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study
7
作者 James A. Rodger Ganesh Bhatt +2 位作者 Pankaj Chaudhary Germaine Kline William McCloy 《Intelligent Information Management》 2015年第4期223-229,共7页
Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a fir... Disaster recovery (DR) and business continuity (BC) have been important areas of inquiry for both business managers and academicians. It is now widely believed that for achieving sustainable business continuity, a firm must be able to recover from both man-made and natural disasters. This is especially true for maintaining and recovering the lifeline of the organization and its data. Although the literature has discussed the importance of disaster recovery and business continuity, there is not much known about how Information System Data Analytics Resilience (ISDAR) and the organization’s ability to recover from lost information. In this research, we take a step in this direction and analyze the relationship of IS personnel expertise on ISDAR and investigate Information System (IS) personnel understanding of the firm’s competitive priorities, IS Personnel understanding of business policies and objectives, IS personnel’s ability to solve business problems, IS personnel initiatives in changing business processes and their determination and attentiveness to focus on achieving confident leadership in data and analytics resilience. We collected data through a survey of IS and business managers from 302 participants. Our results show that there is evidence to support our hypothesis and that there may indeed be a relationship between these variables. 展开更多
关键词 Disaster Recovery BUSINESS CONTINUITY Data ANALYTICS RESILIENCE
下载PDF
Google Scholar University Ranking Algorithm to Evaluate the Quality of Institutional Research
8
作者 Noor Ul Sabah Muhammad Murad Khan +3 位作者 Ramzan Talib Muhammad Anwar Muhammad Sheraz Arshad Malik Puteri Nor Ellyza Nohuddin 《Computers, Materials & Continua》 SCIE EI 2023年第6期4955-4972,共18页
Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertation... Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertations,which has always been controversial.Hence,this research paper is influenced by the institutes ranking all over the world.The data of institutes are obtained through Google Scholar(GS),as input to investigate the United Kingdom’s Research Excellence Framework(UK-REF)process.For this purpose,the current research used a Bespoke Program to evaluate the institutes’ranking based on their source.The bespoke program requires changes to improve the results by addressing these methodological issues:Firstly,Redundant profiles,which increased their citation and rank to produce false results.Secondly,the exclusion of theses and dissertation documents to retrieve the actual publications to count for citations.Thirdly,the elimination of falsely owned articles from scholars’profiles.To accomplish this task,the experimental design referred to collecting data from 120 UK-REF institutes and GS for the present year to enhance its correlation analysis in this new evaluation.The data extracted from GS is processed into structured data,and afterward,it is utilized to generate statistical computations of citations’analysis that contribute to the ranking based on their citations.The research promoted the predictive approach of correlational research.Furthermore,experimental evaluation reported encouraging results in comparison to the previous modi-fication made by the proposed taxonomy.This paper discussed the limitations of the current evaluation and suggested the potential paths to improve the research impact algorithm. 展开更多
关键词 Google scholar institutes ranking research assessment exercise research excellence framework impact evaluation citation data
下载PDF
Design of a new kind of chemical experiment container with virtual reality fusion
9
作者 Lurong YANG Zhiquan FENG Junhong MENG 《Virtual Reality & Intelligent Hardware》 EI 2023年第4期317-337,共21页
Background At present,the teaching of experiments in primary and secondary schools is affected by cost and security factors.Existing research on virtual experiment platforms has alleviated these problems.However,the l... Background At present,the teaching of experiments in primary and secondary schools is affected by cost and security factors.Existing research on virtual experiment platforms has alleviated these problems.However,the lack of real experimental equipment and use of a single channel to understand user intentions weaken these platforms operationally and degrade the naturalness of interactions.Methods To solve these problems,we propose an intelligent experimental container structure and a situational awareness algorithm,both of which are verified and applied to a chemical experiment involving virtual-real fusion.First,the acquired images are denoised in the visual channel using the maximum diffuse reflection chroma to remove overexposure.Second,container situational awareness is realized by segmenting the image liquid level and establishing a relation-fitting model.Then,strategies for constructing complete behaviors and making priority comparisons among behaviors are adopted for information complementarity and independence,respectively.A multichannel intentional understanding model and an inter-active paradigm that integrates vision,hearing,and touch are proposed.Results The experimental results show that the accuracy of the intelligent container situation awareness proposed in this paper reaches 99%,and the accuracy of the proposed intention understanding algorithm reaches 94.7%.The test shows that the intelligent experimental system based on the new interaction paradigm also has better performance and a more realistic sense of operation experience in terms of experimental efficiency.Conclusion The results indicate that the proposed experimental container and algorithm can achieve a natural level of human-computer interaction in a virtual chemical experiment platform,enhance the user′s sense of operation,and achieve high levels of user satisfaction. 展开更多
关键词 Multichannel intent fusion understanding Virtual-real fusion Natural interaction Remove image highlights Nonlinear curve fitting
下载PDF
Classification of Electrocardiogram Signals for Arrhythmia Detection Using Convolutional Neural Network
10
作者 Muhammad Aleem Raza Muhammad Anwar +4 位作者 Kashif Nisar Ag.Asri Ag.Ibrahim Usman Ahmed Raza Sadiq Ali Khan Fahad Ahmad 《Computers, Materials & Continua》 SCIE EI 2023年第12期3817-3834,共18页
With the help of computer-aided diagnostic systems,cardiovascular diseases can be identified timely manner to minimize the mortality rate of patients suffering from cardiac disease.However,the early diagnosis of cardi... With the help of computer-aided diagnostic systems,cardiovascular diseases can be identified timely manner to minimize the mortality rate of patients suffering from cardiac disease.However,the early diagnosis of cardiac arrhythmia is one of the most challenging tasks.The manual analysis of electrocardiogram(ECG)data with the help of the Holter monitor is challenging.Currently,the Convolutional Neural Network(CNN)is receiving considerable attention from researchers for automatically identifying ECG signals.This paper proposes a 9-layer-based CNN model to classify the ECG signals into five primary categories according to the American National Standards Institute(ANSI)standards and the Association for the Advancement of Medical Instruments(AAMI).The Massachusetts Institute of Technology-Beth Israel Hospital(MIT-BIH)arrhythmia dataset is used for the experiment.The proposed model outperformed the previous model in terms of accuracy and achieved a sensitivity of 99.0%and a positivity predictively 99.2%in the detection of a Ventricular Ectopic Beat(VEB).Moreover,it also gained a sensitivity of 99.0%and positivity predictively of 99.2%for the detection of a supraventricular ectopic beat(SVEB).The overall accuracy of the proposed model is 99.68%. 展开更多
关键词 ARRHYTHMIA ECG signal deep learning convolutional neural network physioNet MIT-BIH arrhythmia database
下载PDF
Probability Based Regression Analysis for the Prediction of Cardiovascular Diseases
11
作者 Wasif Akbar Adbul Mannan +3 位作者 Qaisar Shaheen Mohammad Hijji Muhammad Anwar Muhammad Ayaz 《Computers, Materials & Continua》 SCIE EI 2023年第6期6269-6286,共18页
Machine Learning(ML)has changed clinical diagnostic procedures drastically.Especially in Cardiovascular Diseases(CVD),the use of ML is indispensable to reducing human errors.Enormous studies focused on disease predict... Machine Learning(ML)has changed clinical diagnostic procedures drastically.Especially in Cardiovascular Diseases(CVD),the use of ML is indispensable to reducing human errors.Enormous studies focused on disease prediction but depending on multiple parameters,further investigations are required to upgrade the clinical procedures.Multi-layered implementation of ML also called Deep Learning(DL)has unfolded new horizons in the field of clinical diagnostics.DL formulates reliable accuracy with big datasets but the reverse is the case with small datasets.This paper proposed a novel method that deals with the issue of less data dimensionality.Inspired by the regression analysis,the proposed method classifies the data by going through three different stages.In the first stage,feature representation is converted into probabilities using multiple regression techniques,the second stage grasps the probability conclusions from the previous stage and the third stage fabricates the final classifications.Extensive experiments were carried out on the Cleveland heart disease dataset.The results show significant improvement in classification accuracy.It is evident from the comparative results of the paper that the prevailing statistical ML methods are no more stagnant disease prediction techniques in demand in the future. 展开更多
关键词 Machine learning heart disease cardiac disease deep regression regression learning
下载PDF
The Review of Secret Image Sharing
12
作者 Yao Wan Lingzhi Liao +3 位作者 Zhili Zhou Hengfu Yang Fei Peng Zhilin Huo 《Journal of New Media》 2023年第1期45-53,共9页
Secret image sharing(SIS)is a significant research topic of image information hiding,which divides the image into multiple shares and dis-tributes them to multiple parties for management and preservation.In order to r... Secret image sharing(SIS)is a significant research topic of image information hiding,which divides the image into multiple shares and dis-tributes them to multiple parties for management and preservation.In order to reconstruct the original image,a subset with predetermined number of shares is needed.And just because it is not necessary to use all of the shares to make a reconstruction,SIS creates a high fault tolerance which breaks the limitations of traditional image protection methods,but at the same time,it causes a reduce of safety.Recently,new technologies,such as deep learning and blockchain,have been applied into SIS to improve its efficiency and security.This paper gives an overall review of SIS,discusses four important approaches for SIS,and makes a comparison analysis among them from the perspectives of pixel expansion,tamper resistance,etc.At the end,this paper indicates the possible research directions of SIS in the future. 展开更多
关键词 Secret image sharing blockchain deep learning
下载PDF
Improvement of Teaching Management Mechanism for Engineering Education Accreditation
13
作者 Yi Qian 《Journal of Contemporary Educational Research》 2023年第9期46-51,共6页
In the context of engineering education accreditation,the teaching management mechanism should be student-centered and continuously improved.Therefore,the work of teaching secretaries and teaching supervisors also nee... In the context of engineering education accreditation,the teaching management mechanism should be student-centered and continuously improved.Therefore,the work of teaching secretaries and teaching supervisors also needs to be adjusted accordingly,in order to improve work efficiency and quality.This paper discusses the main contents and significance of engineering education accreditation,analyzes the relationship between teaching supervision,teaching secretary,and engineering education accreditation,applies the concept of engineering education accreditation to the work management of teaching secretary and teaching supervision,and proposes countermeasures to improve the work effect of teaching supervision and teaching secretary under the concept of engineering education accreditation. 展开更多
关键词 Engineering education accreditation Teaching secretary Teaching supervision
下载PDF
STARLIKENESS ASSOCIATED WITH THE SINE HYPERBOLIC FUNCTION
14
作者 Mohsan RAZA Hadiqa ZAHID Jinlin LIU 《Acta Mathematica Scientia》 SCIE CSCD 2024年第4期1244-1270,共27页
Let q_(λ)(z)=1+λsinh(ζ),0<λ<1/sinh(1)be a non-vanishing analytic function in the open unit disk.We introduce a subclass S^(*)(q_(λ))of starlike functions which contains the functions f such that zf'/f i... Let q_(λ)(z)=1+λsinh(ζ),0<λ<1/sinh(1)be a non-vanishing analytic function in the open unit disk.We introduce a subclass S^(*)(q_(λ))of starlike functions which contains the functions f such that zf'/f is subordinated by q_(λ).We establish inclusion and radii results for the class S^(*)(q_(λ))for several known classes of starlike functions.Furthermore,we obtain sharp coefficient bounds and sharp Hankel determinants of order two for the class S^(*)(q_(λ)).We also find a sharp bound for the third Hankel determinant for the caseλ=1/2. 展开更多
关键词 starlike functions sine hyperbolic functions radii problems coefficient bounds Hankel determinants
下载PDF
Detecting LLM-assisted writing in scientific communication:Are we there yet?
15
作者 Teddy Lazebnik Ariel Rosenfeld 《Journal of Data and Information Science》 CSCD 2024年第3期4-13,共10页
Large Language Models(LLMs),exemplified by ChatGPT,have significantly reshaped text generation,particularly in the realm of writing assistance.While ethical considerations underscore the importance of transparently ac... Large Language Models(LLMs),exemplified by ChatGPT,have significantly reshaped text generation,particularly in the realm of writing assistance.While ethical considerations underscore the importance of transparently acknowledging LLM use,especially in scientific communication,genuine acknowledgment remains infrequent.A potential avenue to encourage accurate acknowledging of LLM-assisted writing involves employing automated detectors.Our evaluation of four cutting-edge LLM-generated text detectors reveals their suboptimal performance compared to a simple ad-hoc detector designed to identify abrupt writing style changes around the time of LLM proliferation.We contend that the development of specialized detectors exclusively dedicated to LLM-assisted writing detection is necessary.Such detectors could play a crucial role in fostering more authentic recognition of LLM involvement in scientific communication,addressing the current challenges in acknowledgment practices. 展开更多
关键词 LLM-assisted writing Scientific communication Writing style
下载PDF
Image Fusion Using Wavelet Transformation and XGboost Algorithm
16
作者 Shahid Naseem Tariq Mahmood +4 位作者 Amjad Rehman Khan Umer Farooq Samra Nawazish Faten S.Alamri Tanzila Saba 《Computers, Materials & Continua》 SCIE EI 2024年第4期801-817,共17页
Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful ... Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators. 展开更多
关键词 Image fusion max-min average CWT XGBoost DCT inclusive innovations spatial and frequency domain
下载PDF
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
17
作者 Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt +2 位作者 Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng 《Computers, Materials & Continua》 SCIE EI 2024年第8期2557-2578,共22页
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications... In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications.Therefore,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing environments.Effective task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog nodes.This process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource bottlenecks.In this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local exploitation.This balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization algorithms.The FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response time.In relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks. 展开更多
关键词 Fog computing fractional selectivity approach particle swarm optimization algorithm task scheduling virtual machine allocation
下载PDF
EDU-GAN:Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising
18
作者 Yunjing Liu Erhu Zhang +2 位作者 Jingjing Wang Guangfeng Lin Jinghong Duan 《Computers, Materials & Continua》 SCIE EI 2024年第7期1633-1653,共21页
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research issue.Different fromnatural images,character images pay more attention to stroke information.Howev... Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research issue.Different fromnatural images,character images pay more attention to stroke information.However,existingmodelsmainly consider pixel-level informationwhile ignoring structural information of the character,such as its edge and glyph,resulting in reconstructed images with mottled local structure and character damage.To solve these problems,we propose a novel generative adversarial network(GAN)framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework,i.e.,EDU-GAN.Unlike existing frameworks,the generator introduces the edge extractionmodule,guiding it into the denoising process through the attention mechanism,which maintains the edge detail of the restored inscription image.Moreover,a dual-domain U-Net-based discriminator is proposed to learn the global and local discrepancy between the denoised and the label images in both image and morphological domains,which is helpful to blind denoising tasks.The proposed dual-domain discriminator and generator for adversarial training can reduce local artifacts and keep the denoised character structure intact.Due to the lack of a real-inscription image,we built the real-inscription dataset to provide an effective benchmark for studying inscription image denoising.The experimental results show the superiority of our method both in the synthetic and real-inscription datasets. 展开更多
关键词 Dual-domain discriminators inscription images DENOISING edge-guided generator
下载PDF
Maximizing Solar Potential Using the Differential Grey Wolf Algorithm for PV System Optimization
19
作者 Ezhilmathi Nagarathinam Buvana Devaraju +4 位作者 Karthiyayini Jayamoorthy Padmavathi Radhakrishnan Santhana Lakshmi ChandraMohan Vijayakumar Perumal Karthikeyan Balakrishnan 《Energy Engineering》 EI 2024年第8期2129-2142,共14页
Maximum Power Point Tracking(MPPT)is crucial for maximizing the energy output of photovoltaic(PV)systems by continuously adjusting the operating point of the panels to track the point of maximum power production under... Maximum Power Point Tracking(MPPT)is crucial for maximizing the energy output of photovoltaic(PV)systems by continuously adjusting the operating point of the panels to track the point of maximum power production under changing environmental conditions.This work proposes the design of an MPPT system for solar PV installations using the Differential Grey Wolf Optimizer(DGWO).It dynamically adjusts the parameters of the MPPT controller,specifically the duty cycle of the SEPIC converter,to efficiently track the Maximum Power Point(MPP).The proposed system aims to enhance the energy harvesting capability of solar PV systems by optimizing their performance under varying solar irradiance,temperature and shading conditions.Simulation results demonstrate the effectiveness of the DGWO-based MPPT system in maximizing the power output of solar PV installations compared to conventional MPPT methods.This research contributes to the development of advanced MPPT techniques for improving the efficiency and reliability of solar energy systems. 展开更多
关键词 DGWO SEPIC converter MPPT PV module
下载PDF
An Underwater Robot Inspection Anomaly Localization Feedback System Based on Sonar Technology
20
作者 Siqiang Cheng Yi Liu +1 位作者 Aibin Tang Libin Yang 《Journal of Electronic Research and Application》 2024年第4期17-21,共5页
This article introduces an underwater robot inspection anomaly localization feedback system comprising a real-time water surface tracking,detection,and positioning system located on the water surface,while the underwa... This article introduces an underwater robot inspection anomaly localization feedback system comprising a real-time water surface tracking,detection,and positioning system located on the water surface,while the underwater robot inspection anomaly feedback system is housed within the underwater robot.The system facilitates the issuance of corresponding mechanical responses based on the water surface’s real-time tracking,detection,and positioning,enabling recognition and feedback of anomaly information.Through sonar technology,the underwater robot inspection anomaly feedback system monitors the underwater robot in real-time,triggering responsive actions upon encountering anomalies.The real-time tracking,detection,and positioning system from the water surface identifies abnormal conditions of underwater robots based on changes in sonar images,subsequently notifying personnel for necessary intervention. 展开更多
关键词 Underwater robots Positioning feedback system Sonar real-time tracking
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部