-
141
-
142
Innovative Control Techniques for Enhancing Signal Quality in Power Applications: Mitigating Electromagnetic Interference
Published 2025-05-01“…The used modulation scheme can effectively distribute the harmonic energy across a larger range of frequencies to largely eliminate EMI and boost the stability of the system. …”
Get full text
Article -
143
Fault Diagnosis of Rolling Bearing based on Sideband Correlation Algorithm and Hilbert Envelope Spectrum
Published 2016-01-01“…Eventually,the size of the modulation frequency is got. The analysis and verification is carried out by using the vibration signal of rolling bearing experiment,finding out the modulation frequency of vibration signals under the condition of outer ring,inner ring,rolling body defect,the fault feature can be extracted effectively. …”
Get full text
Article -
144
A Comprehensive Analysis of Bandwidth and Size for Four-Types of Series-Combined Transformer-Based Doherty Output Networks: Theory and Examples
Published 2025-01-01“…To validate the circuit model, a design example was built through a detailed procedure as the best practice, and a layout-based full-EM structure achieved close-to-theoretical BW. For further verification, four SCT-based Doherty power amplifiers were simulated and compared.…”
Get full text
Article -
145
A N7-methylguanosine modified circular RNA, circIPP2A2, promotes malignant behaviors in hepatocellular carcinoma by serving as a scaffold in modulating the Hornerin/PI3K/AKT/GSK3β...
Published 2024-11-01“…After the structure verification of circIPP2A2, loss-of-function studies using a lentiviral vector revealed that circIPP2A2 downregulation significantly inhibited HCC tumorigenesis and progression both in vitro and in vivo. …”
Get full text
Article -
146
Enhanced fire hazard detection in solar power plants: an integrated UAV, AI, and SCADA-based approach
Published 2025-05-01“…The Methods employed involve a synergistic architecture that combines an Unmanned Aerial Vehicle (UAV) equipped with high-resolution RGB and radiometric infrared cameras for rapid imaging, supplemented by dedicated Internet of Things (IoT) temperature sensors on PV module bypass diodes for critical component verification. …”
Get full text
Article -
147
Reducing False Alarm in Target Sidelobes Using Time-Varying Trajectories in Range-Doppler Diagram With Conditional 3D-DCNN
Published 2025-01-01“…The proposed method was validated using frequency-modulated continuous wave radar to detect low-RCS targets and demonstrated a reduction in FAs in clutter environments. …”
Get full text
Article -
148
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
Published 2024-09-01“…The signature and verification modules are also redesigned to address the identified vulnerabilities in Xiong’s scheme. …”
Get full text
Article -
149
Research on Target-detection and Tracking of Intelligent Mine Trucks in Open-pit Mines
Published 2022-10-01“…The algorithm includes point cloud feature extraction module, target tracking module and heterogeneous sensor fusion module. …”
Get full text
Article -
150
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01“…In the AUC and optimal threshold calculation module, the AUC of each AE is calculated according to the ROC curve of the verification data, and the optimal thresholds for each AE are determined using the Youden index. …”
Get full text
Article -
151
Design and implementation of codec based on BCH error correction algorithm
Published 2022-05-01“…Among them, the syndrome module, error location polynomial module and Chien search module in the decoding circuit adopt a three-stage pipeline structure, and the error correction and error detection stages can be carried out at the same time, which effectively improves the data processing speed and error correction speed. …”
Get full text
Article -
152
Design and Application of Vertical Temperature Profile Observation System for Arctic Sea Ice Melt Pond
Published 2024-11-01“…[Methods] The system is composed of observation module, power supply module, data acquisition module, data transmission module, and auxiliary module. …”
Get full text
Article -
153
Development of JZ-8 Brake Control System for Locomotive
Published 2018-01-01“…JZ-8 type brake control system was introduced, including the project origin, system structure, main functions, working principle, braking mode, system software, test verification, and loading application. The important components of the brake control system were described in detail, such as the functions of the brake controller, the action of the brake screen, the modular features of the brake control cabinet, and the function principle, function and architecture of the BCU module of the core control unit. …”
Get full text
Article -
154
Modeling of membrane separation of liquid mixture in Aspen HYSYS
Published 2025-03-01“…To develop and subsequently verify the calculation block of the mass transfer process in the pervaporation membrane module based on a HybSi® ceramic membrane using experimental data as a basis for the verification process.Methods. …”
Get full text
Article -
155
Intelligent air traffic control using NLP-enhanced speech recognition and natural language generation
Published 2025-07-01“…Extensive experiments were conducted for system verification on several datasets, where each dataset is targeted for a specific module of the system. …”
Get full text
Article -
156
MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism
Published 2025-06-01Get full text
Article -
157
Research of IGBT failure energy transmission and energy shock
Published 2023-09-01“…After initial expansion, the explosive gas will act on the shell in the form of shock wave energy and gas. When the module shell cannot bind the failure energy, the module shell will explode. …”
Get full text
Article -
158
An Assist-as-Needed Control Strategy Based on a Subjective Intention Decline Model
Published 2024-11-01“…The strategy primarily consists of two modules: a subjective intention decline control module and a limb movement assessment module. …”
Get full text
Article -
159
MSTCNet: Toward Generalization Improving for Multiframe Infrared Small Target Detection
Published 2025-01-01“…Finally, in the experimental part, we adopt the DG verification method, dividing the dataset into different source domains and target domains for experimental verification. …”
Get full text
Article -
160
Metric-based learning approach to botnet detection with small samples
Published 2023-10-01“…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
Get full text
Article