首页 > 最新文献

J. Comput. Methods Sci. Eng.最新文献

英文 中文
Interactive projection information generation and feedback for reading behaviour 阅读行为的交互式投影信息生成与反馈
Pub Date : 2023-05-24 DOI: 10.3233/jcm-226770
Dongna Cai, Hao Hao, Xinyu Hu, Boyuan Wang
Interactive reading is a new reading behavior in the age of intelligence. The dual-track development of new media and interactive technology has led to changes in both reading behavior and reading experience. This paper has discussed the information generation and information feedback of interactive reading, and analysed the important applications of projection technology, gesture recognition and QR code technology in interactive reading behavior from various projection interaction technologies. Through the development process of the interactive projection of the atlas series named “City Flowers of Beijing”, we aim to demonstrate the design of interactive and sustainable reading forms, deliver the multi-dimensional, multi-level and diversified reading information, create a reading experience that is both physiologically and psychologically satisfactory to the audience in the age of intelligence, and provide a new direction for the development of human-computer reading behavior in the new media age.
互动阅读是智能时代一种新的阅读行为。新媒体和互动技术的双轨发展导致了阅读行为和阅读体验的变化。本文讨论了互动阅读的信息生成和信息反馈,并从各种投影交互技术中分析了投影技术、手势识别和二维码技术在互动阅读行为中的重要应用。通过“京城花”系列地图集互动投影的开发过程,旨在展示互动式、可持续性的阅读形式设计,传递多维度、多层次、多样化的阅读信息,营造智能时代受众生理和心理都满意的阅读体验。为新媒体时代人机阅读行为的发展提供了新的方向。
{"title":"Interactive projection information generation and feedback for reading behaviour","authors":"Dongna Cai, Hao Hao, Xinyu Hu, Boyuan Wang","doi":"10.3233/jcm-226770","DOIUrl":"https://doi.org/10.3233/jcm-226770","url":null,"abstract":"Interactive reading is a new reading behavior in the age of intelligence. The dual-track development of new media and interactive technology has led to changes in both reading behavior and reading experience. This paper has discussed the information generation and information feedback of interactive reading, and analysed the important applications of projection technology, gesture recognition and QR code technology in interactive reading behavior from various projection interaction technologies. Through the development process of the interactive projection of the atlas series named “City Flowers of Beijing”, we aim to demonstrate the design of interactive and sustainable reading forms, deliver the multi-dimensional, multi-level and diversified reading information, create a reading experience that is both physiologically and psychologically satisfactory to the audience in the age of intelligence, and provide a new direction for the development of human-computer reading behavior in the new media age.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"92 1","pages":"2009-2030"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on reliable transmission and application security architecture of power IoT based on energy interconnection 基于能源互联的电力物联网可靠传输与应用安全架构研究
Pub Date : 2023-05-11 DOI: 10.3233/jcm-226748
Zehui Liu, Rui Li, D. Ma, Weizhe Jing, Min Guo, Weixing Gao, Yun Ju
Power Internet of Things (IoT) is an important support for digital innovation service of power energy internet, covering all aspects of power system. Power IoT security defense system may have customer data information leakage during transmission because of the use of traditional means of isolation. This paper proposes a reliable transmission and application security architecture for power smart IoT based on energy interconnection, aiming to solve the reliable transmission and security authentication problems existing in power systems. The paper first analyzes the security risk of the grid wise IoT system, proposes an effective power IoT security transmission scheme, and evaluates the safe and reliable transmission of the grid wise IoT system. Then designed a safe and reliable transmission of the grid smart IoT system, to deal with the traditional power network transmission security and communication security problems. The final application is in the construction of the security transmission platform of the wisdom park of Shanxi Electric Power Company, which provides the corresponding security protection capability in the power IoT through the situational awareness security measures of each layer, and realizes the reliable transmission and security application of the source network load storage and other links in the power IoT environment.
电力物联网是电力能源互联网数字化创新服务的重要支撑,涵盖了电力系统的方方面面。电力物联网安全防御系统由于采用传统的隔离手段,在传输过程中可能存在客户数据信息泄露的问题。本文提出了一种基于能源互联的电力智能物联网可靠传输与应用安全架构,旨在解决电力系统存在的可靠传输与安全认证问题。本文首先分析了电网智能物联网系统的安全风险,提出了一种有效的电力物联网安全传输方案,并对电网智能物联网系统的安全可靠传输进行了评估。然后设计了一种安全可靠的电网传输智能物联网系统,以解决传统电网传输安全和通信安全问题。最终的应用是在山西电力公司智慧园区安全传输平台的建设中,通过各层的态势感知安全措施,在电力物联网中提供相应的安全防护能力,实现源网负载存储等环节在电力物联网环境下的可靠传输和安全应用。
{"title":"Research on reliable transmission and application security architecture of power IoT based on energy interconnection","authors":"Zehui Liu, Rui Li, D. Ma, Weizhe Jing, Min Guo, Weixing Gao, Yun Ju","doi":"10.3233/jcm-226748","DOIUrl":"https://doi.org/10.3233/jcm-226748","url":null,"abstract":"Power Internet of Things (IoT) is an important support for digital innovation service of power energy internet, covering all aspects of power system. Power IoT security defense system may have customer data information leakage during transmission because of the use of traditional means of isolation. This paper proposes a reliable transmission and application security architecture for power smart IoT based on energy interconnection, aiming to solve the reliable transmission and security authentication problems existing in power systems. The paper first analyzes the security risk of the grid wise IoT system, proposes an effective power IoT security transmission scheme, and evaluates the safe and reliable transmission of the grid wise IoT system. Then designed a safe and reliable transmission of the grid smart IoT system, to deal with the traditional power network transmission security and communication security problems. The final application is in the construction of the security transmission platform of the wisdom park of Shanxi Electric Power Company, which provides the corresponding security protection capability in the power IoT through the situational awareness security measures of each layer, and realizes the reliable transmission and security application of the source network load storage and other links in the power IoT environment.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"11 1","pages":"2141-2152"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82088113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triaxial compression test of coarse-grained soil in waste dump under different consolidation stresses conditions 不同固结应力条件下排土场粗粒土的三轴压缩试验
Pub Date : 2023-05-11 DOI: 10.3233/jcm-226742
Jun Du, Zhiming Xiong, Xinggang Shen, Chao Wang, Jie Huang
In order to explore the mechanical response characteristics of coarse-grained soil in waste dump under different consolidation stress conditions, the isobaric consolidation drained triaxial test and K0 consolidation drainage triaxial test under different confining pressures are performed, and the test data of stress-strain and volume deformation of soil are compared and analysed. The results show that the initial stress of soil under K0 consolidation condition is not zero. The shear stress-strain curves of soil with different consolidation conditions show hardening characteristics. When confining pressure increases, the shear stress of isobaric consolidated soil increases rapidly, and its failure shear stress increases significantly compared with K0 consolidated soil. Shear expansion of coarse-grained soil under low confining pressure and shear shrinkage under high confining pressure. Under low confining pressure, K0 consolidated soil is more prone to shear expansion, and the amount of shear expansion is greater than that of isobaric consolidated soil. Under medium and high confining pressure, the volume compression change of isobaric consolidated soil is greater than that of K0 consolidated soil. The initial tangent Poisson’s ratio of coarse-grained soil under different consolidation stress conditions decreases with the increase of confining pressure, and changes in a power function with the confining pressure. The cohesion of soil under isobaric consolidation stress condition, while the difference of internal friction angle of soil under different consolidation stress condition is small. The strength and deformation characteristics of soil are closely related to the initial stress state of soil. The triaxial test is used to obtain the shear strength index of soil, and the isobaric consolidation condition should not be used instead of K0 consolidation condition.
为探索不同固结应力条件下排土场粗粒土的力学响应特征,进行了不同围压条件下等压固结排水三轴试验和K0固结排水三轴试验,并对土的应力-应变和体积变形试验数据进行了对比分析。结果表明:K0固结条件下土体的初始应力不为零;不同固结条件下土体的剪应力-应变曲线表现出硬化特征。当围压增大时,等压固结土的剪应力迅速增大,其破坏剪应力较K0固结土显著增大。低围压条件下粗粒土的剪切膨胀和高围压条件下的剪切收缩。低围压下,K0固结土更容易发生剪切膨胀,且剪切膨胀量大于等压固结土。中高围压下,等压固结土的体积压缩变化大于K0固结土。不同固结应力条件下粗粒土的初始正切泊松比随围压的增大而减小,并随围压的增大呈幂函数变化。等压固结应力条件下土的黏聚力较大,而不同固结应力条件下土的内摩擦角差异较小。土的强度和变形特性与土的初始应力状态密切相关。土抗剪强度指标采用三轴试验,不应采用等压固结条件代替K0固结条件。
{"title":"Triaxial compression test of coarse-grained soil in waste dump under different consolidation stresses conditions","authors":"Jun Du, Zhiming Xiong, Xinggang Shen, Chao Wang, Jie Huang","doi":"10.3233/jcm-226742","DOIUrl":"https://doi.org/10.3233/jcm-226742","url":null,"abstract":"In order to explore the mechanical response characteristics of coarse-grained soil in waste dump under different consolidation stress conditions, the isobaric consolidation drained triaxial test and K0 consolidation drainage triaxial test under different confining pressures are performed, and the test data of stress-strain and volume deformation of soil are compared and analysed. The results show that the initial stress of soil under K0 consolidation condition is not zero. The shear stress-strain curves of soil with different consolidation conditions show hardening characteristics. When confining pressure increases, the shear stress of isobaric consolidated soil increases rapidly, and its failure shear stress increases significantly compared with K0 consolidated soil. Shear expansion of coarse-grained soil under low confining pressure and shear shrinkage under high confining pressure. Under low confining pressure, K0 consolidated soil is more prone to shear expansion, and the amount of shear expansion is greater than that of isobaric consolidated soil. Under medium and high confining pressure, the volume compression change of isobaric consolidated soil is greater than that of K0 consolidated soil. The initial tangent Poisson’s ratio of coarse-grained soil under different consolidation stress conditions decreases with the increase of confining pressure, and changes in a power function with the confining pressure. The cohesion of soil under isobaric consolidation stress condition, while the difference of internal friction angle of soil under different consolidation stress condition is small. The strength and deformation characteristics of soil are closely related to the initial stress state of soil. The triaxial test is used to obtain the shear strength index of soil, and the isobaric consolidation condition should not be used instead of K0 consolidation condition.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"7 1","pages":"2031-2043"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91542516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studies on the use of genetic algorithms to improve radial basis neural networks to monitor capacitive voltage transformers online 研究利用遗传算法改进径向基神经网络对电容电压互感器进行在线监测
Pub Date : 2023-05-11 DOI: 10.3233/jcm-226756
Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang
The metering accuracy and stability of the power grid transformer devices are of great concern to all parties of the power grid, power plants and large users, as well as the relevant government departments, with the further deepening of the electric power system reform and the gradual establishment of the electric power spot trading market. The outcomes demonstrate the viability and efficacy of the employed diagnosis method. The completed research can serve as a reference point for China’s development of a capacitive voltage transformer line monitoring system.
随着电力体制改革的进一步深入和电力现货交易市场的逐步建立,电网变压器装置的计量精度和稳定性受到电网、电厂和大用户以及政府有关部门的高度关注。结果证明了所采用的诊断方法的可行性和有效性。完成的研究可为中国电容式电压互感器线路监测系统的开发提供参考。
{"title":"Studies on the use of genetic algorithms to improve radial basis neural networks to monitor capacitive voltage transformers online","authors":"Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang","doi":"10.3233/jcm-226756","DOIUrl":"https://doi.org/10.3233/jcm-226756","url":null,"abstract":"The metering accuracy and stability of the power grid transformer devices are of great concern to all parties of the power grid, power plants and large users, as well as the relevant government departments, with the further deepening of the electric power system reform and the gradual establishment of the electric power spot trading market. The outcomes demonstrate the viability and efficacy of the employed diagnosis method. The completed research can serve as a reference point for China’s development of a capacitive voltage transformer line monitoring system.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"116 1","pages":"1971-1983"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79172249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on security encryption mechanism of physical Layer based on iterative quantization method 基于迭代量化方法的物理层安全加密机制研究
Pub Date : 2023-05-11 DOI: 10.3233/jcm-226746
Weizhe Jing, D. Ma, Hua Yang, Min Guo, Qiang Xue, W. Liu, Yanyan Zhang, Yun Ju
Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.
第三方窃听是电力系统物联网物理层数据传输过程中尚未解决的问题。安全加密效果受信道噪声和无线信道半双工特性的影响,导致密钥一致性和密钥生成率较低。针对这一问题,本文提出了一种可靠的物理层通信安全解决方案。首先,通过在特征提取过程中动态调整训练序列的长度,提高了关键字的一致性;其次,采用迭代量化方法对接收信号强度(RSS)测量值进行量化,提高密钥的生成速率。最后,基于短时能量法提取无线帧间隔特征,通过监测帧间间隔特征的变化,可以快速判断链路中是否存在窃听设备。仿真结果表明,与在信道探测阶段不使用导频信号动态调整的方法相比,合法信道的互易性R (R将在下面详细说明)提高了0.1,密钥生成率提高了约70%,并且从无线链路中提取信标帧的效果较好。结果表明,该方法能有效防止第三方窃听,有效提高密钥一致性和生成速率,有效实现信标帧检测。
{"title":"Research on security encryption mechanism of physical Layer based on iterative quantization method","authors":"Weizhe Jing, D. Ma, Hua Yang, Min Guo, Qiang Xue, W. Liu, Yanyan Zhang, Yun Ju","doi":"10.3233/jcm-226746","DOIUrl":"https://doi.org/10.3233/jcm-226746","url":null,"abstract":"Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"10 1","pages":"1883-1895"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90774838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on security access authentication mechanism of intelligent sensor based on non-interactive zero-knowledge proof method 基于非交互式零知识证明方法的智能传感器安全访问认证机制研究
Pub Date : 2023-05-11 DOI: 10.3233/jcm-226750
Min Guo, D. Ma, Feng Jing, Huiping Zheng, Xiaojie Liu, Penghui Liu, Yun Ju
In order to study the standard security access authentication mechanism of intelligent sensing terminals of massive power Internet of Things, In order to study the standard secure access authentication mechanism of intelligent sensing terminal of massive power Internet of Things, a new privacy protection method widely used in block chain is proposed to prove identity. The traditional power IoT cloud-side interaction security access MQTT protocol still has a lot of room for adaptation and optimization. First, the proposed non-interactive zero-knowledge proof identity authentication method reduces the time of traditional standard secure access authentication process; Second, it reduced the computing resources consumed in a large number of intelligent sensors access authentication. The comparison results show that, the access authentication time of this method is 30%∼50% less than that of the traditional secure access authentication process. The computing resources consumed during authentication are reduced by 20% to 30% compared with traditional security and secrecy mechanisms.
为了研究大电力物联网智能感知终端的标准安全访问认证机制,提出了一种区块链中广泛应用的新型隐私保护方法来证明身份。传统的电力物联网云端交互安全接入MQTT协议仍有很大的适应和优化空间。首先,提出的非交互式零知识证明身份认证方法减少了传统标准安全访问认证过程的时间;二是减少了大量智能传感器接入认证所消耗的计算资源。对比结果表明,该方法的访问认证时间比传统的安全访问认证过程缩短30% ~ 50%。与传统的安全和保密机制相比,认证过程中消耗的计算资源减少20% ~ 30%。
{"title":"Research on security access authentication mechanism of intelligent sensor based on non-interactive zero-knowledge proof method","authors":"Min Guo, D. Ma, Feng Jing, Huiping Zheng, Xiaojie Liu, Penghui Liu, Yun Ju","doi":"10.3233/jcm-226750","DOIUrl":"https://doi.org/10.3233/jcm-226750","url":null,"abstract":"In order to study the standard security access authentication mechanism of intelligent sensing terminals of massive power Internet of Things, In order to study the standard secure access authentication mechanism of intelligent sensing terminal of massive power Internet of Things, a new privacy protection method widely used in block chain is proposed to prove identity. The traditional power IoT cloud-side interaction security access MQTT protocol still has a lot of room for adaptation and optimization. First, the proposed non-interactive zero-knowledge proof identity authentication method reduces the time of traditional standard secure access authentication process; Second, it reduced the computing resources consumed in a large number of intelligent sensors access authentication. The comparison results show that, the access authentication time of this method is 30%∼50% less than that of the traditional secure access authentication process. The computing resources consumed during authentication are reduced by 20% to 30% compared with traditional security and secrecy mechanisms.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"69 1","pages":"1859-1867"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86748136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A descriptive study on the convolution analysis of the insulation performance of non-transparent enclosures corresponding with the changes of the construction hierarchy 非透明围护结构保温性能随结构层次变化的卷积分析描述性研究
Pub Date : 2023-05-08 DOI: 10.3233/jcm-226766
Shuo Wang, Huisheng Zeng, Jian Tang, Chenchen Wang, Lan Wang
Steady-state calculation and analysis are often inconsistent with actual conditions, because buildings are usually in unsteady heat transfer conditions; however, studies on heat transfer in the unsteady state usually adopt experiments and simulations, which do not allow consecutive analysis corresponding with the changes of the independent variable of construction. Therefore, the solution to the equation of heat transfer in the unsteady state is of great importance to the consecutive analysis of heat transfer condition in the unsteady state. Adopting the methods of both convolution calculation analysis of heat transfer in the unsteady state and experiments, the researchers ranked the four types of construction insulation performances of non-transparent enclosures of subtropical buildings in summer, including external thermal insulation, self-insulation, and two type of internal thermal insulation due to the change in the thickness of the insulation layer. As a result, the maximum value of indoor temperature in the actual condition is different from the one from the calculation of the steady steady-state but consistent with the one from convolution analysis of the unsteady state. Both the actual situation and the results of unsteady convolution calculation prove that we should not hastily draw the conclusion as to the “winner” between “inner heat preservation” and “outer heat preservation”. The unsteady convolution calculation enables us to better conduct a continuous and quantitative description and prediction of the insulation performance of the constructions in the working condition and their ranking along with the changes of construction layer.
稳态计算和分析往往与实际情况不一致,因为建筑物通常处于非稳态传热状态;然而,非定常传热研究通常采用实验和模拟的方法,无法根据结构自变量的变化进行连续分析。因此,非定常传热方程的求解对于非定常传热条件的连续分析具有重要意义。采用非稳态传热卷积计算分析和实验相结合的方法,对亚热带建筑非透明围护结构在夏季由于保温层厚度变化而产生的外保温、自保温和两种内保温四种建筑保温性能进行了排序。因此,实际条件下的室内温度最大值与稳态稳态计算结果不一致,而与非稳态卷积分析结果一致。实际情况和非定常卷积计算结果都证明,我们不应急于得出“内保温”与“外保温”孰优孰优的结论。非定常卷积计算使我们能够更好地连续、定量地描述和预测建筑在工作状态下的保温性能及其随建筑层数变化的排序。
{"title":"A descriptive study on the convolution analysis of the insulation performance of non-transparent enclosures corresponding with the changes of the construction hierarchy","authors":"Shuo Wang, Huisheng Zeng, Jian Tang, Chenchen Wang, Lan Wang","doi":"10.3233/jcm-226766","DOIUrl":"https://doi.org/10.3233/jcm-226766","url":null,"abstract":"Steady-state calculation and analysis are often inconsistent with actual conditions, because buildings are usually in unsteady heat transfer conditions; however, studies on heat transfer in the unsteady state usually adopt experiments and simulations, which do not allow consecutive analysis corresponding with the changes of the independent variable of construction. Therefore, the solution to the equation of heat transfer in the unsteady state is of great importance to the consecutive analysis of heat transfer condition in the unsteady state. Adopting the methods of both convolution calculation analysis of heat transfer in the unsteady state and experiments, the researchers ranked the four types of construction insulation performances of non-transparent enclosures of subtropical buildings in summer, including external thermal insulation, self-insulation, and two type of internal thermal insulation due to the change in the thickness of the insulation layer. As a result, the maximum value of indoor temperature in the actual condition is different from the one from the calculation of the steady steady-state but consistent with the one from convolution analysis of the unsteady state. Both the actual situation and the results of unsteady convolution calculation prove that we should not hastily draw the conclusion as to the “winner” between “inner heat preservation” and “outer heat preservation”. The unsteady convolution calculation enables us to better conduct a continuous and quantitative description and prediction of the insulation performance of the constructions in the working condition and their ranking along with the changes of construction layer.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"3 1","pages":"2127-2140"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78362328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable-length sequence model for attribute detection in the image 图像中属性检测的变长序列模型
Pub Date : 2023-04-28 DOI: 10.3233/jcm-226762
Xin Li, Jia-Min Gu, Xiaoyuan Lu, Yan Ning, L. Zhang, Peiyi Shen, Chaochen Gu
Holistic scene understanding is a challenging problem in computer vision. Most recent researches in this field were focusing on the object detection, the semantic segmentation and the relationship detection tasks. The attribute can provide meaningful information for the object instance, thus the object instance can be expressed more detail in the scene understanding. However, most researches in this field have been limited to several special conditions. Such as, several researches were just focusing on the attribute of special object class, because their solutions were aimed at a limited-scenarios, their methods are hardly to generalize in other scenarios. We also find that most of the research for multi-attribute detection task were only regarding each attribute as binary class and simply use the multi-binary-classifier method for the attribute detection. But these strategies above not consider the relation between each pair of the attributes, they will fall into trouble in the “imperfect” attribute dataset (which is labeled with the missing and incomplete annotations), and they will have low performance in the long-tail attribute class (which has lower rank of annotation and more missing labels). In this paper, we focus on the multi-attribute detection for a variant of object classes and take the relation between attributes into consideration. We propose a GRU-based model to detect a variable-length attribute sequence with a customized loss compute method to solve the “imperfect” attribute dataset problem. Furthermore, we perform ablative studies to prove the effectiveness of each part of our method. Finally, we compare our model with several existed multi-attribute detection methods on VG (Visual Genome) and CUB200 bird datasets to prove the superior performance of the proposed model.
整体场景理解是计算机视觉中的一个具有挑战性的问题。目前该领域的研究主要集中在目标检测、语义分割和关系检测等方面。属性可以为对象实例提供有意义的信息,从而在场景理解中更详细地表达对象实例。然而,这一领域的大多数研究都局限于几个特殊的条件。例如,一些研究只关注特殊对象类的属性,由于其解决方案针对的场景有限,其方法很难推广到其他场景。我们还发现,对于多属性检测任务的研究大多只是将每个属性作为二值类,简单地使用多二值分类器方法进行属性检测。但以上这些策略没有考虑到每对属性之间的关系,在“不完美”属性数据集(标注了缺失和不完整的注释)中会陷入困境,在长尾属性类(标注等级较低,缺失标签较多)中会表现不佳。本文主要研究对象类的一种变体的多属性检测,并考虑了属性之间的关系。本文提出了一种基于gru的变长属性序列检测模型,并采用自定义损失计算方法来解决属性数据集“不完美”的问题。此外,我们进行烧蚀研究,以证明我们的方法的每个部分的有效性。最后,我们将该模型与现有的几种基于VG (Visual Genome)和CUB200鸟类数据集的多属性检测方法进行了比较,证明了该模型的优越性能。
{"title":"Variable-length sequence model for attribute detection in the image","authors":"Xin Li, Jia-Min Gu, Xiaoyuan Lu, Yan Ning, L. Zhang, Peiyi Shen, Chaochen Gu","doi":"10.3233/jcm-226762","DOIUrl":"https://doi.org/10.3233/jcm-226762","url":null,"abstract":"Holistic scene understanding is a challenging problem in computer vision. Most recent researches in this field were focusing on the object detection, the semantic segmentation and the relationship detection tasks. The attribute can provide meaningful information for the object instance, thus the object instance can be expressed more detail in the scene understanding. However, most researches in this field have been limited to several special conditions. Such as, several researches were just focusing on the attribute of special object class, because their solutions were aimed at a limited-scenarios, their methods are hardly to generalize in other scenarios. We also find that most of the research for multi-attribute detection task were only regarding each attribute as binary class and simply use the multi-binary-classifier method for the attribute detection. But these strategies above not consider the relation between each pair of the attributes, they will fall into trouble in the “imperfect” attribute dataset (which is labeled with the missing and incomplete annotations), and they will have low performance in the long-tail attribute class (which has lower rank of annotation and more missing labels). In this paper, we focus on the multi-attribute detection for a variant of object classes and take the relation between attributes into consideration. We propose a GRU-based model to detect a variable-length attribute sequence with a customized loss compute method to solve the “imperfect” attribute dataset problem. Furthermore, we perform ablative studies to prove the effectiveness of each part of our method. Finally, we compare our model with several existed multi-attribute detection methods on VG (Visual Genome) and CUB200 bird datasets to prove the superior performance of the proposed model.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"16 1","pages":"1913-1927"},"PeriodicalIF":0.0,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87456501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault location in hybrid transmission lines on the basis of VMD energy entropy and SVM 基于VMD能量熵和支持向量机的混合输电线路故障定位
Pub Date : 2023-04-25 DOI: 10.3233/jcm-226760
Min Zhao, Zhihui Kang
Finding the head of a traveling wave is challenging because an overhead line-cable hybrid transmission line’s wave impedance is not constant. Because of this, it is difficult to measure the hybrid transmission line precisely. This leads to the proposal of a hybrid transmission line fault location algorithm, which combines VMD energy entropy for training support vector machines and traveling wave law graphs. The VMD energy entropy is first used to train SVM to identify the faulty section. The method of traveling waves with a single end is utilized to precisely fix the fault distance within the faulty segment when the type of traveling wave has been identified. The simulation results demonstrate that the method provides precise measurements and is effective for hybrid transmission lines with a range of fault distances and grounding resistances.
由于架空-电缆混合传输线的波阻抗不是恒定的,因此寻找行波的波头是一项挑战。因此,对混合输电线路进行精确测量是困难的。为此,提出了一种结合VMD能量熵训练支持向量机和行波规律图的混合传输线故障定位算法。首先利用VMD能量熵训练SVM来识别故障截面;在确定行波类型的情况下,采用单端行波法精确确定故障段内的故障距离。仿真结果表明,该方法对具有一定故障距离和接地电阻范围的混合输电线路具有较好的测量效果。
{"title":"Fault location in hybrid transmission lines on the basis of VMD energy entropy and SVM","authors":"Min Zhao, Zhihui Kang","doi":"10.3233/jcm-226760","DOIUrl":"https://doi.org/10.3233/jcm-226760","url":null,"abstract":"Finding the head of a traveling wave is challenging because an overhead line-cable hybrid transmission line’s wave impedance is not constant. Because of this, it is difficult to measure the hybrid transmission line precisely. This leads to the proposal of a hybrid transmission line fault location algorithm, which combines VMD energy entropy for training support vector machines and traveling wave law graphs. The VMD energy entropy is first used to train SVM to identify the faulty section. The method of traveling waves with a single end is utilized to precisely fix the fault distance within the faulty segment when the type of traveling wave has been identified. The simulation results demonstrate that the method provides precise measurements and is effective for hybrid transmission lines with a range of fault distances and grounding resistances.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"68 1","pages":"2083-2099"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90465818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on online monitoring of grid current transformer based on transformers and BiGRU 基于变压器和BiGRU的电网电流互感器在线监测研究
Pub Date : 2023-04-25 DOI: 10.3233/jcm-226763
Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang
Transformers play a crucial role in ensuring the safety of power grids. It is of great value to diagnose faults using the large amount of power data generated by the grid. It is possible to detect internal latent faults in transformers in advance of their occurrence if the normal operating condition of the transformer is detected in a timely manner. To perform online fault diagnosis of grid current transformers, we combine the Transformer and BiGRU methods. There is a temporal component to the fault input sample sequences. By using Transformer’s multi-headed attention mechanism to extract deep features from fault input sample sequences, the temporal association between latent variables can be fully exploited. As a result of the extraction of features, BiGRU is used to generate fault category coding as an output. The experimental results indicate that using the proposed algorithm achieves better results than using a single model, which is useful for the study and application of fault diagnosis in power grids for current transformers.
变压器在保证电网安全运行中起着至关重要的作用。利用电网产生的大量电力数据进行故障诊断具有重要的价值。如果及时发现变压器的正常运行状态,就有可能在变压器内部潜在故障发生之前发现故障。为了实现电网电流互感器的在线故障诊断,我们将Transformer和BiGRU方法相结合。故障输入样本序列有一个时间分量。利用Transformer的多头注意机制从故障输入样本序列中提取深层特征,可以充分利用潜在变量之间的时间关联。作为特征提取的结果,使用BiGRU生成故障分类编码作为输出。实验结果表明,该算法比单一模型具有更好的诊断效果,为电网中电流互感器故障诊断的研究和应用提供了理论依据。
{"title":"Research on online monitoring of grid current transformer based on transformers and BiGRU","authors":"Xiaokui Zang, Zhiqiang Cao, Mengshi Xiao, Xiaoou Yang","doi":"10.3233/jcm-226763","DOIUrl":"https://doi.org/10.3233/jcm-226763","url":null,"abstract":"Transformers play a crucial role in ensuring the safety of power grids. It is of great value to diagnose faults using the large amount of power data generated by the grid. It is possible to detect internal latent faults in transformers in advance of their occurrence if the normal operating condition of the transformer is detected in a timely manner. To perform online fault diagnosis of grid current transformers, we combine the Transformer and BiGRU methods. There is a temporal component to the fault input sample sequences. By using Transformer’s multi-headed attention mechanism to extract deep features from fault input sample sequences, the temporal association between latent variables can be fully exploited. As a result of the extraction of features, BiGRU is used to generate fault category coding as an output. The experimental results indicate that using the proposed algorithm achieves better results than using a single model, which is useful for the study and application of fault diagnosis in power grids for current transformers.","PeriodicalId":14668,"journal":{"name":"J. Comput. Methods Sci. Eng.","volume":"57 1","pages":"1137-1149"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80218908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Comput. Methods Sci. Eng.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1