作者:
杨德桢孙传强韩哲袁宝刚潘栋陈金传许华杰刘春太申长雨State Key Laboratory of Structural Analysis
Optimization and CAE Software for Industrial EquipmentNational Engineering Research Center for Advanced Polymer Processing Technologythe Key Laboratory of Advanced Materials Processing&Mold of Ministry of EducationZhengzhou UniversityZhengzhou450002China
In comparison to conventional hexagonal honeycomb structures,auxetic metamaterials with re-entrant configurations have exhibited superior mechanical properties in terms of energy *** further enhance the energy absorpt...
详细信息
In comparison to conventional hexagonal honeycomb structures,auxetic metamaterials with re-entrant configurations have exhibited superior mechanical properties in terms of energy *** further enhance the energy absorption capacity of these materials,a novel re-entrant honeycomb configuration,named novel auxetic re-entrant honeycomb(NARH),is developed by incorporating“<>”-shaped cell walls into the conventional auxetic re-entrant honeycomb(ARH).Two analytical models for the plateau stress are formulated to consider the plastic deformation of NARH during quasi-static compression and the dynamic impact using the linear momentum ***-static compression tests on 3D printed NARH honeycomb specimens and finite element simulations are performed to verify the effectiveness of the theoretical *** exhibits higher plateau stresses compared with ARH during compression,which can be attributed to the presence of more plastic hinges formed in *** hinges,the embedded parts with inclined cell walls,not only improve stability by forming stable triangles during compression but also enhance the energy absorption capacity.A parametric study is conducted to analyze the effect of impact velocity,thickness,and incline angle of cell walls on *** simulations demonstrate higher sensitivity of the mechanical properties to impact velocity and cell wall *** ribs to the“<>”-shaped cell walls in NARH further reduces the initial peak force during dynamic crushing while maintaining high energy *** research provides valuable guidelines for the design of energy absorption metamaterials.
作者:
Kataieva, YevheniiaLeontiev, OliverInstitute of Informatics
Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava842 16 4 Slovakia
The tourism sector is currently witnessing a significant transformation driven by technological automation. As this evolution unfolds, it is crucial to harness intelligent technologies not only to enhance the industry...
详细信息
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati...
详细信息
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentation,and LF ***,there is a contradiction between spatial and angular resolution during the LF image acquisition *** overcome the above problem,researchers have gradually focused on the light field super-resolution(LFSR).In the traditional solutions,researchers achieved the LFSR based on various optimization frameworks,such as Bayesian and Gaussian *** learning-based methods are more popular than conventional methods because they have better performance and more robust generalization *** this paper,the present approach can mainly divided into conventional methods and deep learning-based *** discuss these two branches in light field spatial super-resolution(LFSSR),light field angular super-resolution(LFASR),and light field spatial and angular super-resolution(LFSASR),***,this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these ***,we discuss the potential innovations of the LFSR to propose the progress of our research field.
This paper addresses the optimization problem and seeks a balance equation between key performance-influencing parameters in a Vehicle-to-Everything (V2X) network. A novel mathematical optimization model is proposed, ...
详细信息
Logic minimization plays a significant part in decreasing the complexity of the circuit since the number of Gates will be diminished… Till today, the conventional or traditional approaches like Boolean laws;Karnaugh ...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular *** this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or *** review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti *** concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures.
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo...
详细信息
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm for NVM-based SPM to prolong the *** lifetime can be formulated indirectly as the write counts on each SPM *** the differences between global variables and stack variables,our optimization model has three *** constraints of the central processing unit(CPU)utilization and size are used for all variables,while no-overlay constraint is only used for stack *** satisfy the constraints of the optimization model,we use the greedy strategy to generate the initial population which can determine whether data variables are allocated to SPM and distribute them evenly on SPM ***,we use the Mälardalen worst case executive time(WCET)benchmark to evaluate our *** experimental results show that the DVA algorithm can not only obtain close-to-optimal solutions,but also prolong the lifetime by 9.17% on average compared with SRAM-based SPM.
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
Occluded person re-identification poses a significant challenge due to the obstruction of human body parts by various obstacles, requiring the use of incomplete or invisible body parts for matching. Existing methods o...
详细信息
ISBN:
(数字)9798350350210
ISBN:
(纸本)9798350350227
Occluded person re-identification poses a significant challenge due to the obstruction of human body parts by various obstacles, requiring the use of incomplete or invisible body parts for matching. Existing methods often address occlusion through feature disentanglement. However, the absence of occlusion labels hampers accurate disentanglement, leading to challenges in precisely distinguishing occluded regions. In response to these challenges, we propose a novel approach that actively introduces occlusion to guide feature disentanglement. Our method incorporates an Occlusion Sample Augmentation module, actively introducing occlusion to person images and generating accurate occlusion labels. Additionally, we employ pose estimation to partition the human body into distinct semantic components, enabling selective matching of non-occluded parts. To address interference from occlusion, we introduce an Occlusion-augmented Push Loss. This loss function effectively separates human body features from occluded part features based on augmented occlusion location labels, guiding the learning of feature disentanglement. Experimental results on both the Occluded-Duke and DukeMTMC-reID datasets, encompassing occluded and holistic re-identification tasks, showcase the outstanding performance of our method, achieving state-of-the-art (SOTA) performance.
暂无评论