This paper proposes a new cluster method combined with Dynamic Mode Decomposition with Control (DMDc), and the Proper Orthogonal Decomposition (POD) to construct more accurate reduced order models. DMDc and POD are po...
This study focuses on creating an accurate reflection prediction model that will guide the design of filters with multilayer Anti-Reflection Coating (ARC) to optimize the thickness parameters using Machine Learning (M...
详细信息
This study focuses on creating an accurate reflection prediction model that will guide the design of filters with multilayer Anti-Reflection Coating (ARC) to optimize the thickness parameters using Machine Learning (ML) and Deep Learning (DL) techniques. This model aims to shed light on the design process of a multilayer optical filter, making it more cost-effective by providing faster and more precise production. In creating this model, a dataset containing data obtained from 3000 (1500 Ge–Al2O3, 1500 Ge–SiO2) simulations previously performed on a computer based on the thicknesses of multilayer structural materials was used. The data are generated using Computational Electromagnetic simulation software based on the Finite-Difference Time-Domain method. To understand the mechanism of the proposed model, two different two-layer coating simulations were studied. While Ge was used as the substrate in both coatings, Al2O3 and SiO2 were used as the second layers. The data set consists of the 3–5 µm and 8–12 µm bands typical for the mid-wave infrared (MWIR) and long-wave infrared (LWIR) bands and includes reflectance values for wavelengths ranging between these spectra. In the specified 2-layer data set, the average reflectance was obtained with a minimum of 0.36 at 515 nm Ge and 910 nm SiO2 thicknesses. This value can be increased by adapting the proposed model to more than 2 layers. Six ML algorithms and a DL model, including artificial neural networks and convolutional neural networks, are evaluated to determine the most effective approach for predicting reflectance properties. Furthermore, in the proposed model, a hyperparameter tuning phase is used in the study to compare the efficiency of ML and DL methods to generate dual-band ARC and maximize the prediction accuracy of the DL algorithm. To our knowledge, this is the first time this has been implemented in this field. The results show that ML models, particularly decision tree (MSE: 0.00000069, RMSE: 0.00083), rand
Typically, object detection methods for autonomous driving that rely on supervised learning make the assumption of a consistent feature distribution between the training and testing data, this such assumption may fail...
详细信息
Typically, object detection methods for autonomous driving that rely on supervised learning make the assumption of a consistent feature distribution between the training and testing data, this such assumption may fail in different weather conditions. Due to the domain gap, a detection model trained under clear weather may not perform well in foggy and rainy conditions. Overcoming detection bottlenecks in foggy and rainy weather is a real challenge for autonomous vehicles deployed in the wild. To bridge the domain gap and improve the performance of object detection in foggy and rainy weather, this paper presents a novel framework for domain-adaptive object detection. The adaptations at both the image-level and objectlevel are intended to minimize the differences in image style and object appearance between domains. Furthermore, in order to improve the model's performance on challenging examples, we introduce a novel adversarial gradient reversal layer that conducts adversarial mining on difficult instances in addition to domain adaptation. Additionally, we suggest generating an auxiliary domain through data augmentation to enforce a new domain-level metric regularization. Experimental findings on public V2V benchmark exhibit a substantial enhancement in object detection specifically for foggy and rainy driving scenarios IEEE
electrical system planning of the large-scale offshore wind farm is usually based on N-1 security for equipment lectotype. However, in this method, owing to the aggregation effect in large-scale offshore wind farms, o...
详细信息
electrical system planning of the large-scale offshore wind farm is usually based on N-1 security for equipment lectotype. However, in this method, owing to the aggregation effect in large-scale offshore wind farms, offshore electrical equipment operates under low load for long periods, thus wasting resources. In this paper, we propose a method for electrical system planning of the large-scale offshore wind farm based on the N+ design. A planning model based on the power-limited operation of wind turbines under the N+ design is constructed, and a solution is derived with the optimization of the upper power limits of wind turbines. A comprehensive evaluation and game analysis of the economy, risk of wind abandonment, and environmental sustainability of the planned offshore electrical systems have been conducted. Moreover, the planning of an infield collector system, substation, and transmission system of an offshore electrical system based on the N+ design is integrated. For a domestic offshore wind farm, evaluation results show that the proposed planning method can improve the efficiency of wind energy utilization while greatly reducing the investment cost of the electrical system.
Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system...
详细信息
Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system with the inclusion of artificial intelligence is a much required process. This papers puts focus on designing and developing an AI-based small arms firing evaluation systems in the context of military environment. Initially image processing techniques are used to calculate the target firing score. Additionally, firing errors during the shooting have also been detected using a machine learning algorithm. However, consistency in firing requires an abundance of practice and updated analysis of the previous results. Accuracy and precision are the basic requirements of a good shooter. To test the shooting skill of combatants, firing practices are held by the military personnel at frequent intervals that include 'grouping' and 'shoot to hit' scores. Shortage of skilled personnel and lack of personal interest leads to an inefficient evaluation of the firing standard of a firer. This paper introduces a system that will automatically be able to fetch the target data and evaluate the standard based on the fuzzy *** it will be able to predict the shooter performance based on linear regression ***, it compares with recognized patterns to analyze the individual expertise and suggest improvements based on previous values. The paper is developed on a Small Arms Firing Skill Evaluation System, which makes the whole process of firing and target evaluation faster with better accuracy. The experiment has been conducted on real-time scenarios considering the military field and shows a promising result to evaluate the system automatically.
This paper addresses two issues that concern the electricity market participants under the European day-ahead market(DAM)framework,namely the feasibility of the attained schedules and the non-confiscation of cleared *...
详细信息
This paper addresses two issues that concern the electricity market participants under the European day-ahead market(DAM)framework,namely the feasibility of the attained schedules and the non-confiscation of cleared *** address the first issue,new resource-specific orders,i.e.,thermal orders for thermal generating units,demand response orders for load responsive resources,and energy limited orders for storage resources,are proposed and incorporated in the existing European DAM clearing *** address the second issue,two approaches which lead to a non-confiscatory market are analyzed:①discriminatory pricing with side-payments(***);and②non-discriminatory pricing excluding out-ofmoney orders(European paradigm).A comparison is performed between the two approaches to investigate the most appropriate pricing rule in terms of social welfare,derived revenues for the sellers,and efficiency of the attained *** proposed model with new resource-specific products is evaluated in a European test system,achieving robust *** feasibility of the attained schedules is demonstrated when using resource-specific orders compared with block ***,the results indicate the supremacy of discriminatory pricing with side-payments compared with the current European pricing rule.
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research...
详细信息
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research is motivated by the pressing demand to enhance transportation mode classification, leveraging the potential of smartphone sensors, notably the accelerometer, magnetometer, and gyroscope. In response to this challenge, we present a novel automated classification model rooted in deep reinforcement learning. Our model stands out for its innovative approach of harnessing enhanced features through artificial neural networks (ANNs) and visualizing the classification task as a structured series of decision-making events. Our model adopts an improved differential evolution (DE) algorithm for initializing weights, coupled with a specialized agent-environment relationship. Every correct classification earns the agent a reward, with additional emphasis on the accurate categorization of less frequent modes through a distinct reward strategy. The Upper Confidence Bound (UCB) technique is used for action selection, promoting deep-seated knowledge, and minimizing reliance on chance. A notable innovation in our work is the introduction of a cluster-centric mutation operation within the DE algorithm. This operation strategically identifies optimal clusters in the current DE population and forges potential solutions using a pioneering update mechanism. When assessed on the extensive HTC dataset, which includes 8311 hours of data gathered from 224 participants over two years. Noteworthy results spotlight an accuracy of 0.88±0.03 and an F-measure of 0.87±0.02, underscoring the efficacy of our approach for large-scale transportation mode classification tasks. This work introduces an innovative strategy in the realm of transportation mode classification, emphasizing both precision and reliability, addressing the pressing need for enhanced classification mechanisms in an eve
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
In this paper, we construct Error-Correcting Graph Codes. An error-correcting graph code of distance δ is a family C of graphs, on a common vertex set of size n, such that if we start with any graph in C, we would ha...
详细信息
Smart power grids are vulnerable to security threats due to their cyber-physical nature. Existing data-driven detectors aim to address simple traditional false data injection attacks (FDIAs). However, adversarial fals...
详细信息
暂无评论