首页 > 最新文献

2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)最新文献

英文 中文
Area Constraint Aware Physical Unclonable Function for Intelligence Module 智能模块的区域约束感知物理不可克隆功能
Y. Nozaki, M. Yoshikawa
Artificial intelligence technology such as neural network (NN) is widely used in intelligence module for Internet of Things (IoT). On the other hand, the risk of illegal attacks for IoT devices is pointed out; therefore, security countermeasures such as an authentication are very important. In the field of hardware security, the physical unclonable functions (PUFs) have been attracted attention as authentication techniques to prevent the semiconductor counterfeits. However, implementation of the dedicated hardware for both of NN and PUF increases circuit area. Therefore, this study proposes a new area constraint aware PUF for intelligence module. The proposed PUF utilizes the propagation delay time from input layer to output layer of NN. To share component for operation, the proposed PUF reduces the circuit area. Experiments using a field programmable gate array evaluate circuit area and PUF performance. In the result of circuit area, the proposed PUF was smaller than the conventional PUFs was showed. Then, in the PUF performance evaluation, for steadiness, diffuseness, and uniqueness, favorable results were obtained.
神经网络(NN)等人工智能技术被广泛应用于物联网智能模块中。另一方面,指出了物联网设备遭受非法攻击的风险;因此,认证等安全对策非常重要。在硬件安全领域,物理不可克隆功能(PUFs)作为防止半导体仿冒品的认证技术受到了广泛的关注。然而,对于神经网络和PUF的专用硬件的实现增加了电路面积。因此,本研究提出了一种新的智能模块区域约束感知PUF。所提出的PUF利用了神经网络从输入层到输出层的传播延迟时间。为了实现元器件共享,PUF减小了电路的面积。实验使用现场可编程门阵列评估电路面积和PUF性能。电路面积结果表明,所提出的PUF比传统的PUF要小。在PUF性能评价中,从稳定性、弥漫性、唯一性三个方面进行了较好的评价。
{"title":"Area Constraint Aware Physical Unclonable Function for Intelligence Module","authors":"Y. Nozaki, M. Yoshikawa","doi":"10.1109/ICCIA.2018.00046","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00046","url":null,"abstract":"Artificial intelligence technology such as neural network (NN) is widely used in intelligence module for Internet of Things (IoT). On the other hand, the risk of illegal attacks for IoT devices is pointed out; therefore, security countermeasures such as an authentication are very important. In the field of hardware security, the physical unclonable functions (PUFs) have been attracted attention as authentication techniques to prevent the semiconductor counterfeits. However, implementation of the dedicated hardware for both of NN and PUF increases circuit area. Therefore, this study proposes a new area constraint aware PUF for intelligence module. The proposed PUF utilizes the propagation delay time from input layer to output layer of NN. To share component for operation, the proposed PUF reduces the circuit area. Experiments using a field programmable gate array evaluate circuit area and PUF performance. In the result of circuit area, the proposed PUF was smaller than the conventional PUFs was showed. Then, in the PUF performance evaluation, for steadiness, diffuseness, and uniqueness, favorable results were obtained.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Network-Based Recommendation Algorithm 基于网络的推荐算法
Xiangguang Dai, Yingji Cui, Zheng Chen, Yi Yang
As Internet expanding into offline, the traditional retail industry began to use the personalized recommendation algorithm to increase user stickiness, conversion and business income. Without considering the data segmentation problem, traditional recommendation algorithm did not perform well in the traditional business data. Accordingly, we considered the interest spread characteristic of retail industry behavior, adopted the method of complex network to construct a personalized recommendation algorithm using the segmentation data set. By using a real sales dataset of a large supermarket, we provided an evaluation of our algorithm. The results show that our algorithm have much better performance in accuracy and recall than the traditional ones, but with the disadvantage of being less coverage.
随着互联网向线下扩张,传统零售行业开始使用个性化推荐算法来增加用户粘性、转化率和业务收入。传统的推荐算法在没有考虑数据分割问题的情况下,在传统的商业数据中表现不佳。据此,我们考虑零售行业行为的兴趣扩散特征,采用复杂网络的方法,利用分割数据集构建个性化推荐算法。通过使用一个大型超市的真实销售数据集,我们对我们的算法进行了评估。结果表明,该算法在准确率和查全率方面均优于传统算法,但存在覆盖范围小的缺点。
{"title":"A Network-Based Recommendation Algorithm","authors":"Xiangguang Dai, Yingji Cui, Zheng Chen, Yi Yang","doi":"10.1109/iccia.2018.00018","DOIUrl":"https://doi.org/10.1109/iccia.2018.00018","url":null,"abstract":"As Internet expanding into offline, the traditional retail industry began to use the personalized recommendation algorithm to increase user stickiness, conversion and business income. Without considering the data segmentation problem, traditional recommendation algorithm did not perform well in the traditional business data. Accordingly, we considered the interest spread characteristic of retail industry behavior, adopted the method of complex network to construct a personalized recommendation algorithm using the segmentation data set. By using a real sales dataset of a large supermarket, we provided an evaluation of our algorithm. The results show that our algorithm have much better performance in accuracy and recall than the traditional ones, but with the disadvantage of being less coverage.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Improved Estimation of Distribution Algorithms for Community Detection 社区检测中改进的分布估计算法
Ben-Da Zhou, Zhao Pan, Zhang Jinbo
Based on the analysis of local monotonic of modularity function, this paper designs a fast and effective mutation operator, and then proposes an improved Estimation of Distribution Algorithm (EDA) for solving community detection problem. The proposed algorithm is tested on basic network and big scale complex network. Experimental results show that this algorithm can get 0.419 8 for the average Q function while running 100 times, has better performance than Girvan-Newman(GN) algorithm, Fast Newman (FN) algorithm and Tasgin Genetic Algorithm (TGA).
在分析模块化函数局部单调性的基础上,设计了一种快速有效的变异算子,并在此基础上提出了一种改进的分布估计算法(EDA)来解决社团检测问题。在基本网络和大规模复杂网络上对该算法进行了测试。实验结果表明,该算法在运行100次时平均Q函数可得到0.419 8,性能优于Girvan-Newman(GN)算法、Fast Newman(FN)算法和Tasgin Genetic algorithm (TGA)算法。
{"title":"The Improved Estimation of Distribution Algorithms for Community Detection","authors":"Ben-Da Zhou, Zhao Pan, Zhang Jinbo","doi":"10.1109/iccia.2018.00021","DOIUrl":"https://doi.org/10.1109/iccia.2018.00021","url":null,"abstract":"Based on the analysis of local monotonic of modularity function, this paper designs a fast and effective mutation operator, and then proposes an improved Estimation of Distribution Algorithm (EDA) for solving community detection problem. The proposed algorithm is tested on basic network and big scale complex network. Experimental results show that this algorithm can get 0.419 8 for the average Q function while running 100 times, has better performance than Girvan-Newman(GN) algorithm, Fast Newman (FN) algorithm and Tasgin Genetic Algorithm (TGA).","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121453694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page iii 第三页标题
{"title":"Title Page iii","authors":"","doi":"10.1109/iccia.2018.00002","DOIUrl":"https://doi.org/10.1109/iccia.2018.00002","url":null,"abstract":"","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124156705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICCIA 2018 Preface
{"title":"ICCIA 2018 Preface","authors":"","doi":"10.1109/iccia.2018.00005","DOIUrl":"https://doi.org/10.1109/iccia.2018.00005","url":null,"abstract":"","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page i 第1页
{"title":"Title Page i","authors":"","doi":"10.1109/iccia.2018.00001","DOIUrl":"https://doi.org/10.1109/iccia.2018.00001","url":null,"abstract":"","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116005772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Human Intelligence Inspired Meta Heuristic Optimization Algorithm for TSPs 基于人类智能的tsp元启发式优化算法
Feng-Cheng Yang, Ren-Fu Li
This paper presents a novel heuristic optimization algorithm for discrete optimization problems, the Bandwidth Restricted Transmission-Simulated Optimization Algorithm (BRT-S). This algorithm imitates the intellective behaviors of human in managing network transmission. BRT-S is a constructive heuristic algorithm whose optimization procedures simulate processes of data transferring and management operations over the network. A population of solution agents mimicking message transmitters on networks is deployed to quest for optimal solutions. The algorithm however restricts the resource utilized in solution search mimicking the bandwidth resource is limited in network transmission. As a result, agents must compete with others to obtain solution construction resources. Due to the mimicked bandwidth restriction, not every agent is able to complete a solution construction. Only constructed solutions are subject to objective value evaluations. In each evolution iteration, bandwidth resources are separately modulated by conducting bandwidth deterioration, enhancement, or depletion, on the basis of the solution qualities obtained. To illustrate the operation procedures of the algorithm, a BRT-S computation model for solving the Traveling Salesman Problem is presented and the solving system is implemented for benchmark testing. Numerical results of the tests indicate that given similar computation resources, the algorithm generates better solutions than other meta heuristic algorithms, such as ACO and GA.
本文提出了一种求解离散优化问题的启发式优化算法——带宽受限传输模拟优化算法(BRT-S)。该算法模仿人类在网络传输管理中的智能行为。BRT-S是一种建设性启发式算法,其优化过程模拟了网络上的数据传输和管理操作过程。在网络上部署一群模拟消息发送器的解决方案代理来寻求最优解决方案。然而,该算法对解搜索的资源利用进行了限制,模拟了网络传输中带宽资源的有限性。因此,代理商必须与其他代理商竞争以获得解决方案构建资源。由于模拟带宽的限制,并非每个代理都能够完成解决方案的构建。只有构建的解决方案才会受到客观价值评估的影响。在每个演化迭代中,带宽资源根据所获得的解决方案质量分别通过带宽衰减、增强或耗尽进行调制。为了说明算法的操作过程,提出了求解旅行商问题的BRT-S计算模型,并对求解系统进行了基准测试。数值实验结果表明,在计算资源相似的情况下,该算法的解优于蚁群算法和遗传算法等元启发式算法。
{"title":"A Human Intelligence Inspired Meta Heuristic Optimization Algorithm for TSPs","authors":"Feng-Cheng Yang, Ren-Fu Li","doi":"10.1109/ICCIA.2018.00016","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00016","url":null,"abstract":"This paper presents a novel heuristic optimization algorithm for discrete optimization problems, the Bandwidth Restricted Transmission-Simulated Optimization Algorithm (BRT-S). This algorithm imitates the intellective behaviors of human in managing network transmission. BRT-S is a constructive heuristic algorithm whose optimization procedures simulate processes of data transferring and management operations over the network. A population of solution agents mimicking message transmitters on networks is deployed to quest for optimal solutions. The algorithm however restricts the resource utilized in solution search mimicking the bandwidth resource is limited in network transmission. As a result, agents must compete with others to obtain solution construction resources. Due to the mimicked bandwidth restriction, not every agent is able to complete a solution construction. Only constructed solutions are subject to objective value evaluations. In each evolution iteration, bandwidth resources are separately modulated by conducting bandwidth deterioration, enhancement, or depletion, on the basis of the solution qualities obtained. To illustrate the operation procedures of the algorithm, a BRT-S computation model for solving the Traveling Salesman Problem is presented and the solving system is implemented for benchmark testing. Numerical results of the tests indicate that given similar computation resources, the algorithm generates better solutions than other meta heuristic algorithms, such as ACO and GA.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129388668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Adaptive Mutation Based Genetic Programming for Ring Oscillator PUF 基于动态自适应突变的环振PUF遗传规划
Taichi Umeda, Y. Nozaki, M. Yoshikawa
Recently, the damage caused by semiconductor counterfeit has become a serious problem in our lives. Physical Unclonable Function (PUF) has attracted attention as a countermeasure method. In the countermeasures, a ring oscillator (RO) PUF is one of the most popular PUFs. Regarding tamper resistance of RO PUFs, Genetic Programming (GP) based attacks have been proposed. However, the GP based attacks only apply the basic genetic strategy. To evaluate tamper resistance of RO PUF accurately, improvement of GP based attack for RO PUF is important. Therefore, this study proposes an accurate attack which is based on GP using dynamic adaptive mutation.
近年来,半导体假冒造成的损害已成为我们生活中一个严重的问题。物理不可克隆功能(Physical unclable Function, PUF)作为一种对策方法引起了人们的关注。在对抗中,环形振荡器(RO) PUF是最受欢迎的PUF之一。针对RO puf的抗篡改问题,提出了基于遗传规划的攻击方法。然而,基于GP的攻击只应用基本的遗传策略。为了准确地评估RO PUF的抗篡改能力,改进基于GP的RO PUF攻击至关重要。因此,本研究提出了一种基于GP的基于动态自适应突变的精确攻击方法。
{"title":"Dynamic Adaptive Mutation Based Genetic Programming for Ring Oscillator PUF","authors":"Taichi Umeda, Y. Nozaki, M. Yoshikawa","doi":"10.1109/ICCIA.2018.00047","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00047","url":null,"abstract":"Recently, the damage caused by semiconductor counterfeit has become a serious problem in our lives. Physical Unclonable Function (PUF) has attracted attention as a countermeasure method. In the countermeasures, a ring oscillator (RO) PUF is one of the most popular PUFs. Regarding tamper resistance of RO PUFs, Genetic Programming (GP) based attacks have been proposed. However, the GP based attacks only apply the basic genetic strategy. To evaluate tamper resistance of RO PUF accurately, improvement of GP based attack for RO PUF is important. Therefore, this study proposes an accurate attack which is based on GP using dynamic adaptive mutation.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Determination of MRT (Mass Rapid Transit) Jakarta Train Specification to Reach Headway Target by Using ProModel 利用ProModel确定雅加达地铁列车达到车头距目标的规格
Vidya Diantorio Putri, K. Komarudin, A. R. Destyanto
Mass Rapid Transit (MRT) Jakarta is one of the new urban transportation in Greater Jakarta area which will be operated in early 2019. The development period has been started in 2010. A research has been conducted to determine its train specification, including train set and car number in 2010. Time revealed that the based data for that research, forecasted number of Jakarta population, is not fits the actual number. This research goal is to determine the train specification, which are the number of MRT Jakarta train set and number of car for each train set to reach its headway target by considering MRT Jakarta daily passenger target based on actual number of Jakarta population. The researcher uses ProModel 7.5 as the tool to simulate 12 optional policy. These 12 optional policies is made of combined three control variable, which are train set, car number, and headway. Researcher use the number of passenger compared to MRT Jakarta daily passenger target as the indicator to choose the best policy. Based on the result of this research, the best train specification policy that could reach the 5 minutes headway MRT Jakarta target is 7 train set and 6 cars for each set.
雅加达捷运(MRT)是大雅加达地区的新型城市交通之一,将于2019年初投入运营。开发期从2010年开始。研究确定了2010年的列车规格,包括车组和车次。《时代周刊》透露,该研究的基础数据,即雅加达人口的预测数量,与实际数字不符。本研究的目标是根据雅加达的实际人口数量,考虑雅加达MRT的日客运目标,确定雅加达MRT的列车规格,即雅加达MRT列车组的数量和每个列车组达到车头时距目标的车辆数量。研究者使用promodel7.5作为工具模拟了12个可选策略。这12个可选策略是由三个控制变量组合而成的,这三个控制变量是车组、车号和车头距。研究人员将乘客数量与雅加达捷运的每日乘客目标进行比较,作为选择最佳政策的指标。基于本文的研究结果,雅加达捷运达到5分钟车头目标的最佳列车规格政策为7组列车,每组6节车厢。
{"title":"The Determination of MRT (Mass Rapid Transit) Jakarta Train Specification to Reach Headway Target by Using ProModel","authors":"Vidya Diantorio Putri, K. Komarudin, A. R. Destyanto","doi":"10.1109/ICCIA.2018.00011","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00011","url":null,"abstract":"Mass Rapid Transit (MRT) Jakarta is one of the new urban transportation in Greater Jakarta area which will be operated in early 2019. The development period has been started in 2010. A research has been conducted to determine its train specification, including train set and car number in 2010. Time revealed that the based data for that research, forecasted number of Jakarta population, is not fits the actual number. This research goal is to determine the train specification, which are the number of MRT Jakarta train set and number of car for each train set to reach its headway target by considering MRT Jakarta daily passenger target based on actual number of Jakarta population. The researcher uses ProModel 7.5 as the tool to simulate 12 optional policy. These 12 optional policies is made of combined three control variable, which are train set, car number, and headway. Researcher use the number of passenger compared to MRT Jakarta daily passenger target as the indicator to choose the best policy. Based on the result of this research, the best train specification policy that could reach the 5 minutes headway MRT Jakarta target is 7 train set and 6 cars for each set.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Unmeasured Region of the Efficiency Map of a Speed Reducer Using a Denoising Auto-Encoder 用去噪自编码器预测减速机效率图的未测区
Crino Shin, J. Yun, Seunghyun Jeong, Yongsik Jin
This paper presents a Remaining Useful Life (RUL) prediction method for a speed reducer based on denoising au- to-encoder (DAE). Constructing the efficiency map of the re- ducer is an important process for predicting the life span. However, due to the situational constraints that occur, un- measured intervals hinder the completion of the efficiency map. to solve this problem, we propose a method that can pre- dict and reconstruct an unmeasured interval effectively and reliably by using DAE. In addition, we examine the applicabil- ity of the proposed algorithm through experiments that assume various situations.
提出了一种基于自编码去噪(DAE)的减速器剩余使用寿命预测方法。构建减速器的效率图是预测减速器寿命的重要步骤。然而,由于发生的情景约束,未测量的间隔阻碍了效率图的完成。为了解决这一问题,我们提出了一种利用DAE有效可靠地预测和重建未测区间的方法。此外,我们通过假设各种情况的实验来检验所提出算法的适用性。
{"title":"Predicting Unmeasured Region of the Efficiency Map of a Speed Reducer Using a Denoising Auto-Encoder","authors":"Crino Shin, J. Yun, Seunghyun Jeong, Yongsik Jin","doi":"10.1109/ICCIA.2018.00030","DOIUrl":"https://doi.org/10.1109/ICCIA.2018.00030","url":null,"abstract":"This paper presents a Remaining Useful Life (RUL) prediction method for a speed reducer based on denoising au- to-encoder (DAE). Constructing the efficiency map of the re- ducer is an important process for predicting the life span. However, due to the situational constraints that occur, un- measured intervals hinder the completion of the efficiency map. to solve this problem, we propose a method that can pre- dict and reconstruct an unmeasured interval effectively and reliably by using DAE. In addition, we examine the applicabil- ity of the proposed algorithm through experiments that assume various situations.","PeriodicalId":297098,"journal":{"name":"2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126019877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1