Showing 1 - 13 results of 13 for search 'full-life algorithm.', query time: 0.08s Refine Results
  1. 1

    A Full-Life-Cycle Modeling Framework for Cropland Abandonment Detection Based on Dense Time Series of Landsat-Derived Vegetation and Soil Fractions by Qiangqiang Sun, Zhijun You, Ping Zhang, Hao Wu, Zhonghai Yu, Lu Wang

    Published 2025-06-01
    “…However, abandoned cropland is commonly detected based on multi-date classification or the dynamics of a single vegetation index, with the interactions between vegetation and soil time series often being neglected, leading to a failure to understand its full-life-cycle succession processes. To fill this gap, we propose a new full-life-cycle modeling framework based on the interactive trajectories of vegetation–soil-related endmembers to identify abandoned and reclaimed cropland in Jinan from 2000 to 2022. …”
    Get full text
    Article
  2. 2

    Hybrid energy storage systems for photovoltaic storage microgrids power allocation and capacity determination based on adaptive Savitzky-Golay filtering and VMD-DTW by Zengqiang Ma, Zejia Zhou, Tianming Mu, Cheng Wen

    Published 2025-09-01
    “…An enhanced dung beetle optimization algorithm is employed to optimize this model, enabling adaptive parameter adjustments in SG filtering. …”
    Get full text
    Article
  3. 3
  4. 4

    A feature extraction method based on improved resonance sparse decomposition for early faults in rolling bearings by SUN Meng, GAO Bingpeng, CHENG Jing

    Published 2025-06-01
    “…Finally, the fault features were extracted by the perform envelope spectrum analysis. The algorithm comparison experiments show that the proposed IGTO algorithm has significantly improved optimization performance. …”
    Get full text
    Article
  5. 5

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  6. 6

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  7. 7

    On-Orbit Life Prediction and Analysis of Triple-Junction Gallium Arsenide Solar Arrays for MEO Satellites by Huan Liu, Chenjie Kong, Yuan Shen, Baojun Lin, Xueliang Wang, Qiang Zhang

    Published 2025-07-01
    “…This study integrates the Long Short-Term Memory (LSTM) algorithm into the full life cycle management of MEO satellite solar arrays, providing a solution that combines theory and engineering for the design of high-reliability energy systems. …”
    Get full text
    Article
  8. 8

    PERFORMANCE DEGRADATION ASSESSMENT OF ROLLING BEARING BASED ON SINGLE RING THEOREM IN RANDOM MATRIX THEORY by SHAN Qiang, NI GuangXian, WANG Heng

    Published 2022-01-01
    “…A rolling bearing performance degradation assessment algorithm based on single ring theorem in the random matrix theory is proposed to solve the problem that the traditional feature extraction algorithm is not sufficient to extract the useful information of the bearing under the industrial big data environment, and the constructed index is difficult to effectively characterize the bearing degradation process. …”
    Get full text
    Article
  9. 9

    An incremental data-driven approach for carbon emission prediction and optimization of heat treatment processes by Qian Yi, Xin Wu, Junkang Zhuo, Congbo Li, Chuanjiang Li, Huajun Cao

    Published 2025-08-01
    “…Using life cycle assessment (LCA) theory, carbon emission sources are accurately analyzed and quantified, and a full life cycle carbon emission model is established. …”
    Get full text
    Article
  10. 10

    Remaining Useful Life Prediction Method for Bearings Based on Pruned Exact Linear Time State Segmentation and Time–Frequency Diagram by Xu Wei, Jingjing Fan, Huahua Wang, Lulu Cai

    Published 2025-03-01
    “…First, the PELT (Pruned Exact Linear Time) algorithm is used to segment the vibration signals over the full life cycle of the bearing, accurately identifying critical degradation states and optimizing the stage division of the degradation process. …”
    Get full text
    Article
  11. 11

    Source-Grid-Load-Storage Synergistic Planning Considering Electricity-Carbon Coupling and Flexible Supply-Demand Balance by XIAO Bai, ZHANG Qingbai, QIN Weidong, QU Gaoqiang, KONG Yihui, ZHANG Xiaohua

    Published 2025-03-01
    “…Finally, the improved adaptive genetic algorithm is used to solve the model. The case study results demonstrate that the proposed method provides a valuable reference for the collaborative planning of source-grid-load-storage systems.…”
    Get full text
    Article
  12. 12

    Hierarchical Bayesian Reliability Model for Wind Turbines with Small Fault Sample Sets by Dameng WANG, Zhiyong MA, Yibing LIU, Wei TENG

    Published 2019-12-01
    “…It is beneficial to improve the health management level of the full-life-cycle of wind turbines through establishing the reliability model for wind turbine and estimating its parameter accurately. …”
    Get full text
    Article
  13. 13

    Capacity Estimation of Lithium-Ion Battery Systems in Fuel Cell Ships Based on Deep Learning Model by Xiangguo Yang, Jia Tang, Qijia Song, Yifan Liu, Lin Liu, Xingwei Zhou, Yuelin Chen, Telu Tang

    Published 2025-06-01
    “…The testing shows that the MAE and RMSE for full-life capacity estimation remain around 1%, with most cells achieving values under 1%. …”
    Get full text
    Article