-
421
Quantitative Evaluation Method for Industrial Control System Vulnerability Based on Improved Expert Elicitation and Fuzzy Set Method
Published 2023-01-01“…For the problems of scientificity and reliability of vulnerability quantitative assessment method based on attack tree model, we propose an improved expert decision method based on attack tree model to improve the reliability of expert decision aggregation and solve the problem of insufficient evaluation data for the vulnerability quantitative evaluation method. Firstly, based on the expert decision aggregation method, the concept of deviation degree is proposed, and the maximum deviation degree method is innovatively proposed to screen fuzzy evaluations of experts. …”
Get full text
Article -
422
Economic benefit evaluation model of distributed energy storage system considering custom power services
Published 2023-01-01“…This paper proposes an economic benefit evaluation model of distributed energy storage system considering multi-type custom power services. Firstly, based on the four-quadrant operation characteristics of the energy storage converter, the control methods and revenue models of distributed energy storage system to provide reactive power compensation, new energy consumption, peak-valley arbitrage and other customized power services are analyzed. …”
Get full text
Article -
423
The evolution of the energy import dependence network and its influencing factors: taking countries and regions along the Belt and Road as an example
Published 2022-01-01“…In order to reveal the evolutionary characteristics of the import dependence between countries in energy trade and its influencing factors, firstly, based on the network analysis method, this paper constructs a model of energy import dependence network (EIDN) among countries and regions along the Belt and Road (B&R countries). …”
Get full text
Article -
424
A methodology for energy dissipation prediction of the bolt group with non-uniform preload
Published 2023-02-01“…In this paper, based on the mechanical analysis of the bolt group, a new methodology for predicting hysteresis behavior under non-uniform preload was proposed. Firstly, based on the moment equilibrium within the framework of material mechanics and the tangential stiffness model of the joint interface, a new coordination equation of displacement and force between the bolted joints was deduced, which could realize the calculation of the bolt group loading curve. …”
Get full text
Article -
425
Miner expression recognition based on improved principal component analysis
Published 2019-02-01“…Aiming at the problem that the feature extraction of miners' facial expressions is slower and the recognition accuracy is not high for the traditional miner facial expression recognition method, based on the principal component analysis method, Fisher's linear discriminant method is used to improve the traditional principal component analysis method. Firstly, based on the principal component analysis method, an inter-class discrete matrix is added to make the distance between the feature points of different categories become larger after projection, and the distance between the feature points of the same category is more compact, so that the result of feature extraction to the miners' facial expression images is more representative and targeted. …”
Get full text
Article -
426
Critical Node Identification of Multi-UUV Formation Based on Network Structure Entropy
Published 2023-08-01“…As for the methodology, firstly, based on the swarm intelligence behavior method, the motion similarity of multi-UUV nodes in the formation is analyzed in pairs; furthermore, the leader–follower relationship and the network structure of the formation are calculated successively. …”
Get full text
Article -
427
Comparison of two market clearing modes for day-ahead power market incorporating third-party entity
Published 2023-11-01“…In second clearing mechanism, joint market clearing mode for electric energy and reserve on both sides. At first, based on the aspects of market development stage and shortage of reserve, the advantages and disadvantages of 2 clearing modes are analyzed. …”
Get full text
Article -
428
Performance improvement of a micro-structured gas separator utilizing the Soret effect
Published 2022-01-01“…Therefore, to resolve this problem, the present study conducted numerical simulations for gas flow, temperature distribution, and H2 concentration and studied the effect of inserting an additional structure (a partition) to prevent gas remixing at first. Based on the simulation results, experiments were conducted using the Burgers cascade in a device with partitioned cells. …”
Get full text
Article -
429
Theoretical and practical models for shear strength of corroded reinforced concrete columns
Published 2022“…The deterioration mechanism for shear strength of the CRCC due to the steel reinforcement corrosion was explored first based on the shear mechanism analysis of the truss-arch model. …”
Get full text
Journal Article -
430
Adaptive Sampling of the Electrocardiogram Based on Generalized Perceptual Features
Published 2020-01-01“…In this paper we propose the application of generalized perceptual features to control the adaptive sampling of a digital ECG. Firstly, based on temporal distribution of the information density, local ECG bandwidth is estimated and projected to the actual positions of components in heartbeat representation. …”
Get full text
Article -
431
Stability Analysis of a Mathematical Model for Adolescent Idiopathic Scoliosis from the Perspective of Physical and Health Integration
Published 2023-08-01“…In this paper, we take physical and health integration as the entry point. Firstly, based on the transformation mechanism of adolescent idiopathic scoliosis we construct a time delay differential model. …”
Get full text
Article -
432
NLOS Identification for UWB Positioning Based on IDBO and Convolutional Neural Networks
Published 2023-01-01“…This paper proposes a convolutional neural network (CNN) classification method based on an improved Dung Beetle Optimizer (DBO). Firstly, based on the standard DBO, the Circle chaotic mapping, non-uniform Gaussian variational strategy, and multi-stage perturbation strategy are used to optimize the exploration capability and enhance the performance of original DBO method, the superiority-seeking ability of IDBO is demonstrated by testing 23 benchmark functions. …”
Get full text
Article -
433
Deep Forest and Pruned Syntax Tree-Based Classification Method for Java Code Vulnerability
Published 2023-01-01“…First, the breadth-first traversal of the abstract syntax tree obtains the sequence of statement trees, next, pruning statement trees removes irrelevant nodes, then we use a depth-first based encoder to obtain the vector, and finally, we use deep forest as the classifier to get classification results. …”
Get full text
Article -
434
A threshold‐based sorting algorithm for dense wireless sensor systems and communication networks
Published 2023-04-01“…Instead of sorting whole data in a large data set and selecting a certain number of them, the proposed algorithm sorts a specific number of elements that are larger or smaller than a threshold level or located between two threshold values. First, based on the mean value and standard deviation of the data, a theoretical analysis to find the exact and approximate thresholds, respectively for known (Gaussian, uniform, Rayleigh, and negative exponential) and unknown probability distributions is presented. …”
Get full text
Article -
435
Stackelberg game-based optimal electricity trading method for distribution networks with small-micro industrial parks
Published 2024-02-01“…In order to improve the operating benefits of the distribution network (DN) and reduce the energy consumption costs of small-micro industrial parks (SMIPs), a two-layer optimal electricity trading method for DN with SMIPs is proposed. First, based on the Stackelberg game, a multi-objective two-layer optimal trading model for DN and SMIP is established. …”
Get full text
Article -
436
A Joint De-Rain and De-Mist Network Based on the Atmospheric Scattering Model
Published 2023-06-01“…In this paper, we propose a novel approach for simultaneously removing both streaks and halos from the image to produce clear results. First, based on the principle of atmospheric scattering, a rain and mist model is proposed to initially remove the streaks and halos from the image by reconstructing the image. …”
Get full text
Article -
437
Overlap Functions-Based Fuzzy Mathematical Morphological Operators and Their Applications in Image Edge Extraction
Published 2023-06-01“…In this work, with the aid of overlap functions, two new groups of fuzzy mathematical morphology (FMM) operators were proposed and applied to image processing, and they obtained better results than existing algorithms. First, based on overlap functions and structuring elements, the first group of new FMM operators (called OSFMM operators) was proposed, and their properties were systematically analyzed. …”
Get full text
Article -
438
The Channel Fading Influence of the Receiver Operating Characteristics of the TT&C Receiver Based on the Dual-Sequence Frequency Hopping
Published 2024-01-01“…The channel amplitude fading influence of the receiver operating characteristics (ROC) of the TT&C receiver based on the DSFH is studied. Firstly, based on the typical channel model of the Rayleigh fading without direct path transmission, the conditional Fokker-Planck equation (FPE) is obtained by analyzing the statistical independence of the Rayleigh fading signal and SR output particle moments. …”
Get full text
Article -
439
Antisymmetric Lamb Wave Simulation Study Based on Electromagnetic Acoustic Transducer with Periodic Permanent Magnets
Published 2023-08-01“…To resolve this issue, firstly, based on the traditional EMAT, a horizontal polarization periodic permanent magnet electromagnetic acoustic transducer (HP-PPM-EMAT) was proposed. …”
Get full text
Article -
440
Deep Learning for Visual SLAM: The State-of-the-Art and Future Trends
Published 2023-04-01“…Visual Simultaneous Localization and Mapping (VSLAM) has been a hot topic of research since the 1990s, first based on traditional computer vision and recognition techniques and later on deep learning models. …”
Get full text
Article