首页 > 最新文献

Electronics最新文献

英文 中文
Comprehensive Data Augmentation Approach Using WGAN-GP and UMAP for Enhancing Alzheimer’s Disease Diagnosis 利用 WGAN-GP 和 UMAP 增强阿尔茨海默病诊断的综合数据增强方法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183671
Emi Yuda, Tomoki Ando, Itaru Kaneko, Yutaka Yoshida, Daisuke Hirahara
In this study, the Wasserstein Generative Adversarial Network with Gradient Penalty (WGAN-GP) was used to improve the diagnosis of Alzheimer’s disease using medical imaging and the Alzheimer’s disease image dataset across four diagnostic classes. The WGAN-GP was employed for data augmentation. The original dataset, the augmented dataset and the combined data were mapped using Uniform Manifold Approximation and Projection (UMAP) in both a 2D and 3D space. The same combined interaction network analysis was then performed on the test data. The results showed that, for the test accuracy, the score was 30.46% for the original dataset (unbalanced), whereas for the WGAN-GP augmented dataset (balanced), it improved to 56.84%, indicating that the WGAN-GP augmentation can effectively address the unbalanced problem.
本研究利用具有梯度惩罚的瓦瑟斯坦生成对抗网络(WGAN-GP)改进了利用医学影像和阿尔茨海默病图像数据集对阿尔茨海默病进行的四类诊断。WGAN-GP 被用于数据扩增。原始数据集、扩增数据集和组合数据在二维和三维空间中都使用了统一曲面逼近和投影(UMAP)技术进行了映射。然后对测试数据进行了同样的组合交互网络分析。结果显示,原始数据集(不平衡)的测试准确率为 30.46%,而 WGAN-GP 扩增数据集(平衡)的测试准确率提高到 56.84%,这表明 WGAN-GP 扩增能有效解决不平衡问题。
{"title":"Comprehensive Data Augmentation Approach Using WGAN-GP and UMAP for Enhancing Alzheimer’s Disease Diagnosis","authors":"Emi Yuda, Tomoki Ando, Itaru Kaneko, Yutaka Yoshida, Daisuke Hirahara","doi":"10.3390/electronics13183671","DOIUrl":"https://doi.org/10.3390/electronics13183671","url":null,"abstract":"In this study, the Wasserstein Generative Adversarial Network with Gradient Penalty (WGAN-GP) was used to improve the diagnosis of Alzheimer’s disease using medical imaging and the Alzheimer’s disease image dataset across four diagnostic classes. The WGAN-GP was employed for data augmentation. The original dataset, the augmented dataset and the combined data were mapped using Uniform Manifold Approximation and Projection (UMAP) in both a 2D and 3D space. The same combined interaction network analysis was then performed on the test data. The results showed that, for the test accuracy, the score was 30.46% for the original dataset (unbalanced), whereas for the WGAN-GP augmented dataset (balanced), it improved to 56.84%, indicating that the WGAN-GP augmentation can effectively address the unbalanced problem.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"3 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Localization Method for Insulation Degradation Area of the Metro Rail-to-Ground Based on Monitor Information 基于监控信息的地铁轨道至地面绝缘退化区域定位方法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183678
Aimin Wang, Yu Li, Wenxuan Yang, Guangxu Pan
Since rail-to-ground insulation decreases, large-level direct currents (DCs) leak from railways and form metro stray currents, corroding the buried metal. To locate the rail-to-ground insulation deterioration area, a location method is proposed based on parameter identification methods and the monitored information including the station rail potentials, currents at the traction power substations (TPSs), and train traction currents and train positions. According to the monitoring information of two adjacent TPSs, the section location model of the metro line is proposed, in which the rail-to-ground conductances of the test section are equivalent to the lumped parameters. Using the rail resistivity and traction currents as the known information, the rail-to-ground conductances are calculated with the least square method (LSM). The rail-to-ground insulation deterioration sections are identified by comparing the calculated conductances with thresholds determined by the standard requirements and section lengths. Then, according to the section location results, a detailed location model of the degradation section is proposed, considering the location distance accuracy. Using the genetic algorithm (GA) to calculate the rail-to-ground conductances, degradation positions are located by comparing the threshold calculated with the standard requirements and location distance accuracy. The location method is verified by comparing the calculation results under different degradation conditions. Moreover, the applications of the proposed method to different degradation lengths and different numbers of degradation sections are analyzed. The results show that the proposed method can locate rail-to-ground insulation deterioration areas.
由于轨地绝缘下降,大电平直流(DC)从铁路泄漏,形成地铁杂散电流,腐蚀埋地金属。为了定位轨地绝缘劣化区域,提出了一种基于参数识别方法和监测信息(包括车站轨道电位、牵引变电所(TPS)电流、列车牵引电流和列车位置)的定位方法。根据相邻两个 TPS 的监测信息,提出了地铁线路的区段定位模型,其中测试区段的轨地电导等同于块参数。利用轨道电阻率和牵引电流作为已知信息,用最小二乘法(LSM)计算轨地电导。通过将计算出的电导与根据标准要求和区段长度确定的阈值进行比较,确定轨地绝缘劣化区段。然后,根据区段定位结果,考虑定位距离精度,提出退化区段的详细定位模型。利用遗传算法(GA)计算轨道到地面的电导,通过比较计算出的阈值与标准要求和定位距离精度,确定退化位置。通过比较不同退化条件下的计算结果,对定位方法进行了验证。此外,还分析了建议方法在不同退化长度和不同退化区段数量下的应用。结果表明,所提出的方法可以定位轨地绝缘劣化区域。
{"title":"Localization Method for Insulation Degradation Area of the Metro Rail-to-Ground Based on Monitor Information","authors":"Aimin Wang, Yu Li, Wenxuan Yang, Guangxu Pan","doi":"10.3390/electronics13183678","DOIUrl":"https://doi.org/10.3390/electronics13183678","url":null,"abstract":"Since rail-to-ground insulation decreases, large-level direct currents (DCs) leak from railways and form metro stray currents, corroding the buried metal. To locate the rail-to-ground insulation deterioration area, a location method is proposed based on parameter identification methods and the monitored information including the station rail potentials, currents at the traction power substations (TPSs), and train traction currents and train positions. According to the monitoring information of two adjacent TPSs, the section location model of the metro line is proposed, in which the rail-to-ground conductances of the test section are equivalent to the lumped parameters. Using the rail resistivity and traction currents as the known information, the rail-to-ground conductances are calculated with the least square method (LSM). The rail-to-ground insulation deterioration sections are identified by comparing the calculated conductances with thresholds determined by the standard requirements and section lengths. Then, according to the section location results, a detailed location model of the degradation section is proposed, considering the location distance accuracy. Using the genetic algorithm (GA) to calculate the rail-to-ground conductances, degradation positions are located by comparing the threshold calculated with the standard requirements and location distance accuracy. The location method is verified by comparing the calculation results under different degradation conditions. Moreover, the applications of the proposed method to different degradation lengths and different numbers of degradation sections are analyzed. The results show that the proposed method can locate rail-to-ground insulation deterioration areas.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"101 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FBLearn: Decentralized Platform for Federated Learning on Blockchain FBLearn:区块链联合学习的去中心化平台
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183672
Daniel Djolev, Milena Lazarova, Ognyan Nakov
In recent years, rapid technological advancements have propelled blockchain and artificial intelligence (AI) into prominent roles within the digital industry, each having unique applications. Blockchain, recognized for its secure and transparent data storage, and AI, a powerful tool for data analysis and decision making, exhibit common features that render them complementary. At the same time, machine learning has become a robust and influential technology, adopted by many companies to address non-trivial technical problems. This adoption is fueled by the vast amounts of data generated and utilized in daily operations. An intriguing intersection of blockchain and AI occurs in the realm of federated learning, a distributed approach allowing multiple parties to collaboratively train a shared model without centralizing data. This paper presents a decentralized platform FBLearn for the implementation of federated learning in blockchain, which enables us to harness the benefits of federated learning without the necessity of exchanging sensitive customer or product data, thereby fostering trustless collaboration. As the decentralized blockchain network is introduced in the distributed model training to replace the centralized server, global model aggregation approaches have to be utilized. This paper investigates several techniques for model aggregation based on the local model average and ensemble using either local or globally distributed validation data for model evaluation. The suggested aggregation approaches are experimentally evaluated based on two use cases of the FBLearn platform: credit risk scoring using a random forest classifier and credit card fraud detection using a logistic regression. The experimental results confirm that the suggested adaptive weight calculation and ensemble techniques based on the quality of local training data enhance the robustness of the global model. The performance evaluation metrics and ROC curves prove that the aggregation strategies successfully isolate the influence of the low-quality models on the final model. The proposed system’s ability to outperform models created with separate datasets underscores its potential to enhance collaborative efforts and to improve the accuracy of the final global model compared to each of the local models. Integrating blockchain and federated learning presents a forward-looking approach to data collaboration while addressing privacy concerns.
近年来,技术的飞速发展推动区块链和人工智能(AI)在数字产业中发挥着重要作用,各自都有独特的应用。区块链因其安全、透明的数据存储而备受认可,而人工智能则是数据分析和决策制定的强大工具,两者的共同特点使其具有互补性。与此同时,机器学习已成为一种强大而有影响力的技术,被许多公司采用来解决棘手的技术问题。日常运营中产生和使用的大量数据为这一技术的采用提供了动力。区块链和人工智能的一个有趣交叉点出现在联合学习领域,这是一种分布式方法,允许多方在不集中数据的情况下合作训练一个共享模型。本文介绍了在区块链中实施联合学习的去中心化平台 FBLearn,它使我们能够利用联合学习的优势,而无需交换敏感的客户或产品数据,从而促进无信任协作。由于在分布式模型训练中引入了去中心化的区块链网络来取代中心化服务器,因此必须利用全局模型聚合方法。本文研究了几种基于本地模型平均值和集合的模型聚合技术,使用本地或全球分布式验证数据进行模型评估。本文基于 FBLearn 平台的两个使用案例对建议的聚合方法进行了实验评估:使用随机森林分类器的信用风险评分和使用逻辑回归的信用卡欺诈检测。实验结果证实,所建议的基于本地训练数据质量的自适应权重计算和集合技术提高了全局模型的鲁棒性。性能评估指标和 ROC 曲线证明,集合策略成功地隔离了低质量模型对最终模型的影响。拟议系统的性能优于使用独立数据集创建的模型,这突出表明该系统具有加强协作的潜力,而且与每个本地模型相比,它还能提高最终全局模型的准确性。整合区块链和联合学习为数据协作提供了一种前瞻性方法,同时解决了隐私问题。
{"title":"FBLearn: Decentralized Platform for Federated Learning on Blockchain","authors":"Daniel Djolev, Milena Lazarova, Ognyan Nakov","doi":"10.3390/electronics13183672","DOIUrl":"https://doi.org/10.3390/electronics13183672","url":null,"abstract":"In recent years, rapid technological advancements have propelled blockchain and artificial intelligence (AI) into prominent roles within the digital industry, each having unique applications. Blockchain, recognized for its secure and transparent data storage, and AI, a powerful tool for data analysis and decision making, exhibit common features that render them complementary. At the same time, machine learning has become a robust and influential technology, adopted by many companies to address non-trivial technical problems. This adoption is fueled by the vast amounts of data generated and utilized in daily operations. An intriguing intersection of blockchain and AI occurs in the realm of federated learning, a distributed approach allowing multiple parties to collaboratively train a shared model without centralizing data. This paper presents a decentralized platform FBLearn for the implementation of federated learning in blockchain, which enables us to harness the benefits of federated learning without the necessity of exchanging sensitive customer or product data, thereby fostering trustless collaboration. As the decentralized blockchain network is introduced in the distributed model training to replace the centralized server, global model aggregation approaches have to be utilized. This paper investigates several techniques for model aggregation based on the local model average and ensemble using either local or globally distributed validation data for model evaluation. The suggested aggregation approaches are experimentally evaluated based on two use cases of the FBLearn platform: credit risk scoring using a random forest classifier and credit card fraud detection using a logistic regression. The experimental results confirm that the suggested adaptive weight calculation and ensemble techniques based on the quality of local training data enhance the robustness of the global model. The performance evaluation metrics and ROC curves prove that the aggregation strategies successfully isolate the influence of the low-quality models on the final model. The proposed system’s ability to outperform models created with separate datasets underscores its potential to enhance collaborative efforts and to improve the accuracy of the final global model compared to each of the local models. Integrating blockchain and federated learning presents a forward-looking approach to data collaboration while addressing privacy concerns.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"118 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things-Based Multi-Agent System for the Control of Smart Street Lighting 基于物联网的智能路灯控制多代理系统
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183673
Sofia Kouah, Asma Saighi, Maryem Ammi, Aymen Naït Si Mohand, Marwa Ines Kouah, David Megías
The Internet of Things refers to a network of interconnected devices, objects, and systems, that can interact with one another without human intervention. The adoption of IoT technology has expanded rapidly, significantly impacting various fields, including smart healthcare, intelligent transportation, agriculture, and smart homes. This paper focuses on smart street lighting, which represents the core piece of the smart city and the key public service for citizens’ safety. Nevertheless, it poses substantial challenges related to energy consumption, especially during energy crises. This work aims to provide an advanced solution that enables intelligent control of street lighting, enhances human safety, reduces CO2 emissions and light pollution, and optimizes energy consumption, as well as facilitates maintenance of the lighting network. The solution is twofold: First, it introduces IoT-based smart street lighting referential models; second, it presents a framework for controlling smart street lighting based on the referential models. The proposal uses an IoT-based fuzzy multi-agent systems approach to address the challenges of smart street lighting. The approach leverages the strengths and properties of fuzzy logic and multi-agent systems to address the system requirements. This is illustrated through a testbed case study conducted on a concrete IoT prototype.
物联网是指由相互连接的设备、物体和系统组成的网络,这些设备、物体和系统可以在没有人工干预的情况下进行交互。物联网技术的应用范围迅速扩大,对智能医疗、智能交通、农业和智能家居等各个领域产生了重大影响。本文的重点是智能路灯,它是智能城市的核心部分,也是保障市民安全的关键公共服务。然而,它在能源消耗方面带来了巨大挑战,尤其是在能源危机期间。这项工作旨在提供一种先进的解决方案,实现对街道照明的智能控制,提高人类安全,减少二氧化碳排放和光污染,优化能源消耗,并促进照明网络的维护。该解决方案包括两个方面:首先,它引入了基于物联网的智能街道照明参考模型;其次,它提出了一个基于参考模型的智能街道照明控制框架。该提案采用基于物联网的模糊多代理系统方法来应对智能街道照明的挑战。该方法利用模糊逻辑和多代理系统的优势和特性来满足系统要求。通过在一个具体的物联网原型上进行的试验台案例研究来说明这一点。
{"title":"Internet of Things-Based Multi-Agent System for the Control of Smart Street Lighting","authors":"Sofia Kouah, Asma Saighi, Maryem Ammi, Aymen Naït Si Mohand, Marwa Ines Kouah, David Megías","doi":"10.3390/electronics13183673","DOIUrl":"https://doi.org/10.3390/electronics13183673","url":null,"abstract":"The Internet of Things refers to a network of interconnected devices, objects, and systems, that can interact with one another without human intervention. The adoption of IoT technology has expanded rapidly, significantly impacting various fields, including smart healthcare, intelligent transportation, agriculture, and smart homes. This paper focuses on smart street lighting, which represents the core piece of the smart city and the key public service for citizens’ safety. Nevertheless, it poses substantial challenges related to energy consumption, especially during energy crises. This work aims to provide an advanced solution that enables intelligent control of street lighting, enhances human safety, reduces CO2 emissions and light pollution, and optimizes energy consumption, as well as facilitates maintenance of the lighting network. The solution is twofold: First, it introduces IoT-based smart street lighting referential models; second, it presents a framework for controlling smart street lighting based on the referential models. The proposal uses an IoT-based fuzzy multi-agent systems approach to address the challenges of smart street lighting. The approach leverages the strengths and properties of fuzzy logic and multi-agent systems to address the system requirements. This is illustrated through a testbed case study conducted on a concrete IoT prototype.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"6 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Exercise Induces Adaptations in Muscle Oxygen Saturation in Division One Collegiate Butterfly Swimmers: A Randomized Controlled Trial 功能性锻炼诱导甲组大学生蝶泳运动员肌肉氧饱和度的适应性变化:随机对照试验
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183680
Jack Grotke, Austin Alcantara, Joe Amitrano, Dhruv R. Seshadri
This study investigates the impact of a five-week functional exercise intervention designed to enhance the muscular endurance of the posterior shoulder musculature, aiming to mitigate shoulder fatigue and overuse injury. Twelve Division I collegiate butterfly swimmers were recruited and evenly randomized into exercise (EX) and control (CTRL) groups. Weekly 100-yard butterfly sprints were performed, with Muscle Oxygen Saturation (SmO2) continuously monitored using a wearable near-infrared spectroscopy (NIRS) device. This study is among the first to utilize wearable NIRS devices to monitor SmO2 underwater during swimming, demonstrating that a targeted 5-week exercise program significantly improves posterior shoulder endurance, as evidenced by increased Posterior Shoulder Endurance Test (PSET) scores and distinctive SmO2 adaptations in the EX-group compared to the CTRL group. These findings suggest that targeted dryland exercises can enhance posterior shoulder endurance with long-term implications for potentially reducing injury risk and improving performance.
本研究调查了为期五周的功能锻炼干预的影响,该干预旨在增强肩部后部肌肉的耐力,从而减轻肩部疲劳和过度使用损伤。研究人员招募了 12 名一级大学蝶泳运动员,并将他们平均随机分为锻炼组(EX)和对照组(CTRL)。每周进行 100 码蝶泳冲刺,并使用可穿戴式近红外光谱仪(NIRS)持续监测肌肉氧饱和度(SmO2)。这项研究是首批利用可穿戴近红外光谱设备监测游泳时水下 SmO2 的研究之一,结果表明,与 CTRL 组相比,EX 组的肩关节后耐力测试 (PSET) 分数提高,SmO2 适应性明显增强,这表明为期 5 周的针对性锻炼计划能显著提高肩关节后耐力。这些研究结果表明,有针对性的旱地锻炼可以增强肩关节后部耐力,对降低受伤风险和提高运动成绩具有长远意义。
{"title":"Functional Exercise Induces Adaptations in Muscle Oxygen Saturation in Division One Collegiate Butterfly Swimmers: A Randomized Controlled Trial","authors":"Jack Grotke, Austin Alcantara, Joe Amitrano, Dhruv R. Seshadri","doi":"10.3390/electronics13183680","DOIUrl":"https://doi.org/10.3390/electronics13183680","url":null,"abstract":"This study investigates the impact of a five-week functional exercise intervention designed to enhance the muscular endurance of the posterior shoulder musculature, aiming to mitigate shoulder fatigue and overuse injury. Twelve Division I collegiate butterfly swimmers were recruited and evenly randomized into exercise (EX) and control (CTRL) groups. Weekly 100-yard butterfly sprints were performed, with Muscle Oxygen Saturation (SmO2) continuously monitored using a wearable near-infrared spectroscopy (NIRS) device. This study is among the first to utilize wearable NIRS devices to monitor SmO2 underwater during swimming, demonstrating that a targeted 5-week exercise program significantly improves posterior shoulder endurance, as evidenced by increased Posterior Shoulder Endurance Test (PSET) scores and distinctive SmO2 adaptations in the EX-group compared to the CTRL group. These findings suggest that targeted dryland exercises can enhance posterior shoulder endurance with long-term implications for potentially reducing injury risk and improving performance.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"19 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Voltage Water Pump System Based on Permanent Magnet Synchronous Motor 基于永磁同步电机的低压水泵系统
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183674
Xinrong Jin, Leifu Zhou, Tingting Lang, Yanbing Jiang
This paper designs a safe, low-cost, and efficient permanent magnet synchronous motor (PMSM) booster pump system. The aim is to enhance the pump’s safety and reduce the incidence of electric shock accidents, while also achieving cost reduction and efficiency improvement. The pump components are made of a plastic material, and a safe voltage of 36 V is used as the operating voltage. Additionally, the PMSM is chosen to replace the induction motor (IM) as the pump’s driving device, utilizing sensorless control and field-weakening control strategies. The study results show that when the flow rate is 1.51 m3/h, the efficiency of the PMSM low-voltage pump can reach up to 20.86%. At the same flow rate of 1 m3/h, compared to other pumps, the PMSM low-voltage pump exhibits higher head, energy savings, and efficiency. The proposed PMSM low-voltage pump offers advantages such as high efficiency, energy savings, safety, and low cost. This study provides a reference for the domestic PMSM pump industry.
本文设计了一种安全、低成本、高效率的永磁同步电机(PMSM)增压泵系统。目的是提高泵的安全性,减少触电事故的发生,同时降低成本,提高效率。泵部件由塑料材料制成,工作电压采用 36 V 安全电压。此外,选用 PMSM 代替感应电机(IM)作为泵的驱动装置,并采用无传感器控制和磁场削弱控制策略。研究结果表明,当流量为 1.51 m3/h 时,PMSM 低压泵的效率可达 20.86%。在流量为 1 m3/h 的相同条件下,与其他泵相比,PMSM 低压泵扬程更高、更节能、效率更高。所提出的 PMSM 低压泵具有高效、节能、安全和低成本等优点。本研究为国内 PMSM 泵行业提供了参考。
{"title":"Low-Voltage Water Pump System Based on Permanent Magnet Synchronous Motor","authors":"Xinrong Jin, Leifu Zhou, Tingting Lang, Yanbing Jiang","doi":"10.3390/electronics13183674","DOIUrl":"https://doi.org/10.3390/electronics13183674","url":null,"abstract":"This paper designs a safe, low-cost, and efficient permanent magnet synchronous motor (PMSM) booster pump system. The aim is to enhance the pump’s safety and reduce the incidence of electric shock accidents, while also achieving cost reduction and efficiency improvement. The pump components are made of a plastic material, and a safe voltage of 36 V is used as the operating voltage. Additionally, the PMSM is chosen to replace the induction motor (IM) as the pump’s driving device, utilizing sensorless control and field-weakening control strategies. The study results show that when the flow rate is 1.51 m3/h, the efficiency of the PMSM low-voltage pump can reach up to 20.86%. At the same flow rate of 1 m3/h, compared to other pumps, the PMSM low-voltage pump exhibits higher head, energy savings, and efficiency. The proposed PMSM low-voltage pump offers advantages such as high efficiency, energy savings, safety, and low cost. This study provides a reference for the domestic PMSM pump industry.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"14 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Federated Learning: Approaches, Mechanisms and Opportunities 确保联合学习:方法、机制和机遇
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183675
Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad
With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of artificial intelligence, has become the focus of interest for researchers in industry, education, healthcare and other disciplines and has proven to be as efficient as, and in some cases better than, experts in answering various problems. However, the obstacles to ML’s progress are still being explored, and Federated Learning (FL) has been presented as a solution to the problems of privacy and confidentiality. In the FL approach, users do not disclose their data throughout the learning process, which improves privacy and security. In this article, we look at the security and privacy concepts of FL and the threats and attacks it faces. We also address the security measures used in FL aggregation procedures. In addition, we examine and discuss the use of homomorphic encryption to protect FL data exchange, as well as other security strategies. Finally, we discuss security and privacy concepts in FL and what additional improvements could be made in this context to increase the efficiency of FL algorithms.
凭借分析数据的能力,人工智能技术及其分支使困难的任务变得更加容易。现在,这些技术的工具几乎应用于生活的方方面面。例如,机器学习(ML)作为人工智能的一个分支,已成为工业、教育、医疗保健和其他学科研究人员关注的焦点,并被证明在回答各种问题时与专家一样有效,甚至在某些情况下优于专家。然而,阻碍人工智能发展的障碍仍在探索之中,而联邦学习(FL)被认为是解决隐私和保密问题的一种方法。在联邦学习方法中,用户在整个学习过程中都不会公开自己的数据,从而提高了隐私性和安全性。在本文中,我们将探讨 FL 的安全和隐私概念及其面临的威胁和攻击。我们还讨论了 FL 聚合程序中使用的安全措施。此外,我们还研究和讨论了使用同态加密来保护 FL 数据交换以及其他安全策略。最后,我们讨论了 FL 中的安全和隐私概念,以及在此背景下还可以做出哪些改进来提高 FL 算法的效率。
{"title":"Securing Federated Learning: Approaches, Mechanisms and Opportunities","authors":"Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad","doi":"10.3390/electronics13183675","DOIUrl":"https://doi.org/10.3390/electronics13183675","url":null,"abstract":"With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of artificial intelligence, has become the focus of interest for researchers in industry, education, healthcare and other disciplines and has proven to be as efficient as, and in some cases better than, experts in answering various problems. However, the obstacles to ML’s progress are still being explored, and Federated Learning (FL) has been presented as a solution to the problems of privacy and confidentiality. In the FL approach, users do not disclose their data throughout the learning process, which improves privacy and security. In this article, we look at the security and privacy concepts of FL and the threats and attacks it faces. We also address the security measures used in FL aggregation procedures. In addition, we examine and discuss the use of homomorphic encryption to protect FL data exchange, as well as other security strategies. Finally, we discuss security and privacy concepts in FL and what additional improvements could be made in this context to increase the efficiency of FL algorithms.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"34 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guard Band Protection Scheme to Facilitate Coexistence of 5G Base Stations and Radar Altimeters 促进 5G 基站与雷达高度计共存的护带保护计划
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183681
Jiaqi Li, Seung-Hoon Hwang
Reformation of the 3.7–4.0 GHz band to expand 5G communication deployment poses a risk of 5G signals disrupting radar altimeter operation, leading to data loss or inaccuracies. Thus, this paper proposes a guard band protection method to facilitate the coexistence of 5G base stations and radar altimeters operating in the 4.2–4.4 GHz band. To enhance the adjacent channel leakage ratio (ACLR), we implemented spectral regrowth on an oversampled waveform using a high-power amplifier model, filtering out-of-band spectral emissions. The results demonstrated that a 150 MHz guard band enables coexistence, except in the case of the 16-by-16 antenna array in rural environments. Notably, for the 4-by-4 antenna array in urban environments, coexistence can be achieved using a 50 MHz guard band. The proposed mitigation techniques may also be extended to promote coexistence between non-terrestrial networks and 5G communication systems, including satellites, unmanned aerial vehicles, and hot air balloons.
为扩大 5G 通信部署而对 3.7-4.0 GHz 频段进行的改革会带来 5G 信号干扰雷达高度计工作的风险,导致数据丢失或不准确。因此,本文提出了一种护带保护方法,以促进在 4.2-4.4 GHz 频段工作的 5G 基站和雷达高度计的共存。为了提高相邻信道泄漏比(ACLR),我们使用高功率放大器模型在过采样波形上实现了频谱再生,过滤了带外频谱发射。结果表明,除农村环境中 16×16 天线阵列的情况外,150 MHz 的保护带可实现共存。值得注意的是,对于城市环境中的 4×4 天线阵列,使用 50 MHz 的保护带可实现共存。拟议的缓解技术还可扩展到促进非地面网络与 5G 通信系统之间的共存,包括卫星、无人驾驶飞行器和热气球。
{"title":"Guard Band Protection Scheme to Facilitate Coexistence of 5G Base Stations and Radar Altimeters","authors":"Jiaqi Li, Seung-Hoon Hwang","doi":"10.3390/electronics13183681","DOIUrl":"https://doi.org/10.3390/electronics13183681","url":null,"abstract":"Reformation of the 3.7–4.0 GHz band to expand 5G communication deployment poses a risk of 5G signals disrupting radar altimeter operation, leading to data loss or inaccuracies. Thus, this paper proposes a guard band protection method to facilitate the coexistence of 5G base stations and radar altimeters operating in the 4.2–4.4 GHz band. To enhance the adjacent channel leakage ratio (ACLR), we implemented spectral regrowth on an oversampled waveform using a high-power amplifier model, filtering out-of-band spectral emissions. The results demonstrated that a 150 MHz guard band enables coexistence, except in the case of the 16-by-16 antenna array in rural environments. Notably, for the 4-by-4 antenna array in urban environments, coexistence can be achieved using a 50 MHz guard band. The proposed mitigation techniques may also be extended to promote coexistence between non-terrestrial networks and 5G communication systems, including satellites, unmanned aerial vehicles, and hot air balloons.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"167 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hessian-Based Deep Learning Preprocessing Method for Coronary Angiography Image Analysis 基于黑森深度学习的冠状动脉造影图像分析预处理方法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183676
Yanjun Li, Takaaki Yoshimura, Yuto Horima, Hiroyuki Sugimori
Leveraging its high accuracy and stability, deep-learning-based coronary artery detection technology has been extensively utilized in diagnosing coronary artery diseases. However, traditional algorithms for localizing coronary stenosis often fall short when detecting stenosis in branch vessels, which can pose significant health risks due to factors like imaging angles and uneven contrast agent distribution. To tackle these challenges, we propose a preprocessing method that integrates Hessian-based vascular enhancement and image fusion as prerequisites for deep learning. This approach enhances fuzzy features in coronary angiography images, thereby increasing the neural network’s sensitivity to stenosis characteristics. We assessed the effectiveness of this method using the latest deep learning networks, such as YOLOv10, YOLOv9, and RT-DETR, across various evaluation metrics. Our results show that our method improves AP50 accuracy by 4.84% and 5.07% on RT-DETR R101 and YOLOv10-X, respectively, compared to images without special pre-processing. Furthermore, our analysis of different imaging angles on stenosis localization detection indicates that the left coronary artery zero is the most suitable for detecting stenosis with a AP50(%) value of 90.5. The experimental results have revealed that the proposed method is effective as a preprocessing technique for deep-learning-based coronary angiography image processing and enhances the model’s ability to identify stenosis in small blood vessels.
基于深度学习的冠状动脉检测技术具有高准确性和稳定性,已被广泛应用于冠状动脉疾病的诊断。然而,由于成像角度和造影剂分布不均等因素,传统的冠状动脉狭窄定位算法在检测分支血管狭窄时往往存在不足,这可能会对健康造成重大风险。为了应对这些挑战,我们提出了一种预处理方法,将基于黑森的血管增强和图像融合作为深度学习的先决条件。这种方法增强了冠状动脉造影图像中的模糊特征,从而提高了神经网络对血管狭窄特征的敏感性。我们使用最新的深度学习网络(如 YOLOv10、YOLOv9 和 RT-DETR)评估了该方法在各种评价指标上的有效性。结果表明,与未经特殊预处理的图像相比,我们的方法在 RT-DETR R101 和 YOLOv10-X 上将 AP50 的准确率分别提高了 4.84% 和 5.07%。此外,我们还分析了不同成像角度对狭窄定位检测的影响,结果表明左冠状动脉零点最适合检测狭窄,AP50(%) 值为 90.5。实验结果表明,所提出的方法作为基于深度学习的冠状动脉造影图像处理的预处理技术是有效的,并增强了模型识别小血管狭窄的能力。
{"title":"A Hessian-Based Deep Learning Preprocessing Method for Coronary Angiography Image Analysis","authors":"Yanjun Li, Takaaki Yoshimura, Yuto Horima, Hiroyuki Sugimori","doi":"10.3390/electronics13183676","DOIUrl":"https://doi.org/10.3390/electronics13183676","url":null,"abstract":"Leveraging its high accuracy and stability, deep-learning-based coronary artery detection technology has been extensively utilized in diagnosing coronary artery diseases. However, traditional algorithms for localizing coronary stenosis often fall short when detecting stenosis in branch vessels, which can pose significant health risks due to factors like imaging angles and uneven contrast agent distribution. To tackle these challenges, we propose a preprocessing method that integrates Hessian-based vascular enhancement and image fusion as prerequisites for deep learning. This approach enhances fuzzy features in coronary angiography images, thereby increasing the neural network’s sensitivity to stenosis characteristics. We assessed the effectiveness of this method using the latest deep learning networks, such as YOLOv10, YOLOv9, and RT-DETR, across various evaluation metrics. Our results show that our method improves AP50 accuracy by 4.84% and 5.07% on RT-DETR R101 and YOLOv10-X, respectively, compared to images without special pre-processing. Furthermore, our analysis of different imaging angles on stenosis localization detection indicates that the left coronary artery zero is the most suitable for detecting stenosis with a AP50(%) value of 90.5. The experimental results have revealed that the proposed method is effective as a preprocessing technique for deep-learning-based coronary angiography image processing and enhances the model’s ability to identify stenosis in small blood vessels.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"19 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced K-Means Clustering Algorithm for Phishing Attack Detections 用于网络钓鱼攻击检测的增强型 K-Means 聚类算法
IF 2.9 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.3390/electronics13183677
Abdallah Al-Sabbagh, Khalil Hamze, Samiya Khan, Mahmoud Elkhodr
Phishing attacks continue to pose a significant threat to cybersecurity, employing increasingly sophisticated techniques to deceive victims into revealing sensitive information or downloading malware. This paper presents a comprehensive study on the application of Machine Learning (ML) techniques for identifying phishing websites, with a focus on enhancing detection accuracy and efficiency. We propose an approach that integrates the CfsSubsetEval attribute evaluator with the K-Means Clustering algorithm to improve phishing detection capabilities. Our method was evaluated using datasets of varying sizes (2000, 7000, and 10,000 samples) from a publicly available repository. Simulation results demonstrate that our approach achieves an accuracy of 89.2% on the 2000-sample dataset, outperforming the traditional kernel K-Means algorithm, which achieved an accuracy of 51.5%. Further analysis using precision, recall, and F1-score metrics corroborates the effectiveness of our method. We also discuss the scalability and real-world applicability of our approach, addressing limitations and proposing future research directions. This study contributes to the ongoing efforts to develop robust, efficient, and adaptable phishing detection systems in the face of evolving cyber threats.
网络钓鱼攻击继续对网络安全构成重大威胁,它利用日益复杂的技术欺骗受害者,使其泄露敏感信息或下载恶意软件。本文全面研究了机器学习(ML)技术在识别网络钓鱼网站中的应用,重点是提高检测的准确性和效率。我们提出了一种将 CfsSubsetEval 属性评估器与 K-Means 聚类算法相结合的方法,以提高网络钓鱼的检测能力。我们使用公开资料库中不同规模(2000、7000 和 10,000 个样本)的数据集对我们的方法进行了评估。模拟结果表明,在 2000 个样本的数据集上,我们的方法达到了 89.2% 的准确率,超过了传统内核 K-Means 算法 51.5% 的准确率。使用精确度、召回率和 F1 分数指标进行的进一步分析证实了我们方法的有效性。我们还讨论了我们方法的可扩展性和实际应用性,解决了局限性问题,并提出了未来的研究方向。面对不断发展的网络威胁,我们正在努力开发稳健、高效和适应性强的网络钓鱼检测系统,本研究为这一努力做出了贡献。
{"title":"An Enhanced K-Means Clustering Algorithm for Phishing Attack Detections","authors":"Abdallah Al-Sabbagh, Khalil Hamze, Samiya Khan, Mahmoud Elkhodr","doi":"10.3390/electronics13183677","DOIUrl":"https://doi.org/10.3390/electronics13183677","url":null,"abstract":"Phishing attacks continue to pose a significant threat to cybersecurity, employing increasingly sophisticated techniques to deceive victims into revealing sensitive information or downloading malware. This paper presents a comprehensive study on the application of Machine Learning (ML) techniques for identifying phishing websites, with a focus on enhancing detection accuracy and efficiency. We propose an approach that integrates the CfsSubsetEval attribute evaluator with the K-Means Clustering algorithm to improve phishing detection capabilities. Our method was evaluated using datasets of varying sizes (2000, 7000, and 10,000 samples) from a publicly available repository. Simulation results demonstrate that our approach achieves an accuracy of 89.2% on the 2000-sample dataset, outperforming the traditional kernel K-Means algorithm, which achieved an accuracy of 51.5%. Further analysis using precision, recall, and F1-score metrics corroborates the effectiveness of our method. We also discuss the scalability and real-world applicability of our approach, addressing limitations and proposing future research directions. This study contributes to the ongoing efforts to develop robust, efficient, and adaptable phishing detection systems in the face of evolving cyber threats.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"374 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1