首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Road Crack Detection Algorithm based on Improved YOLOv5s 基于改进YOLOv5s的道路裂纹检测算法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-01-13 DOI: 10.3103/S0146411625701147
Zunhai Gao,  Mingda Yu

The current road crack detection models have the issues of insufficient detection accuracy and ineffective detection of small cracks. To address these issues, this paper proposes an improved YOLOv5s road crack detection model. Firstly, the coordinate attention module was inserted after all the C3 modules in the backbone to promote the feature extraction capability. Secondly, we used C2f instead of C3 to strengthen feature fusion. Then the context augmentation module CAM was added before the last Concat to enhance the detection effect of small cracks. Finally, we replaced all but the first Conv module with a Ghost Module to minimize the quantity of parameters and calculations. For convenience, we call this improved model as YOLOv5s-CCCG. The experimental results show that compared with YOLOv5s, the improved model has an improvement of 4.7 and 9% in mAP@0.5 and mAP@0.5:0.95, respectively. The detection accuracy is higher than several other object detection algorithms.

现有的道路裂缝检测模型存在检测精度不足、小裂缝检测效果不佳等问题。针对这些问题,本文提出了一种改进的YOLOv5s道路裂缝检测模型。首先,在主干的所有C3模块之后插入坐标关注模块,提高特征提取能力;其次,我们用C2f代替C3来加强特征融合。然后,在最后的拼接前加入上下文增强模块CAM,增强小裂纹的检测效果。最后,我们将第一个Conv模块替换为Ghost模块,以减少参数和计算的数量。为方便起见,我们称此改进模型为YOLOv5s-CCCG。实验结果表明,与YOLOv5s相比,改进后的模型在mAP@0.5和mAP@0.5:0.95分别提高了4.7和9%。该算法的检测精度高于其他几种目标检测算法。
{"title":"Road Crack Detection Algorithm based on Improved YOLOv5s","authors":"Zunhai Gao,&nbsp; Mingda Yu","doi":"10.3103/S0146411625701147","DOIUrl":"10.3103/S0146411625701147","url":null,"abstract":"<p>The current road crack detection models have the issues of insufficient detection accuracy and ineffective detection of small cracks. To address these issues, this paper proposes an improved YOLOv5s road crack detection model. Firstly, the coordinate attention module was inserted after all the C3 modules in the backbone to promote the feature extraction capability. Secondly, we used C2f instead of C3 to strengthen feature fusion. Then the context augmentation module CAM was added before the last Concat to enhance the detection effect of small cracks. Finally, we replaced all but the first Conv module with a Ghost Module to minimize the quantity of parameters and calculations. For convenience, we call this improved model as YOLOv5s-CCCG. The experimental results show that compared with YOLOv5s, the improved model has an improvement of 4.7 and 9% in mAP@0.5 and mAP@0.5:0.95, respectively. The detection accuracy is higher than several other object detection algorithms.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 5","pages":"575 - 586"},"PeriodicalIF":0.5,"publicationDate":"2026-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145958065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Dehazing Algorithm Based on Multiscale Residual and Attention Mechanism 基于多尺度残差和注意机制的图像去雾算法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700671
Jianming Ye,  Tao Kan

Currently, there is a lack of regulatory safety in scenarios with haze or dense water mist. To address this issue, this study analyzes image dehazing technology and proposes an image dehazing model based on multiscale residual and mixed attention mechanism. This model improves image processing efficiency and image dehazing effect by combining multiscale residual networks with spatial attention, channel attention, and frequency attention. The model achieved peak signal-to-noise ratios of 35.76 and 34.39 dB, respectively, and structural similarity values of 0.9891 and 0.9870 in the indoor and outdoor test sets of the RESIDE dataset, which were significantly better than other comparison methods. In the NTIRE’18 test set, the model found the optimal peak signal-to-noise ratio of 12.26 dB in the 45th iteration, and the optimal similarity value of 0.684 in the 60th iteration. The application analysis in real-world task test sets showed that the research model had better visual effects and detail restoration ability. Time complexity analysis showed that the model had a lower runtime, indicating its efficient computational performance. The proposed model exhibits excellent dehazing performance and computational efficiency on multiple standard and real-world test sets, verifying the effectiveness of multiscale residual networks and mixed attention mechanisms in image dehazing tasks.

目前,在雾霾或浓水雾的情况下,缺乏安全监管。针对这一问题,本文对图像去雾技术进行了分析,提出了一种基于多尺度残差和混合注意机制的图像去雾模型。该模型将多尺度残差网络与空间注意、通道注意和频率注意相结合,提高了图像处理效率和图像去雾效果。在实测数据集的室内和室外测试集上,该模型的峰值信噪比分别为35.76和34.39 dB,结构相似度分别为0.9891和0.9870,显著优于其他比较方法。在tire’18测试集中,模型在第45次迭代时发现峰值信噪比为12.26 dB,在第60次迭代时发现最优相似度值为0.684。在实际任务测试集中的应用分析表明,研究模型具有较好的视觉效果和细节还原能力。时间复杂度分析表明,该模型具有较低的运行时间,表明其具有高效的计算性能。该模型在多个标准和现实世界的测试集上表现出优异的去雾性能和计算效率,验证了多尺度残差网络和混合注意机制在图像去雾任务中的有效性。
{"title":"Image Dehazing Algorithm Based on Multiscale Residual and Attention Mechanism","authors":"Jianming Ye,&nbsp; Tao Kan","doi":"10.3103/S0146411625700671","DOIUrl":"10.3103/S0146411625700671","url":null,"abstract":"<p>Currently, there is a lack of regulatory safety in scenarios with haze or dense water mist. To address this issue, this study analyzes image dehazing technology and proposes an image dehazing model based on multiscale residual and mixed attention mechanism. This model improves image processing efficiency and image dehazing effect by combining multiscale residual networks with spatial attention, channel attention, and frequency attention. The model achieved peak signal-to-noise ratios of 35.76 and 34.39 dB, respectively, and structural similarity values of 0.9891 and 0.9870 in the indoor and outdoor test sets of the RESIDE dataset, which were significantly better than other comparison methods. In the NTIRE’18 test set, the model found the optimal peak signal-to-noise ratio of 12.26 dB in the 45th iteration, and the optimal similarity value of 0.684 in the 60th iteration. The application analysis in real-world task test sets showed that the research model had better visual effects and detail restoration ability. Time complexity analysis showed that the model had a lower runtime, indicating its efficient computational performance. The proposed model exhibits excellent dehazing performance and computational efficiency on multiple standard and real-world test sets, verifying the effectiveness of multiscale residual networks and mixed attention mechanisms in image dehazing tasks.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"530 - 540"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Application of Vue.js Framework Technology in Multidomain Automated Testing Systems Vue.js框架技术在多域自动化测试系统中的应用
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700610
Bo Jiang

Automatic testing technology can reduce production costs and improve output rates, gradually replacing time-consuming and laborious manual testing. It is gradually replacing time-consuming and labor-intensive manual testing. However, there are currently significant development difficulties and high maintenance costs in automated testing systems. The testing work is too focused on software maintenance and case correction, resulting in a significant gap between the actual application results and expectations. In view of this, a lighter automated testing system is built based on the Vue.js framework. Considering the strong data dependency in existing detection algorithms, a reinforcement learning testing algorithm based on Sarsa is proposed to enhance the flexibility of testing. The results showed that the automated testing model had higher testing coverage, testing efficiency, and fault detection volume on the software program dataset F-Droid, with 87.5%, 90.1%, and 1003 respectively, all higher than the comparison algorithm. In robot motion control testing, the model had a lower root mean square error of 1.24%. The comparative model couldn’t converge or converge to over 5.0%. This indicates that the automated testing system improves testing efficiency and accuracy, help to reduce testing costs, and ensure system stability and operational quality.

自动化检测技术可以降低生产成本,提高产出率,逐步取代耗时费力的人工检测。它正在逐渐取代耗时费力的人工测试。然而,目前在自动化测试系统中存在显著的开发困难和高昂的维护成本。测试工作过于关注软件维护和案例更正,导致实际应用结果与期望之间存在很大差距。鉴于此,基于Vue.js框架构建了一个较轻的自动化测试系统。针对现有检测算法数据依赖性强的问题,提出了一种基于Sarsa的强化学习测试算法,增强了测试的灵活性。结果表明,自动化测试模型在软件程序数据集F-Droid上具有更高的测试覆盖率、测试效率和故障检测量,分别为87.5%、90.1%和1003%,均高于对比算法。在机器人运动控制测试中,该模型的均方根误差较低,为1.24%。比较模型不能收敛或收敛到5.0%以上。这表明自动化测试系统提高了测试效率和准确性,有助于降低测试成本,保证系统的稳定性和运行质量。
{"title":"The Application of Vue.js Framework Technology in Multidomain Automated Testing Systems","authors":"Bo Jiang","doi":"10.3103/S0146411625700610","DOIUrl":"10.3103/S0146411625700610","url":null,"abstract":"<p>Automatic testing technology can reduce production costs and improve output rates, gradually replacing time-consuming and laborious manual testing. It is gradually replacing time-consuming and labor-intensive manual testing. However, there are currently significant development difficulties and high maintenance costs in automated testing systems. The testing work is too focused on software maintenance and case correction, resulting in a significant gap between the actual application results and expectations. In view of this, a lighter automated testing system is built based on the Vue.js framework. Considering the strong data dependency in existing detection algorithms, a reinforcement learning testing algorithm based on Sarsa is proposed to enhance the flexibility of testing. The results showed that the automated testing model had higher testing coverage, testing efficiency, and fault detection volume on the software program dataset F-Droid, with 87.5%, 90.1%, and 1003 respectively, all higher than the comparison algorithm. In robot motion control testing, the model had a lower root mean square error of 1.24%. The comparative model couldn’t converge or converge to over 5.0%. This indicates that the automated testing system improves testing efficiency and accuracy, help to reduce testing costs, and ensure system stability and operational quality.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"455 - 466"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiobjective Optimal Trajectory Planning for Robotic ARMS Based on PAD-MOPSO 基于PAD-MOPSO的机械臂多目标最优轨迹规划
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700683
XiaoYong Li, Qing Jiang, Jing Zhang, ZeQun Zhang, JianWen Zhang

Efficient and flexible autonomous obstacle avoidance motion capabilities have become an urgent and practical requirement for robots in the current production life. Aiming at the problem that the joint vibration caused by excessive impact affects the quality of work when the robotic arm is operating, an optimal spraying trajectory planning method for the robotic arm is proposed. In this paper, we take the four-degree-of-freedom robotic arm as the research object, use five times nonuniform B spline functions to construct the trajectory of the robotic arm, construct the multiobjective optimization function of time and impact, optimize the trajectory based on the multiobjective particle swarm optimization algorithm, and then get the required solution from the Pareto front-end through the normalization of the objective weighting function. Real robots are used for experimental verification, and the improved multiobjective optimization particle swarm algorithm, PAD-MOPSO is used to achieve the effect of multiobjective optimization of time and impact, and the displacement, velocity, acceleration, and torque during the motion process are within the constraint range.

高效灵活的自主避障运动能力已成为当前生产生活中对机器人迫切而现实的要求。针对机械臂在工作过程中因过度撞击引起的关节振动影响工作质量的问题,提出了一种机械臂最优喷涂轨迹规划方法。本文以四自由度机械臂为研究对象,利用五次非均匀B样条函数构造机械臂的运动轨迹,构造时间和冲击的多目标优化函数,基于多目标粒子群优化算法对运动轨迹进行优化,然后通过目标权重函数的归一化,从Pareto前端得到所需解。利用真实机器人进行实验验证,采用改进的多目标优化粒子群算法PAD-MOPSO实现了时间和冲击的多目标优化效果,运动过程中的位移、速度、加速度、扭矩均在约束范围内。
{"title":"Multiobjective Optimal Trajectory Planning for Robotic ARMS Based on PAD-MOPSO","authors":"XiaoYong Li,&nbsp;Qing Jiang,&nbsp;Jing Zhang,&nbsp;ZeQun Zhang,&nbsp;JianWen Zhang","doi":"10.3103/S0146411625700683","DOIUrl":"10.3103/S0146411625700683","url":null,"abstract":"<p>Efficient and flexible autonomous obstacle avoidance motion capabilities have become an urgent and practical requirement for robots in the current production life. Aiming at the problem that the joint vibration caused by excessive impact affects the quality of work when the robotic arm is operating, an optimal spraying trajectory planning method for the robotic arm is proposed. In this paper, we take the four-degree-of-freedom robotic arm as the research object, use five times nonuniform B spline functions to construct the trajectory of the robotic arm, construct the multiobjective optimization function of time and impact, optimize the trajectory based on the multiobjective particle swarm optimization algorithm, and then get the required solution from the Pareto front-end through the normalization of the objective weighting function. Real robots are used for experimental verification, and the improved multiobjective optimization particle swarm algorithm, PAD-MOPSO is used to achieve the effect of multiobjective optimization of time and impact, and the displacement, velocity, acceleration, and torque during the motion process are within the constraint range.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"541 - 550"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Combination Algorithm for Harmonic Detection and Disturbance Analysis of Power Quality 一种新的谐波检测与电能质量扰动分析组合算法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700646
Jinfeng Ding,  Mingliang Zheng

With the continuous increase in people’s demand for electricity, to ensure the stable operation of the power system, accurate analysis of grid signals has become the primary task in improving power quality. This article uses a combination of FFT and wavelet transform to accurately analyze the steady-state and transient components in signals, improving detection accuracy. The specific plan is to use Newton interpolation to quasi synchronize the original sampling sequence, achieving consistency between the sampling period and the actual period; Using the modulemaximum method on the original signal to detect the presence of transient disturbances. The results showed that quasi synchronization can accurately correct the collected signals with high restoration and synchronization; The improved windowed interpolation FFT achieves a detection accuracy of 0.3% for steady-state harmonics; Wavelet divides the frequency band and uses module maxima to detect signal singularity, accurately extracting transient disturbance signals with an accuracy of up to 5%; Furthermore, we can apply this new combination algorithm to more complex power signal processing.

随着人们用电需求的不断增加,为保证电力系统的稳定运行,电网信号的准确分析已成为提高电能质量的首要任务。本文采用FFT和小波变换相结合的方法对信号中的稳态和暂态分量进行精确分析,提高了检测精度。具体方案是利用牛顿插值对原始采样序列进行准同步,实现采样周期与实际周期的一致性;利用模块最大值法对原始信号进行暂态干扰检测。结果表明:准同步能够对采集到的信号进行精确校正,具有较高的恢复和同步性;改进的加窗插值FFT对稳态谐波的检测精度为0.3%;小波对频带进行划分,利用模极大值检测信号奇异性,准确提取暂态扰动信号,精度可达5%;此外,我们还可以将这种新的组合算法应用到更复杂的功率信号处理中。
{"title":"A New Combination Algorithm for Harmonic Detection and Disturbance Analysis of Power Quality","authors":"Jinfeng Ding,&nbsp; Mingliang Zheng","doi":"10.3103/S0146411625700646","DOIUrl":"10.3103/S0146411625700646","url":null,"abstract":"<p>With the continuous increase in people’s demand for electricity, to ensure the stable operation of the power system, accurate analysis of grid signals has become the primary task in improving power quality. This article uses a combination of FFT and wavelet transform to accurately analyze the steady-state and transient components in signals, improving detection accuracy. The specific plan is to use Newton interpolation to quasi synchronize the original sampling sequence, achieving consistency between the sampling period and the actual period; Using the modulemaximum method on the original signal to detect the presence of transient disturbances. The results showed that quasi synchronization can accurately correct the collected signals with high restoration and synchronization; The improved windowed interpolation FFT achieves a detection accuracy of 0.3% for steady-state harmonics; Wavelet divides the frequency band and uses module maxima to detect signal singularity, accurately extracting transient disturbance signals with an accuracy of up to 5%; Furthermore, we can apply this new combination algorithm to more complex power signal processing.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"492 - 502"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Weed Detection Algorithm Based on Improved YOLOv5S 基于改进YOLOv5S的杂草检测算法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700609
Yuehua Li, Zhangyan Yao, Yuyang Gu, Bin Hu

Addressing issues such as high parameter count and low detection accuracy in weed detection algorithms, this paper presents a study on a weed detection algorithm based on an improved YOLOv5s model. Firstly, the backbone network was enhanced using the ParC modul4e to reduce computational demands and increase model detection speed; secondly, the C3BRA module, designed based on the BRA attention mechanism, replaced the original C3 module to focus on the extraction and reinforcement of key feature information; finally, the SIoU loss function replaced the CIoU loss function, accelerating network convergence and improving model detection accuracy. Experimental validation on the test dataset compared the improved model with the original YOLOv5s model, showing that the modified model increased the P value by 2.8%, the mAP value by 1.7%, and reduced model parameters by 10.7%, better meeting the requirements for weed detection.

针对杂草检测算法中存在的参数数量多、检测准确率低等问题,本文提出了一种基于改进YOLOv5s模型的杂草检测算法。首先,利用ParC模块对骨干网进行增强,减少计算量,提高模型检测速度;其次,基于BRA关注机制设计了C3BRA模块,取代了原有的C3模块,专注于关键特征信息的提取与强化;最后用SIoU损失函数代替CIoU损失函数,加快了网络收敛速度,提高了模型检测精度。在测试数据集上进行实验验证,将改进后的模型与原来的YOLOv5s模型进行对比,改进后的模型P值提高了2.8%,mAP值提高了1.7%,模型参数减少了10.7%,更好地满足了杂草检测的要求。
{"title":"A Weed Detection Algorithm Based on Improved YOLOv5S","authors":"Yuehua Li,&nbsp;Zhangyan Yao,&nbsp;Yuyang Gu,&nbsp;Bin Hu","doi":"10.3103/S0146411625700609","DOIUrl":"10.3103/S0146411625700609","url":null,"abstract":"<p>Addressing issues such as high parameter count and low detection accuracy in weed detection algorithms, this paper presents a study on a weed detection algorithm based on an improved YOLOv5s model. Firstly, the backbone network was enhanced using the ParC modul4e to reduce computational demands and increase model detection speed; secondly, the C3BRA module, designed based on the BRA attention mechanism, replaced the original C3 module to focus on the extraction and reinforcement of key feature information; finally, the SIoU loss function replaced the CIoU loss function, accelerating network convergence and improving model detection accuracy. Experimental validation on the test dataset compared the improved model with the original YOLOv5s model, showing that the modified model increased the <i>P</i> value by 2.8%, the mAP value by 1.7%, and reduced model parameters by 10.7%, better meeting the requirements for weed detection.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"444 - 454"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Embedded Extreme Learning Machine Autoencoder with Multilayer Cyclic Structure 多层循环结构的图嵌入式极限学习机自编码器
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S014641162570066X
Di Wu,  ZiHan Chen

To tackle the issues of incomplete feature reconstruction and insufficient feature representation in the traditional extreme learning machine autoencoder (ELM-AE), this paper proposes a multilayer GEELM-AE architecture based on cyclic structure (GEELM-AE-MCS). First, we embed the weights into the reconstruction error function to enhance local feature clustering by integrating graph embedding theory. Second, we incorporate the graph embedding matrix into the ELM feature space to preserve both global structural information and similarity of the feature data, thereby enabling the algorithm to establish a more effective boundary for feature discrimination. Finally, we propose GEELM-AE-MCS, which leverages each self-encoder’s dimensionality reduction capability to further enhance algorithm performance. Experimental results demonstrate that GEELM-AE-MCS exhibits superior feature representation and classification capabilities compared to state-of-the-art algorithms.

针对传统极限学习机自编码器(ELM-AE)特征重构不完全和特征表示不充分的问题,提出了一种基于循环结构的多层GEELM-AE架构(GEELM-AE- mcs)。首先,结合图嵌入理论,将权重嵌入重构误差函数中,增强局部特征聚类;其次,我们将图嵌入矩阵纳入ELM特征空间中,既保留了特征数据的全局结构信息,又保持了特征数据的相似性,从而使算法能够建立更有效的特征判别边界。最后,我们提出了GEELM-AE-MCS,它利用每个自编码器的降维能力来进一步提高算法的性能。实验结果表明,与现有算法相比,GEELM-AE-MCS具有更好的特征表示和分类能力。
{"title":"Graph Embedded Extreme Learning Machine Autoencoder with Multilayer Cyclic Structure","authors":"Di Wu,&nbsp; ZiHan Chen","doi":"10.3103/S014641162570066X","DOIUrl":"10.3103/S014641162570066X","url":null,"abstract":"<p>To tackle the issues of incomplete feature reconstruction and insufficient feature representation in the traditional extreme learning machine autoencoder (ELM-AE), this paper proposes a multilayer GEELM-AE architecture based on cyclic structure (GEELM-AE-MCS). First, we embed the weights into the reconstruction error function to enhance local feature clustering by integrating graph embedding theory. Second, we incorporate the graph embedding matrix into the ELM feature space to preserve both global structural information and similarity of the feature data, thereby enabling the algorithm to establish a more effective boundary for feature discrimination. Finally, we propose GEELM-AE-MCS, which leverages each self-encoder’s dimensionality reduction capability to further enhance algorithm performance. Experimental results demonstrate that GEELM-AE-MCS exhibits superior feature representation and classification capabilities compared to state-of-the-art algorithms.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"516 - 529"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Adaptive Controller Design Based on Neural Networks for a Remotely Operated Underwater Vehicle (ROV) 基于神经网络的遥控潜航器鲁棒自适应控制器设计
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700622
Z. Bellahcene, A. Laidani, A. Belherazem, M. Bouhamida

This study presents a mathematical modeling and numerical performance evaluation of a robust adaptive control strategy for the stabilization and trajectory tracking of a remotely operated underwater vehicle (ROV). Through the precise design and control of ROVs for seabed and dam inspections, these systems can efficiently substitute for human intervention, thereby eliminating the necessity to dewater structures during maintenance operations. The developed adaptive tracking controller leverages radial basis function neural networks (RBF NNs) to estimate the unknown nonlinear dynamics of the system. To further enhance robustness, The controller integrates sophisticated robust control strategies to correct modeling inaccuracies in the neural network and manage bounded external disturbances. The stability and performance of the system are rigorously validated through Lyapunov-based stability analysis. The effectiveness and dependability of the suggested method are demonstrated by means of extensive numerical simulations.

研究了一种用于遥控水下航行器(ROV)稳定和轨迹跟踪的鲁棒自适应控制策略的数学建模和数值性能评估。通过精确设计和控制用于海底和大坝检查的rov,这些系统可以有效地替代人工干预,从而消除了在维护操作期间对结构进行脱水的必要性。所开发的自适应跟踪控制器利用径向基函数神经网络(RBF神经网络)来估计系统的未知非线性动力学。为了进一步增强鲁棒性,控制器集成了复杂的鲁棒控制策略来纠正神经网络中的建模误差并管理有界外部干扰。通过李雅普诺夫稳定性分析,对系统的稳定性和性能进行了严格验证。通过大量的数值模拟验证了该方法的有效性和可靠性。
{"title":"Robust Adaptive Controller Design Based on Neural Networks for a Remotely Operated Underwater Vehicle (ROV)","authors":"Z. Bellahcene,&nbsp;A. Laidani,&nbsp;A. Belherazem,&nbsp;M. Bouhamida","doi":"10.3103/S0146411625700622","DOIUrl":"10.3103/S0146411625700622","url":null,"abstract":"<p>This study presents a mathematical modeling and numerical performance evaluation of a robust adaptive control strategy for the stabilization and trajectory tracking of a remotely operated underwater vehicle (ROV). Through the precise design and control of ROVs for seabed and dam inspections, these systems can efficiently substitute for human intervention, thereby eliminating the necessity to dewater structures during maintenance operations. The developed adaptive tracking controller leverages radial basis function neural networks (RBF NNs) to estimate the unknown nonlinear dynamics of the system. To further enhance robustness, The controller integrates sophisticated robust control strategies to correct modeling inaccuracies in the neural network and manage bounded external disturbances. The stability and performance of the system are rigorously validated through Lyapunov-based stability analysis. The effectiveness and dependability of the suggested method are demonstrated by means of extensive numerical simulations.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"467 - 480"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Divergence-Based Domain Adaptation for Fingerprint Presentation Attack Detection 基于无监督发散的指纹表示攻击检测领域自适应
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700658
Atul Kumar Uttam, Rohit Agarwal, Anand Singh Jalal

The fingerprint-based biometric technology is vulnerable to several kinds of attacks. One of the simplest attacks to carry out on the fingerprint sensor is the presentation attack. Numerous fingerprint presentation attack detection (FPAD) strategies have been put out in recent years. These FPAD techniques have yielded promising results on cross-material datasets. However, when training and testing datasets come from different domains (sensors), the performance of the FPAD approach can degrade by up to 30%. Therefore, to achieve a consistent performance, a robust FPAD approach must learn domain-independent features. We have developed an unsupervised divergence-based domain adaptation (UDDA) method with an adaptive loss function (ALF) to minimize the domain shift in FPAD. The ALF integrates domain divergence loss (DDL) and classification loss. In a cross-sensor scenario, the ALF helps learn domain-invariant features and provides reliable classification of real and fraudulent fingerprints. Experimental results demonstrate that the proposed UDDA approach reduces the cross-sensor average classification error (ACE) by 19.94% on LivDet 2015 and 19.23% on LivDet 2017.

基于指纹的生物识别技术容易受到多种攻击。对指纹传感器进行的最简单的攻击之一是呈现攻击。近年来,指纹表示攻击检测(FPAD)策略层出不穷。这些FPAD技术在跨材料数据集上取得了有希望的结果。然而,当训练和测试数据集来自不同的领域(传感器)时,FPAD方法的性能可能会下降高达30%。因此,为了获得一致的性能,健壮的FPAD方法必须学习与领域无关的特征。我们开发了一种基于无监督发散的域自适应(UDDA)方法,该方法采用自适应损失函数(ALF)来最小化FPAD中的域移位。ALF集成了DDL (domain divergence loss)和分类损失。在跨传感器场景中,ALF有助于学习域不变特征,并提供真实指纹和伪造指纹的可靠分类。实验结果表明,所提出的UDDA方法在LivDet 2015和LivDet 2017上分别将跨传感器平均分类误差(ACE)降低了19.94%和19.23%。
{"title":"Unsupervised Divergence-Based Domain Adaptation for Fingerprint Presentation Attack Detection","authors":"Atul Kumar Uttam,&nbsp;Rohit Agarwal,&nbsp;Anand Singh Jalal","doi":"10.3103/S0146411625700658","DOIUrl":"10.3103/S0146411625700658","url":null,"abstract":"<p>The fingerprint-based biometric technology is vulnerable to several kinds of attacks. One of the simplest attacks to carry out on the fingerprint sensor is the presentation attack. Numerous fingerprint presentation attack detection (FPAD) strategies have been put out in recent years. These FPAD techniques have yielded promising results on cross-material datasets. However, when training and testing datasets come from different domains (sensors), the performance of the FPAD approach can degrade by up to 30%. Therefore, to achieve a consistent performance, a robust FPAD approach must learn domain-independent features. We have developed an unsupervised divergence-based domain adaptation (UDDA) method with an adaptive loss function (ALF) to minimize the domain shift in FPAD. The ALF integrates domain divergence loss (DDL) and classification loss. In a cross-sensor scenario, the ALF helps learn domain-invariant features and provides reliable classification of real and fraudulent fingerprints. Experimental results demonstrate that the proposed UDDA approach reduces the cross-sensor average classification error (ACE) by 19.94% on LivDet 2015 and 19.23% on LivDet 2017.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"503 - 515"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Operation Method Based on Secure Chip Identity Authentication 基于安全芯片身份认证的安全操作方法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-11-12 DOI: 10.3103/S0146411625700579
Qingqin Fu, Zhengquan Ang, Fan He, Pingjiang Xu, Guanglun Yang

In order to ensure the security of identity authentication of electric power, financial and other terminal products, this paper proposes a security operation method based on security chip identity authentication. There are four main methods of this method, which need to be completed with corresponding instructions: The first is the authentication identity method. The security chip needs to send the “verify identity authentication pin” command to the interface device. After the verification is passed, the interface device can legally read and write to the security chip. The second method is to unlock the identity, need to execute the “unlock identity authentication pin” command, this method can make the locked security chip restore normal operation. The third method is to reset the identity, which needs to execute the “reload identity authentication pin” command, which can set the user’s identity authentication pin to the newly entered identity authentication pin, so as to ensure the restorability of the authentication. The fourth is to change the identity method, the security chip needs to execute the “change identity authentication pin” command, this method can update the original identity authentication pin to the newly entered identity authentication pin. Based on actual application security requirements, users can use the four types of commands to reasonably combine applications, select different security operation methods, and perform corresponding application functions such as verify, unlock, reload, and change identity authentication pin, so as to achieve secure operation of the security chip authentication pin. Identify whether the identity authentication pin is in a locked state in response to commands such as verify identity authentication pin, unlock identity authentication pin, reload identity authentication pin, or change identity authentication pin. Recognizing that the identity authentication pin is in a locked state, it is prohibited to execute the verify identity authentication pin command and change identity authentication pin command; it is allowed to execute the unlock identity authentication pin command and reload identity authentication pin command to unlock identity authentication pin. Therefore, after the identity authentication pin is locked, the identity authentication pin can be unlocked based on the unlock identity authentication pin command or reload identity authentication pin command, so that the security chip can continue to be used while meeting security requirements.

为了保证电力、金融等终端产品身份认证的安全性,本文提出了一种基于安全芯片身份认证的安全操作方法。该方法主要有四种方法,需要用相应的说明来完成:第一种是认证身份方法。安全芯片需要向接口设备发送“验证身份认证pin”命令。验证通过后,接口设备才能合法地对安全芯片进行读写操作。第二种方法是解锁身份,需要执行“解锁身份认证pin”命令,这种方法可以使被锁定的安全芯片恢复正常工作。第三种方法是重置身份,需要执行“reload identity authentication pin”命令,该命令可以将用户的身份认证pin设置为新输入的身份认证pin,从而保证认证的可恢复性。第四是更改身份方法,安全芯片需要执行“更改身份认证pin”命令,该方法可以将原始身份认证pin更新为新输入的身份认证pin。用户可以根据实际应用的安全需求,使用这四类命令合理组合应用,选择不同的安全操作方式,并执行相应的验证、解锁、重新加载、更改身份认证pin等应用功能,从而实现安全芯片认证pin的安全操作。通过验证身份认证pin码、解锁身份认证pin码、重新加载身份认证pin码、修改身份认证pin码等命令,识别身份认证pin码是否处于锁定状态。识别到身份认证pin处于锁定状态,禁止执行验证身份认证pin命令和更改身份认证pin命令;可以执行unlock identity authentication pin命令和重新加载identity authentication pin命令解锁身份认证pin。因此,在身份认证pin被锁定后,可以通过解锁身份认证pin命令或重新加载身份认证pin命令解锁身份认证pin,使安全芯片在满足安全要求的情况下继续使用。
{"title":"A Secure Operation Method Based on Secure Chip Identity Authentication","authors":"Qingqin Fu,&nbsp;Zhengquan Ang,&nbsp;Fan He,&nbsp;Pingjiang Xu,&nbsp;Guanglun Yang","doi":"10.3103/S0146411625700579","DOIUrl":"10.3103/S0146411625700579","url":null,"abstract":"<p>In order to ensure the security of identity authentication of electric power, financial and other terminal products, this paper proposes a security operation method based on security chip identity authentication. There are four main methods of this method, which need to be completed with corresponding instructions: The first is the authentication identity method. The security chip needs to send the “verify identity authentication pin” command to the interface device. After the verification is passed, the interface device can legally read and write to the security chip. The second method is to unlock the identity, need to execute the “unlock identity authentication pin” command, this method can make the locked security chip restore normal operation. The third method is to reset the identity, which needs to execute the “reload identity authentication pin” command, which can set the user’s identity authentication pin to the newly entered identity authentication pin, so as to ensure the restorability of the authentication. The fourth is to change the identity method, the security chip needs to execute the “change identity authentication pin” command, this method can update the original identity authentication pin to the newly entered identity authentication pin. Based on actual application security requirements, users can use the four types of commands to reasonably combine applications, select different security operation methods, and perform corresponding application functions such as verify, unlock, reload, and change identity authentication pin, so as to achieve secure operation of the security chip authentication pin. Identify whether the identity authentication pin is in a locked state in response to commands such as verify identity authentication pin, unlock identity authentication pin, reload identity authentication pin, or change identity authentication pin. Recognizing that the identity authentication pin is in a locked state, it is prohibited to execute the verify identity authentication pin command and change identity authentication pin command; it is allowed to execute the unlock identity authentication pin command and reload identity authentication pin command to unlock identity authentication pin. Therefore, after the identity authentication pin is locked, the identity authentication pin can be unlocked based on the unlock identity authentication pin command or reload identity authentication pin command, so that the security chip can continue to be used while meeting security requirements.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 4","pages":"417 - 425"},"PeriodicalIF":0.5,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145493493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1