Mineral oil is the most frequent insulating liquid used in oil-immersed transformers for electrical insulation and heat ***,oil-based nanofluids are becoming more popular in scientific research as they have proved to ...
详细信息
Mineral oil is the most frequent insulating liquid used in oil-immersed transformers for electrical insulation and heat ***,oil-based nanofluids are becoming more popular in scientific research as they have proved to have better dielectric and thermal *** applying these nanofluids into actual transformers,they would be exposed to thermal and electrical ***,The aim of the authors is to investigate the generation pattern of dissolved gases in nanofluids under thermal and electrical faults and to assess the applicability of traditional Dissolved Gas Analysis(DGA)techniques if oil-based nanofluids are used in ***-based nanofluid samples were prepared using a magnetic stirrer and an ultrasonic homogeniser and then subjected to simulated thermal and electrical faults in the laboratory using properly sealed test *** types of metal oxides,Silicon dioxide,Titanium dioxide,and Aluminium oxide nanoparticles,have been used to prepare nanofluids with 0.02 g/L and 0.04 g/L *** gases released and dissolved into oil due to the simulated faults were analysed and compared to traditional mineral oil as a *** dielectric dissipation factor was obtained and analysed for all *** to the findings,the presence and concentration of nanoparticles were shown to influence the amount of gases *** a result,this research is crucial in guaranteeing that traditional DGA techniques can be employed in transformers that use oil-based nanofluids.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Electroforming emerges as a pivotal and cost-efficient technology, transforming products not only by enhancing their resistance to corrosion but also by elevating their aesthetic appeal. This process applies a precise...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
This study presents a general optimal trajectory planning(GOTP)framework for autonomous vehicles(AVs)that can effectively avoid obstacles and guide AVs to complete driving tasks safely and ***,we employ the fifth-orde...
详细信息
This study presents a general optimal trajectory planning(GOTP)framework for autonomous vehicles(AVs)that can effectively avoid obstacles and guide AVs to complete driving tasks safely and ***,we employ the fifth-order Bezier curve to generate and smooth the reference path along the road *** coordinates are then transformed to achieve the curvature continuity of the generated *** the road constraints and vehicle dynamics,limited polynomial candidate trajectories are generated and smoothed in a curvilinear coordinate ***,in selecting the optimal trajectory,we develop a unified and auto-tune objective function based on the principle of least action by employing AVs to simulate drivers’behavior and summarizing their manipulation characteristics of“seeking benefits and avoiding losses.”Finally,by integrating the idea of receding-horizon optimization,the proposed framework is achieved by considering dynamic multi-performance objectives and selecting trajectories that satisfy feasibility,optimality,and *** simulations and experiments are performed,and the results demonstrate the framework’s feasibility and effectiveness,which avoids both dynamic and static obstacles and applies to various scenarios with multi-source interactive traffic ***,we prove that the proposed method can guarantee real-time planning and safety requirements compared to drivers’manipulation.
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual gen...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation ***,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external *** residual evaluation module is developed based on the suggested series and parallel ***,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and *** obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
This study presents a detailed survey on the use of the Internet of Things (IoT) for predictive maintenance and monitoring of cultural heritage, focusing on museums and exhibitions. The integration of IoT in these fie...
详细信息
暂无评论