Cross-speed bearing fault diagnosis based on multiple source domains and their data enables high-performance condition monitoring for variable-speed equipment, such as engines and turbines. Current multi-source method...
详细信息
Gridlet allocation in a computational grid environment is a major research issue to obtain not only the efficient gridlet allocation technique but also the time needed to obtain the efficient allocation technique. Gri...
详细信息
In Hyperspectral Imaging(HSI),the detrimental influence of noise and distortions on data quality is profound,which has severely affected the following-on analytics and decisionmaking such as land *** study presents an...
详细信息
In Hyperspectral Imaging(HSI),the detrimental influence of noise and distortions on data quality is profound,which has severely affected the following-on analytics and decisionmaking such as land *** study presents an innovative framework for assessing HSI band quality and reconstructing the low-quality bands,based on the Prophet *** introducing a comprehensive quality metric to start,the authors approach factors in both spatial and spectral characteristics across local and global *** metric effectively captures the intricate noise and distortions inherent in the HSI ***,the authors employ the Prophet model to forecast information within the low-quality bands,leveraging insights from neighbouring high-quality *** validate the effectiveness of the authors’proposed model,extensive experiments on three publicly available uncorrected datasets are *** a head-to-head comparison,the framework against six state-ofthe-art band reconstruction algorithms including three spectral methods,two spatialspectral methods and one deep learning method is *** authors’experiments also delve into strategies for band selection based on quality metrics and the quality evaluation of the reconstructed *** addition,the authors assess the classification accuracy utilising these reconstructed *** various experiments,the results consistently affirm the efficacy of the authors’method in HSI quality assessment and band ***,the authors’approach obviates the need for manually prefiltering of noisy *** comprehensive framework holds promise in addressing HSI data quality concerns whilst enhancing the overall utility of HSI.
In this fast-paced Digital Age, Natural Language Processing (NLP) can prove beneficial in consuming quality information efficiently. With the ever-growing number of learning resources, it is becoming onerous for stude...
详细信息
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfigurati...
详细信息
This paper introduces a novel RISC-V processor architecture designed for ultra-low-power and energy-efficient applications,particularly for Internet of things(IoT)*** architecture enables runtime dynamic reconfiguration of the datapath,allowing efficient balancing between computational performance and power *** is achieved through interchangeable components and clock gating mechanisms,which help the processor adapt to varying workloads.A prototype of the architecture was implemented on a Xilinx Artix 7 field programmable gate array(FPGA).Experimental results show significant improvements in power efficiency and *** mini configuration achieves an impressive reduction in power consumption,using only 36%of the baseline ***,the full configuration boosts performance by 8%over the *** flexible and adaptable nature of this architecture makes it highly suitable for a wide range of low-power IoT applications,providing an effective solution to meet the growing demands for energy efficiency in modern IoT devices.
The agricultural information system deals with massive amounts of data from heterogeneous sources. It helps the farmers gain accurate information by providing better insights. A significant issue in agricultural data ...
详细信息
Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** metho...
详细信息
Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** methods for detecting encrypted traffic face two significant ***,relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network ***,machine learning and convolutional neural network methods lack sufficient network expression capabilities,hindering the full exploration of traffic’s potential *** address these limitations,this study introduces a traffic classification method that utilizes time relationships and a higher-order graph neural network,termed *** approach fully exploits the original byte information and chronological relationships of traffic packets,transforming traffic data into a graph structure to provide the model with more comprehensive context ***-ETC employs an innovative k-dimensional graph neural network to effectively capture the multi-scale structural features of traffic graphs,enabling more accurate *** select the ISCXVPN and the USTC-TK2016 dataset for our *** results show that compared with other state-of-the-art methods,our method can obtain a better classification effect on different datasets,and the accuracy rate is about 97.00%.In addition,by analyzing the impact of varying input specifications on classification performance,we determine the optimal network data truncation strategy and confirm the model’s excellent generalization ability on different datasets.
There is a current lack of protection for multimedia data such as images, audio, video, and text from unauthorized machine learning training along with misuse of authors rights to their work;this paper therefore propo...
详细信息
First of all, I would like to take this opportunity to express my sincere thanks to Professor Fei-Yue Wang, the founding Editor-in-Chief, and Professor MengChu Zhou, the former Editor-in-Chief, for their trust in me t...
详细信息
First of all, I would like to take this opportunity to express my sincere thanks to Professor Fei-Yue Wang, the founding Editor-in-Chief, and Professor MengChu Zhou, the former Editor-in-Chief, for their trust in me to take over the role of Editor-in-Chief, IEEE/CAA Journal of Automatica Sinica(JAS) [1], [2]. One can see clearly that under their wonderful leadership, IEEE/CAA JAS has become a young and highimpact publication in the world.
Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications w...
详细信息
Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications with Noise(DBSCAN)and hierarchical clustering that can easily fall into the local optimal ***,convex clustering is vulnerable to the occurrence of outlier features,as it uses the Frobenius norm to measure the distance between data points and their corresponding cluster centers and evaluate *** accurately identify outlier features,this paper decomposes data into a clustering structure component and a normalized component that captures outlier *** from existing convex clustering evaluating features with the exact measurement,the proposed model can overcome the vast difference in the magnitude of different features and the outlier features can be efficiently identified and *** solve the proposed model,we design an efficient algorithm and prove the global convergence of the *** on both synthetic datasets and UCI datasets demonstrate that the proposed method outperforms the compared approaches in convex clustering.
暂无评论