In order to improve the protection reliability of asymmetric fault, real-time and accurate sequence current is very indispensable. This paper proposes a simple and effective method based on park transformation theory ...
详细信息
ISBN:
(纸本)9781509030712
In order to improve the protection reliability of asymmetric fault, real-time and accurate sequence current is very indispensable. This paper proposes a simple and effective method based on park transformation theory and conducts research on positive-current, negative-current and zero-sequence current. Moreover, the harmonic currents, active current and reactive current can be calculated. Through simulation experiment, the validity and feasibility of paper method have been confirmed.
The detection of electronic components plays an important role in improving the intelligence level of the manufacturing industry, but there is a problem of poor detection accuracy. Neural network algorithms cannot imp...
详细信息
This paper presents a novel circular tablet defect detection algorithm based on machine learning techniques to address the challenge of insufficient data for training samples. Utilizing cameras, lenses, and light sour...
详细信息
The field of intelligent detection is a very potential research direction. Deep learning technology can collect vehicle flow data, detection signals and pedestrian location information in automatic stations in real ti...
详细信息
Physical uplink control channel (PUCCH) is used for carrying uplink control information important, and the detection algorithm of PUCCH is also very important for system performance. The modulation and coding schemes ...
详细信息
ISBN:
(纸本)9781728125992
Physical uplink control channel (PUCCH) is used for carrying uplink control information important, and the detection algorithm of PUCCH is also very important for system performance. The modulation and coding schemes with different formats are discussed in this paper, and corresponding detection algorithms are proposed for different scenarios, and the performance comparison of the proposed algorithms are also present.
Passive optical networks are widely used as a promising solution for future access networks. Currently, the bandwidth is still increasing which means the current copper networks are not able to transfer new services s...
详细信息
Passive optical networks are widely used as a promising solution for future access networks. Currently, the bandwidth is still increasing which means the current copper networks are not able to transfer new services such as 4K video, live streaming, etc. In other words, they reached their capacity limit. The passive optical networks rely on point-to-multipoint technology. That means each customer uses a share medium by time slots. Each time slot exactly specifies who and when is able to transfer data. In general, this control mechanism is implemented in the optical network unit by worst transmission convergence layer. On the other hand, there are cases when the optical network unit (it is called rogue optical network unit) does not follow instructions provided by the optical line termination, for example, if an attacker modifies a firm ware of the end unit and/or when the control protocol is not loaded properly inside optical network unit. In worst case, the optical network unit transmits data in a continual mode (other optical network units cannot send data). The standard defines finding of the rogue optical network unit but it does not specify how the rogue optical network unit should be allocated because the frames of the rogue optical network unit do not contain the proper parameters. We realized a measurement in a real network with the rogue optical network unit and then we analyzed the captured data. A new algorithm for the rogue optical network unit allocation is presented. We do not consider any modification of the transmission convergence layer in gigabit passive optical networks.
Recommender system is widely used in various fields for dealing with information overload effectively, and collaborative filtering plays a vital role in the system. However, recommender system suffers from its vulnera...
详细信息
Recommender system is widely used in various fields for dealing with information overload effectively, and collaborative filtering plays a vital role in the system. However, recommender system suffers from its vulnerabilities by malicious attacks significantly, especially, shilling attacks because of the open nature of recommender system and the dependence on data. Therefore, detecting shilling attack has become an important issue to ensure the security of recommender system. Most of the existing methods of detecting shilling attack are based on user ratings, and one limitation is that they are likely to be interfered by obfuscation techniques. Moreover, traditional detection algorithms cannot handle different types of shilling attacks flexibly. In order to solve the problems, we proposed an outlier degree shilling attack detection algorithm by using dynamic feature selection. Considering the differences when users choose items, we combined rating-based indicators with user popularity, and utilized the information entropy to select detection indicators dynamically. Therefore, a variety of shilling attack models can be dealt with flexibility in this way. The experiments show that the proposed algorithm can achieve better detection performance and interference immunity.
In order to obtain the best scheme of safety production and operation decision-making of a smart factory and improve the rapid response ability of product information of a smart factory, the safety production detectio...
详细信息
In order to obtain the best scheme of safety production and operation decision-making of a smart factory and improve the rapid response ability of product information of a smart factory, the safety production detection algorithm of a smart factory is designed by using programmable computer (PC) control technology. The main interface, login interface, function interface, and navigation interface are designed, respectively, to realize the front-end design of the smart factory safety production detection platform. Based on PC control technology, the hardware equipment of perception layer, network layer, and application layer are installed, and on this basis, the database of the smart factory safety production detection platform is established. Once the operation data information is collected and detected, it is stored to the equipment fault experience knowledge base, and the fault diagnosis method of the minimum cut set of the fault tree is used to implement the on-site equipment diagnosis of the underlying Internet of Things of the smart factory, and finally the information sharing function of safety production detection through the information transmission of the safety production links of each smart factory is realized. Experiments show that the throughput data of the designed algorithm run stably, improve the control accuracy of safety production, and effectively improve the work efficiency.
Fiducial markers are fundamental components of many computer vision systems that help, through their unique features (e.g., shape, color), a fast localization of spatial objects in unstructured scenarios. They find ap...
详细信息
Fiducial markers are fundamental components of many computer vision systems that help, through their unique features (e.g., shape, color), a fast localization of spatial objects in unstructured scenarios. They find applications in many scientific and industrial fields, such as augmented reality, human-robot interaction, and robot navigation. In order to overcome the limitations of traditional paper-printed fiducial markers (i.e. deformability of the paper surface, incompatibility with industrial and harsh environments, complexity of the shape to reproduce directly on the piece), we aim at exploiting existing, or additionally fabricated, structural features on rigid bodies (e.g., holes), developing a fiducial mechanical marker system called MechaTag. Our system, endowed with a dedicated algorithm, is able to minimize recognition errors and to improve repeatability also in case of ill boundary conditions (e.g., partial illumination). We assess MechaTag in a pilot study, achieving a robustness of fiducial marker recognition above 95% in different environment conditions and position configurations. The pilot study was conducted by guiding a robotic platform in different poses in order to experiment with a wide range of working conditions. Our results make MechaTag a reliable fiducial marker system for a wide range of robotic applications in harsh industrial environments without losing accuracy of recognition due to the shape and material.
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm ...
详细信息
One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm and paste it to another place of the same image. Two main approaches to copy-move detection exist nowadays: feature-based and hash-based. Most of the algorithms are developed according to the feature-based approach, whereas the hash-based approach is used only for plain copy-move detection (when the copied image fragment is not transformed). However, the main advantage of hash-based algorithms is low computational complexity. In this paper, we propose a new hash-based copy-move detection algorithm that can be applied to transformed duplicates detection due to a special preprocessing procedure. This procedure implements initial image transformation to incorporate the changes (affine transforms are not considered in this paper), produced by a transform algorithm on the second stage. Several preprocessing procedures are compared during experiments: image intensity range reduction, gradient calculation, expansion in orthonormal basis, adaptive linear contrast enhancement and local binary pattern.
暂无评论