In the application of deep learning-based fault diagnosis, more often than not, the network model could perform better with a balanced dataset input, whereby the number of fault data is equivalent to that of normal da...
详细信息
In this article, we proposed an infrared and visible image fusion method based on scene information embedding, which is to obtain an fused image with high-quality target information such as pedestrian crossing, vehicl...
详细信息
Considering the diversity of natural conditions, including fog, low light, and strong light, as well as the impact of various diseases on leaves, we propose an improved apple leaf disease detection method based on the...
详细信息
Magnetic nanoparticles (MNPs) have been widely investigated as effective drug carriers for targeted tumor therapy. However, the successful application of this technology in the human body requires reliable imaging sup...
详细信息
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was s...
详细信息
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was successfully applied against all SSCs in 2017 by Hamann et al. They suggested using not only key bits but also initial value (IV) bits continuously in the keystream generation phase to strengthen SSCs against TMDTO attacks. Then, Hamann and Krause proposed a construction based on using only IV bits continuously in the packet mode. They suggested an instantiation of an SSC and claimed that it is resistant to TMDTO attacks. We point out that accessing IV bits imposes an overhead on cryptosystems that might be unacceptable in some applications. More importantly, we show that the proposed SSC remains vulnerable to TMDTO attacks 1. To resolve this security threat, the current paper proposes constructions based on storing key or IV bits that are the first to provide full security against TMDTO attacks. Five constructions are proposed for different applications by considering efficiency. Designers can obtain each construction’s minimum volatile state length according to the desirable keystream, key and IV lengths.
To address the issues of slow diagnostic speed,low accuracy,and poor generalization performance in traditional rolling bearing fault diagnosis methods,we propose a rolling bearing fault diagnosis method based on Marko...
详细信息
To address the issues of slow diagnostic speed,low accuracy,and poor generalization performance in traditional rolling bearing fault diagnosis methods,we propose a rolling bearing fault diagnosis method based on Markov Transition Field(MTF)image encoding combined with a lightweight convolutional neural network that integrates a Convolutional Block Attention Module(CBAM-LCNN).Specifically,we first use the Markov Transition Field to convert the original one-dimensional vibration signals of rolling bearings into two-dimensional ***,we construct a lightweight convolutional neural network incorporating the convolutional attention module(CBAM-LCNN).Finally,the two-dimensional images obtained from MTF mapping are fed into the CBAM-LCNN network for image feature extraction and fault *** validate the effectiveness of the proposed method on the bearing fault datasets from Guangdong University of Petrochemical technology’s multi-stage centrifugal fan and Case Western Reserve *** results show that,compared to other advanced baseline methods,the proposed rolling bearing fault diagnosis method offers faster diagnostic speed and higher diagnostic *** addition,we conducted experiments on the Xi’an Jiaotong University rolling bearing dataset,achieving excellent results in bearing fault *** results validate the strong generalization performance of the proposed *** method presented in this paper not only effectively diagnoses faults in rolling bearings but also serves as a reference for fault diagnosis in other equipment.
Aluminum is an attractive alternative fuel,but it burns very inefficiently due to the formation of a dense Al_(2)O_(3)layer which prevents O_(2)from diffusion to the surface of Al *** previous experiments,the combusti...
详细信息
Aluminum is an attractive alternative fuel,but it burns very inefficiently due to the formation of a dense Al_(2)O_(3)layer which prevents O_(2)from diffusion to the surface of Al *** previous experiments,the combustion of millimeter-sized Al(mAl)particles in the fluidized bed has achieved a substantial increase in the combustion efficiency,but further improvements are still *** this study,the effects of reaction atmosphere on the fluidized combustion of mAl particles were *** experiments with different O_(2)/H_(2)O/CO_(2)concentrations were *** experimental results indicate that the combustion efficiency of mAl particles in fluidized bed increases as the mole fraction of O_(2),H_(2)O or CO_(2)increases,and the highest combustion efficiency can reach 38.7%.After the analysis of the oxide film on the surface of aluminum particles,it was found that it is easier to generate the unstableθ-Al_(2)O_(3)under CO_(2)atmosphere,and it is easier to generate the unstableγ-Al_(2)O_(3)andθ-Al_(2)O_(3)under H_(2)O *** unstable Al_(2)O_(3)film is more likely to be abraded in the fluidized bed,which leads to the effective improvement of the combustion efficiency.
We study a generalized higher-order nonlinear Schr¨odinger equation in an optical fiber or a planar *** obtain the Lax pair and N-fold Darboux transformation(DT)with N being a positive *** on Lax pair obtained by...
详细信息
We study a generalized higher-order nonlinear Schr¨odinger equation in an optical fiber or a planar *** obtain the Lax pair and N-fold Darboux transformation(DT)with N being a positive *** on Lax pair obtained by us,we derive the infinitely-many conservation *** give the bright one-,two-,and N-soliton solutions,and the first-,second-,and Nth-order breather solutions based on the N-fold *** conclude that the velocities of the bright solitons are influenced by the distributed gain function,g(z),and variable coefficients in equation,h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z)via the asymptotic analysis,where z represents the propagation variable or spatial *** also graphically observe that:the velocities of the first-and second-order breathers will be affected by h_(1)(z),p_(1)(z),r_(1)(z),and s_(1)(z),and the background wave depends on g(z).
Here, aiming at the problem of insufficient utilization of array received information in existing 2D direction of arrival (DOA) estimation methods to cause degradation of estimation performance, a 2D DOA estimation me...
详细信息
Because a significant number of algorithms in computational science include search challenges and a large number of algorithms that can be transformed into search problems have garnered significant attention, especial...
详细信息
Because a significant number of algorithms in computational science include search challenges and a large number of algorithms that can be transformed into search problems have garnered significant attention, especially the time rate and accuracy of search, a quantum walk search algorithm on hypergraphs,whose aim is to reduce time consumption and increase the readiness and controllability of search, is proposed in this paper. First, the data points are divided into groups and then isomorphic to the permutation set. Second, the element coordinates in the permutation set are adopted to mark the position of the data points. Search the target data by the controllable quantum walk with multiparticle on the ring. By controlling the coin operator of quantum walk, it is determined that search algorithm can increase the accuracy and controllability of search. It is determined that search algorithm can reduce time consumption by increasing the number of search particles. It also provides a new direction for the design of quantum walk algorithms, which may eventually lead to entirely new algorithms.
暂无评论