|
|
|
Wenhao Sun, Yidong Zou, Yunhe Wang, Boyi Xiao, Haichuan Zhang and Zhihuai Xiao
In the practical production environment, the complexity and variability of hydroelectric units often result in a need for more fault data, leading to inadequate accuracy in fault identification for data-driven intelligent diagnostic models. To address th...
ver más
|
|
|
|
|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Wenkuan Huang, Hongbin Chen and Qiyang Zhao
The main research focus of this paper is to explore the use of the cycle-generative adversarial network (GAN) method to address the inter-turn fault issue in permanent magnet-synchronous motors (PMSMs). Specifically, this study aims to overcome the chall...
ver más
|
|
|
|
|
|
|
Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang and Hui Cui
Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently and intelligently within complex and dynamic surroundings. Despite its significance, RL is hampered by inherent limitations su...
ver más
|
|
|
|
|
|
|
Shijing Liu, Cheng Qian, Xueying Tu, Haojun Zheng, Lin Zhu, Huang Liu and Jun Chen
Variable-condition fish recognition is a type of cross-scene and cross-camera fish re-identification (re-ID) technology. Due to the difference in the domain distribution of fish images collected under different culture conditions, the available training ...
ver más
|
|
|
|
|
|
|
Zhiwu Chen, Wenjing Wang, QingE Wu, Yingbo Lu, Lintao Zhou and Hu Chen
In order to solve the problem that steel surface defects are easily covered or submerged by other objects or noise, this paper proposes an open?closed transformation algorithm which can eliminate or weaken multiple noises. In the case of a small number o...
ver más
|
|
|
|
|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|
|
|
|
Xinyu Jia, Xueqin Jiang, Zhiyong Li, Jiong Mu, Yuchao Wang and Yupeng Niu
The occurrence of pests at high frequencies has been identified as a major cause of reduced citrus yields, and early detection and prevention are of great significance to pest control. At present, studies related to citrus pest identification using deep ...
ver más
|
|
|
|
|
|
|
Sitao Liu, Shenghui Fu, Anrui Hu, Pan Ma, Xianliang Hu, Xinyu Tian, Hongjian Zhang and Shuangxi Liu
Aiming at difficult image acquisition and low recognition accuracy of two rice canopy pests, rice stem borer and rice leaf roller, we constructed a GA-Mask R-CNN (Generative Adversarial Based Mask Region Convolutional Neural Network) intelligent recognit...
ver más
|
|
|
|
|
|
|
Wentao Lv, Fan Li, Shijie Luo and Jie Xiang
Autism spectrum disorder (ASD) is a complex neurodevelopmental disorder that can reduce quality of life and burden families. However, there is a lack of objectivity in clinical diagnosis, so it is very important to develop a method for early and accurate...
ver más
|
|
|
|