Electronics最新文献

筛选
英文 中文
Crowd Panic Behavior Simulation Using Multi-Agent Modeling 利用多代理建模模拟人群恐慌行为
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-12 DOI: 10.3390/electronics13183622
Cătălin Dumitrescu, Valentin Radu, Radu Gheorghe, Alina-Iuliana Tăbîrcă, Maria-Cristina Ștefan, Liliana Manea
{"title":"Crowd Panic Behavior Simulation Using Multi-Agent Modeling","authors":"Cătălin Dumitrescu, Valentin Radu, Radu Gheorghe, Alina-Iuliana Tăbîrcă, Maria-Cristina Ștefan, Liliana Manea","doi":"10.3390/electronics13183622","DOIUrl":"https://doi.org/10.3390/electronics13183622","url":null,"abstract":"This research introduces a novel approach to crisis management by implementing a multi-agent algorithm within a strategic decision system. The proposed system harnesses multiple agents’ collective intelligence and adaptive capabilities to enhance decision-making processes during critical situations. The study first investigates the theoretical foundations of crisis management and multi-agent systems, emphasizing the need for an integrated approach that combines strategic decision-making with autonomous agents. Subsequently, the research presents the design and implementation of the multi-agent algorithm, outlining its ability to gather, process, and analyze diverse data sources in real time. The multi-agent algorithm is specifically tailored to adapt to dynamic crisis scenarios, ensuring a resilient decision-making framework. Experimental simulations present the implementation of a panic simulator and prediction of evacuation and intervention routes using multi-agent artificial intelligence algorithms. The results demonstrate the multi-agent algorithm-driven decision system’s superiority in response time, resource allocation, and overall crisis mitigation. Furthermore, the research explores the system’s scalability and adaptability to different crisis types, illustrating its potential applicability across diverse domains.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"176 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142208975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Data Quality Governance for Federated Cooperation Scenarios 联盟合作场景下的数据质量管理研究
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183606
Junxin Shen, Shuilan Zhou, Fanghao Xiao
{"title":"Research on Data Quality Governance for Federated Cooperation Scenarios","authors":"Junxin Shen, Shuilan Zhou, Fanghao Xiao","doi":"10.3390/electronics13183606","DOIUrl":"https://doi.org/10.3390/electronics13183606","url":null,"abstract":"Exploring the data quality problems in the context of federated cooperation and adopting corresponding governance countermeasures can facilitate the smooth progress of federated cooperation and obtain high-performance models. However, previous studies have rarely focused on quality issues in federated cooperation. To this end, this paper analyzes the quality problems in the federated cooperation scenario and innovatively proposes a “Two-stage” data quality governance framework for the federated collaboration scenarios. The first stage is mainly local data quality assessment and optimization, and the evaluation is performed by constructing a metrics scoring formula, and corresponding optimization measures are taken at the same time. In the second stage, the outlier processing mechanism is introduced, and the Data Quality Federated Averaging (Abbreviation DQ-FedAvg) aggregation method for model quality problems is proposed, so as to train high-quality global models and their own excellent local models. Finally, experiments are conducted in real datasets to compare the model performance changes before and after quality governance, and to validate the advantages of the data quality governance framework in a federated learning scenario, so that it can be widely applied to various domains. The governance framework is used to check and govern the quality problems in the federated learning process, and the accuracy of the model is improved.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"53 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AiMap+: Guiding Technology Mapping for ASICs via Learning Delay Prediction AiMap+:通过学习延迟预测指导 ASIC 技术映射
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183614
Junfeng Liu, Qinghua Zhao
{"title":"AiMap+: Guiding Technology Mapping for ASICs via Learning Delay Prediction","authors":"Junfeng Liu, Qinghua Zhao","doi":"10.3390/electronics13183614","DOIUrl":"https://doi.org/10.3390/electronics13183614","url":null,"abstract":"Technology mapping is an essential process in the Electronic Design Automation (EDA) flow which aims to find an optimal implementation of a logic network from a technology library. In application-specific integrated circuit (ASIC) designs, the non-linear delay behaviors of cells in the library essentially guide the search direction of technology mappers. Existing methods for cell delay estimation, however, rely on approximate simplifications that significantly compromise accuracy, thereby limiting the achievement of better Quality-of-Result (QoR). To address this challenge, we propose formulating cell delay estimation as a regression learning task by incorporating multiple perspective features, such as the structure of logic networks and non-linear cell delays, to guide the mapper search. We design a learning model that incorporates a customized attention mechanism to be aware of the pin delay and jointly learns the hierarchy between the logic network and library through a Neural Tensor Network, with the help of proposed parameterizable strategies to generate learning labels. Experimental results show that (i) our proposed method noticeably improves area by 9.3% and delay by 1.5%, and (ii) improves area by 12.0% for delay-oriented mapping, compared with the well-known mapper.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"23 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a High-Precision Deep-Sea Magnetic Survey System for Human-Occupied Vehicles 为载人飞行器开发高精度深海磁力勘测系统
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183611
Qimao Zhang, Keyu Zhou, Ming Deng, Qisheng Zhang, Yongqiang Feng, Leisong Liu
{"title":"Development of a High-Precision Deep-Sea Magnetic Survey System for Human-Occupied Vehicles","authors":"Qimao Zhang, Keyu Zhou, Ming Deng, Qisheng Zhang, Yongqiang Feng, Leisong Liu","doi":"10.3390/electronics13183611","DOIUrl":"https://doi.org/10.3390/electronics13183611","url":null,"abstract":"The high-precision magnetic survey system is crucial for ocean exploration. However, most existing systems face challenges such as high noise levels, low sensitivity, and inadequate magnetic compensation effects. To address these issues, we developed a high-precision magnetic survey system based on the manned submersible “Deep Sea Warrior” for deep-ocean magnetic exploration. This system incorporates a compact optically pumped cesium (Cs) magnetometer sensor to measure the total strength of the external magnetic field. Additionally, a magnetic compensation sensor is included at the front end to measure real-time attitude changes of the platform. The measured data are then transmitted to a magnetic signal processor, where an algorithm compensates for the platform’s magnetic interference. We also designed a deep pressure chamber to allow for a maximum working depth of 4500 m. Experiments conducted in both indoor and field environments verified the performance of the proposed magnetic survey system. The results showed that the system’s sensitivity is ≤0.5 nT, the noise level of the magnetometer sensor is ≤1 pT/√Hz at 1 Hz, and the sampling rate is 10 Hz. The proposed system has potential applications in ocean and geophysical exploration.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"11 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding 利用混沌水印嵌入检测和恢复篡改图像的算法
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183604
Zijie Xu, Erfu Wang
{"title":"An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding","authors":"Zijie Xu, Erfu Wang","doi":"10.3390/electronics13183604","DOIUrl":"https://doi.org/10.3390/electronics13183604","url":null,"abstract":"In recent years, the advancement of digital image processing technology and the proliferation of image editing software have reduced the technical barriers to digital image processing, enabling individuals without professional training to modify and edit images at their discretion. Consequently, the integrity and authenticity of the original image content assume greater significance. The current techniques for detecting tampering in watermark embedding are inadequate in terms of security, efficiency, and image restoration quality. In light of the aforementioned considerations, this paper puts forth an algorithm for the detection and restoration of tampered images, which employs a chaotic watermark embedding technique. The algorithm employs a chaotic system to establish a mapping relationship between image sub-blocks, thereby ensuring the randomness of the watermark information with respect to the positioning of the original image block and enhancing the security of the algorithm. Furthermore, the detection algorithm utilizes layered tampering detection to enhance the overall accuracy of the detection process and facilitate the extraction of the fundamental information required for image restoration. The restoration algorithm partially designs a weight assignment function to distinguish between the original image block and the main restored image block, thereby enhancing restoration efficiency and quality. The experimental results demonstrate that the proposed algorithm exhibits superior tamper detection accuracy compared to traditional algorithms, and the quality of the restored images is also enhanced under various simulated tamper attacks.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"270 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundus Image Generation and Classification of Diabetic Retinopathy Based on Convolutional Neural Network 基于卷积神经网络的糖尿病视网膜病变眼底图像生成与分类
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183603
Peiming Zhang, Jie Zhao, Qiaohong Liu, Xiao Liu, Xinyu Li, Yimeng Gao, Weiqi Li
{"title":"Fundus Image Generation and Classification of Diabetic Retinopathy Based on Convolutional Neural Network","authors":"Peiming Zhang, Jie Zhao, Qiaohong Liu, Xiao Liu, Xinyu Li, Yimeng Gao, Weiqi Li","doi":"10.3390/electronics13183603","DOIUrl":"https://doi.org/10.3390/electronics13183603","url":null,"abstract":"To detect fundus diseases, for instance, diabetic retinopathy (DR) at an early stage, thereby providing timely intervention and treatment, a new diabetic retinopathy grading method based on a convolutional neural network is proposed. First, data cleaning and enhancement are conducted to improve the image quality and reduce unnecessary interference. Second, a new conditional generative adversarial network with a self-attention mechanism named SACGAN is proposed to augment the number of diabetic retinopathy fundus images, thereby addressing the problems of insufficient and imbalanced data samples. Next, an improved convolutional neural network named DRMC Net, which combines ResNeXt-50 with the channel attention mechanism and multi-branch convolutional residual module, is proposed to classify diabetic retinopathy. Finally, gradient-weighted class activation mapping (Grad-CAM) is utilized to prove the proposed model’s interpretability. The outcomes of the experiment illustrates that the proposed method has high accuracy, specificity, and sensitivity, with specific results of 92.3%, 92.5%, and 92.5%, respectively.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"9 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Network Intrusion Detection in Virtual Networks 深度学习用于虚拟网络中的网络入侵检测
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183617
Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller
{"title":"Deep Learning for Network Intrusion Detection in Virtual Networks","authors":"Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller","doi":"10.3390/electronics13183617","DOIUrl":"https://doi.org/10.3390/electronics13183617","url":null,"abstract":"As organizations increasingly adopt virtualized environments for enhanced flexibility and scalability, securing virtual networks has become a critical part of current infrastructures. This research paper addresses the challenges related to intrusion detection in virtual networks, with a focus on various deep learning techniques. Since physical networks do not use encapsulation, but virtual networks do, packet analysis based on rules or machine learning outcomes for physical networks cannot be transferred directly to virtual environments. Encapsulation methods in current virtual networks include VXLAN (Virtual Extensible LAN), an EVPN (Ethernet Virtual Private Network), and NVGRE (Network Virtualization using Generic Routing Encapsulation). This paper analyzes the performance and effectiveness of network intrusion detection in virtual networks. It delves into challenges inherent in virtual network intrusion detection with deep learning, including issues such as traffic encapsulation, VM migration, and changing network internals inside the infrastructure. Experiments on detection performance demonstrate the differences between intrusion detection in virtual and physical networks.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"26 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-in-the-Loop Simulation of Flywheel Energy Storage Systems for Power Control in Wind Farms 用于风电场功率控制的飞轮储能系统的硬件在环仿真
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183610
Li Yang, Qiaoni Zhao
{"title":"Hardware-in-the-Loop Simulation of Flywheel Energy Storage Systems for Power Control in Wind Farms","authors":"Li Yang, Qiaoni Zhao","doi":"10.3390/electronics13183610","DOIUrl":"https://doi.org/10.3390/electronics13183610","url":null,"abstract":"Flywheel energy storage systems (FESSs) are widely used for power regulation in wind farms as they can balance the wind farms’ output power and improve the wind power grid connection rate. Due to the complex environment of wind farms, it is costly and time-consuming to repeatedly debug the system on-site. To save research costs and shorten research cycles, a hardware-in-the-loop (HIL) testing system was built to provide a convenient testing environment for the research of FESSs on wind farms. The focus of this study is the construction of mathematical models in the HIL testing system. Firstly, a mathematical model of the FESS main circuit is established using a hierarchical method. Secondly, the principle of the permanent magnet synchronous motor (PMSM) is analyzed, and a nonlinear dq mathematical model of the PMSM is established by referring to the relationship among d-axis inductance, q-axis inductance, and permanent magnet flux change with respect to the motor’s current. Then, the power grid and wind farm test models are established. Finally, the established mathematical models are applied to the HIL testing system. The experimental results indicated that the HIL testing system can provide a convenient testing environment for the optimization of FESS control algorithms.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"53 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analog Integrated Multiloop LDO: From Analysis to Design 模拟集成多回路 LDO:从分析到设计
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183602
Konstantinos Koniavitis, Vassilis Alimisis, Nikolaos Uzunoglu, Paul P. Sotiriadis
{"title":"An Analog Integrated Multiloop LDO: From Analysis to Design","authors":"Konstantinos Koniavitis, Vassilis Alimisis, Nikolaos Uzunoglu, Paul P. Sotiriadis","doi":"10.3390/electronics13183602","DOIUrl":"https://doi.org/10.3390/electronics13183602","url":null,"abstract":"This paper introduces a multiloop stabilized low-dropout regulator with a DC power supply rejection ratio of 85 dB and a phase margin of 80°. It is suitable for low-power, low-voltage and area-efficient applications since it consumes less than 100 μA. The dropout voltage is only 400 mV and the power supply rails are 1 V. Furthermore, a full mathematical analysis is conducted for stability and noise before the circuit verification. To confirm the proper operation of the implementation process, voltage and temperature corner variation simulations are extracted. The proposed regulator is designed and verified utilizing the Cadence IC Suite in a TSMC 90 nm CMOS process.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"25 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Convolutional Malware Network (DCMN): An Image-Based Malware Classification Using Dual Convolutional Neural Networks 双卷积恶意软件网络(DCMN):使用双卷积神经网络进行基于图像的恶意软件分类
IF 2.9 3区 工程技术
Electronics Pub Date : 2024-09-11 DOI: 10.3390/electronics13183607
Bassam Al-Masri, Nader Bakir, Ali El-Zaart, Khouloud Samrouth
{"title":"Dual Convolutional Malware Network (DCMN): An Image-Based Malware Classification Using Dual Convolutional Neural Networks","authors":"Bassam Al-Masri, Nader Bakir, Ali El-Zaart, Khouloud Samrouth","doi":"10.3390/electronics13183607","DOIUrl":"https://doi.org/10.3390/electronics13183607","url":null,"abstract":"Malware attacks have a cascading effect, causing financial harm, compromising privacy, operations and interrupting. By preventing these attacks, individuals and organizations can safeguard the valuable assets of their operations, and gain more trust. In this paper, we propose a dual convolutional neural network (DCNN) based architecture for malware classification. It consists first of converting malware binary files into 2D grayscale images and then training a customized dual CNN for malware multi-classification. This paper proposes an efficient approach for malware classification using dual CNNs. The model leverages the complementary strengths of a custom structure extraction branch and a pre-trained ResNet-50 model for malware image classification. By combining features extracted from both branches, the model achieved superior performance compared to a single-branch approach.","PeriodicalId":11646,"journal":{"name":"Electronics","volume":"9 1","pages":""},"PeriodicalIF":2.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信