This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs ...
详细信息
This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs are preprocessed to check for the presence of *** the presence is established,the signal is decomposed using EWT and the parameters of the mono-components are estimated through Yoshida *** superiority of the proposed method is tested using test signals with known parameters and simulated using actual SSO signals from the Hami Power Grid in Northwest *** show the effectiveness of the proposed EWT-Yoshida method in detecting the SSO and estimating its parameters.
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ...
详细信息
Edge computing devices in Internet-of-Things (IoT) systems are being widely used in diverse application domains including industrial automation, surveillance, and smart housing. These applications typically employ a l...
详细信息
Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Model stealing attacks on AI/ML devices undermine intellectual property rights, compromise the competitive advantage of the original model developers, and potentially expose sensitive data embedded in the model’s beh...
详细信息
Pruning refers to the elimination of trivial weights from neural networks. The sub-networks within an overparameterized model produced after pruning are often called Lottery tickets. This research aims to generate win...
详细信息
This paper introduces a decoupled dual-element array antenna designed to address the challenges of mutual coupling between elements. To tackle this issue, a neutralization line is strategically incorporated to suppres...
详细信息
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a...
详细信息
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions are firstly detected using visual primitives such as color and shape and then grouped and merged into a co-saliency map. However, co-saliency is intrinsically perceived complexly with bottom-up and top-down strategies combined in human vision. To address this problem, this study proposes a novel end-toend trainable network comprising a backbone net and two branch nets. The backbone net uses ground-truth masks as top-down guidance for saliency prediction, whereas the two branch nets construct triplet proposals for regional feature mapping and clustering, which drives the network to be bottom-up sensitive to co-salient regions. We construct a new dataset of 2019 natural images with co-saliency in each image to evaluate the proposed method. Experimental results show that the proposed method achieves state-of-the-art accuracy with a running speed of 28 fps.
The growing prevalence of Internet of Things (IoT) devices has heightened vulnerabilities to botnet-based cyberattacks, necessitating robust detection mechanisms. This paper proposes DenseRSE-ASPPNet, an advanced deep...
详细信息
This paper investigates the fundamental trade-offs between block safety, confirmation latency, and transaction throughput of proof-of-work (PoW) longest-chain fork-choice protocols, also known as PoW Nakamoto consensu...
详细信息
暂无评论