Driven by the increasing needs for production safety, a fault detection method based on multi-sensor fusion with adaptive weight coefficients is proposed in this paper to make full use of multi-measuring points inform...
Driven by the increasing needs for production safety, a fault detection method based on multi-sensor fusion with adaptive weight coefficients is proposed in this paper to make full use of multi-measuring points information. To this end, considering the different information among multi-measuring points, the variance contribution rate (VCR) of vibration signals are used to design adaptive weight coefficients for data fusion to fully utilize the information contained in each vibration signal. On this basis, the least atoms contain time domain and frequency domain are extracted based on dictionary sparse representation (DSR) algorithm to represent the feature information of the original signal to weaken the influence of the curse of dimensionality. Finally, K-nearest neighbor distance is used in sparse residual space (SRS) for fault detection (K-SRS). The effectiveness of the proposed method is demonstrated by the rolling bearings data, and results show the advantage of our proposed approach.
Medoids-based fuzzy relational clustering generates clusters of objects based on relational data, which records pairwise similarity or dissimilarities among objects. Compared with single-medoid based approaches, multi...
详细信息
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state inf...
详细信息
ISBN:
(纸本)9781424479573
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state information of the data structure used in the AC-4 algorithm after the process of arc consistency. The algorithm sorts the values of the variables' domain according to the key importance of the values. So this order forces the solving algorithm to give priority to extend the key values of variables. In this way, the efficiency of the solving algorithm can be improved a lot. The result of our experiments shows that our algorithm has much more advantage over other solving algorithms.
In mobile edge computing, computing and storage resources are close to the network of the user device, which can effectively reduce network access and computing service delay. However, network function virtualization ...
详细信息
In this paper, we proposed a new image fusion scheme on spatial domain. The interest of the scheme is its real time. The framework contains two steps: saliency detection and coefficient selection based on the principl...
详细信息
Neural network pruning is a popular approach to reducing the computational complexity of deep neural *** recent years,as growing evidence shows that conventional network pruning methods employ inappropriate proxy metr...
详细信息
Neural network pruning is a popular approach to reducing the computational complexity of deep neural *** recent years,as growing evidence shows that conventional network pruning methods employ inappropriate proxy metrics,and as new types of hardware become increasingly available,hardware-aware network pruning that incorporates hardware characteristics in the loop of network pruning has gained growing attention,Both network accuracy and hardware efficiency(latency,memory consumption,etc.)are critical objectives to the success of network pruning,but the conflict between the multiple objectives makes it impossible to find a single optimal *** studies mostly convert the hardware-aware network pruning to optimization problems with a single *** this paper,we propose to solve the hardware-aware network pruning problem with Multi-Objective Evolutionary Algorithms(MOEAs).Specifically,we formulate the problem as a multi-objective optimization problem,and propose a novel memetic MOEA,namely HAMP,that combines an efficient portfoliobased selection and a surrogate-assisted local search,to solve *** studies demonstrate the potential of MOEAs in providing simultaneously a set of alternative solutions and the superiority of HAMP compared to the state-of-the-art hardware-aware network pruning method.
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b...
详细信息
ISBN:
(纸本)9789881404732
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also be used to access secret information of crypto chips, and thus threaten dramatically the security of the cipher keys. In this paper, we propose a secure scan DFT architecture to thwart scan-based side-channel attacks. This architecture provides the scan chain reset mechanism, and thus can prevent these attacks based on mode switching. Meanwhile, the secret key is isolated from scan chains of an advanced encryption standard (AES) design in the test mode. Therefore, it can also halt the test-mode-only scan attacks. The proposed secure scan DFT technique ensures the security without compromising the testability of original chip. Most important of all, the secure scan test is implemented with extremely low hardware overhead.
Classification methods has become increasingly popular for biomedical and bioinformatical data analysis. However, due to the difficulty of data acquisition, sometimes we could only obtain small-scale datasets which ma...
详细信息
ISBN:
(纸本)9781509016129
Classification methods has become increasingly popular for biomedical and bioinformatical data analysis. However, due to the difficulty of data acquisition, sometimes we could only obtain small-scale datasets which may leads to unreasonable generalization performances. For SVM-like algorithms, we could resort to Large Margin theory to find out solutions for such dilemma. Recent studies on large margin theory show that, besides maximizing the minimum margin of a given training dataset, it is also necessary to optimization the margin distribution to boost the overall generalization ability. Correspondingly, a novel SVM-like algorithm called Large Margin Distribution Machine (LDM) realizes this idea by maximizing the average of margin and minimizing the variance of margin simultaneously. And a series of applications has been reported thereafter. There is another well-known machine learning algorithm called Extreme Learning Machine (ELM) which shares similar framework with SVM. It is believed in this paper ELM could also benefit from the virtues of margin distribution optimization. Bearing this in mind, a novel algorithm called Extreme Large Margin Distribution Machine(ELDM) is proposed in this paper by bridging the advantages of ELM and LDM. And an efficient extension of ELDM for multi-class classifications under One vs. All Scheme is proposed subsequently. Finally, the experiment results on both benchmark datasets and biomedical classification datasets show the effectiveness of our proposed algorithm.
KATAN is a family of block ciphers published at CHES 2009. Based on the Mixed-integer linear programming(MILP) technique, we propose the first third-party linear cryptanalysis on KATAN. Furthermore, we evaluate the se...
详细信息
暂无评论