2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

筛选
英文 中文
Direct-Drive Wind Turbine Fault Diagnosis Based on Logistic Regression 基于Logistic回归的直驱风电机组故障诊断
Wenshuo Zhao, Chun-Yi Qu, Hui-Ben Zhang
{"title":"Direct-Drive Wind Turbine Fault Diagnosis Based on Logistic Regression","authors":"Wenshuo Zhao, Chun-Yi Qu, Hui-Ben Zhang","doi":"10.1109/ICCWAMTIP.2018.8632605","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632605","url":null,"abstract":"In this paper, we proposed a fault diagnosis method based on logistic regression model through the analysis of direct-drive wind power generation set under five conditions, normal condition, wind wheel mass imbalance, wind wheel aerodynamic imbalance, yaw and blade break. In the training process of logistic regression, we created a characteristic parameter matrix and set the probability value, then we calculated the logic regression parameter matrix using the method of Newton-Raphson to diagnose the state of wind turbine.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deeplearning Model Used in Text Classification 用于文本分类的深度学习模型
Jingjing Cai, Jianping Li, Wei Li, Ji Wang
{"title":"Deeplearning Model Used in Text Classification","authors":"Jingjing Cai, Jianping Li, Wei Li, Ji Wang","doi":"10.1109/ICCWAMTIP.2018.8632592","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632592","url":null,"abstract":"Text classification is one of the most widely used natural language processing technologies. Common text classification applications include spam identification, news text classification, information retrieval, emotion analysis, and intention judgment, etc. Traditional text classifiers based on machine learning methods have defects such as data sparsity, dimension explosion and poor generalization ability, while classifiers based on deep learning network greatly improve these defects, avoid cumbersome feature extraction process, and have strong learning ability and higher prediction accuracy. For example, convolutional neural network (CNN)[I]. This paper introduces the process of text classification and focuses on the deep learning model used in text classification.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Research on Control of 6-Dof Redundant Parallel Mechanisms 六自由度冗余并联机构控制研究
T. Gao, Cong Zhou, Xiang Zheng, Xiaochai Li
{"title":"Research on Control of 6-Dof Redundant Parallel Mechanisms","authors":"T. Gao, Cong Zhou, Xiang Zheng, Xiaochai Li","doi":"10.1109/ICCWAMTIP.2018.8632574","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632574","url":null,"abstract":"In this paper, a control technique only by controlling the active leg to achieve the mechanism complex motion is proposed, in which the redundant actuation force of the 6-DOF redundant parallel mechanisms is constant. The motion of redundant mechanism can be realized by only controlling the hinge point, without considering the coupling between the various branched chains. Compared with the common hybrid control technique of the force position, this technique is more simple and easy to implement. The mechanical model of the 6-DOF redundant parallel mechanisms is developed with the SimMechanics in MATLAB and is controlled with the PID control technique based on the hinge point space. The results show that the control accuracy and response speed meet the system requirement due to the control system is simpler. So the constant redundant force control technique is ideal for engineering applications.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electricy Cost Optimization of Data Center Interactive Services with UPS 数据中心与UPS交互业务的电费优化
Yan Huang, G. Li, Peng Wang, Fengjia Chang, Jian-Ping Li
{"title":"Electricy Cost Optimization of Data Center Interactive Services with UPS","authors":"Yan Huang, G. Li, Peng Wang, Fengjia Chang, Jian-Ping Li","doi":"10.1109/ICCWAMTIP.2018.8632610","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632610","url":null,"abstract":"Electricity cost is the significant cost of data center, which is consisted of energy charge and demand charge. Existing research mainly focus on energy charge but rarely pay attention to the unnegligible demand charge. In this paper, a two-stage algorithm is proposed to optimize data center interactive services's electricity cost including both energy charge and demand charge. Partial execution and UPS are used to reduce energy consumption and peak power consumption so as to optimize electricity cost while guaranteeing the service quality and response time. UPS battery attributes such as UPS runtime and UPS lifetime are considered to ensure the data center availability.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121608501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Key Pre-Distribution Scheme for WSN Based on Hash Function 基于哈希函数的WSN密钥预分配方案
Chao Xiong, Shuquan Li, Lei Liu, Rui-Qiong Li
{"title":"Key Pre-Distribution Scheme for WSN Based on Hash Function","authors":"Chao Xiong, Shuquan Li, Lei Liu, Rui-Qiong Li","doi":"10.1109/ICCWAMTIP.2018.8632569","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632569","url":null,"abstract":"In the last decade, security emerges as a challenging issue in wireless sensor networks. Key management in wireless sensor networks is a corner stone service for many security services such as confidentiality and authentication. In this paper, a new key pre-distribution scheme based on Hash function is proposed, which extends the ideas of random key pre-distribution scheme. The scheme uses the one-way Hash function to preload the keys in the process of key pre-distribution, which efficiently hides part of the keys information stored in the nodes. The attacker can only obtain part of the key information of the captured nodes and cannot be used to compromise other links in the network using backward keys. Theoretical and simulation results show that this scheme not only enhances the network secure connectivity, but also improves the node's anti-capture attack capability.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131458800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ontology-Based Academic Article Recommendation 基于本体的学术文章推荐
Gohar Rehman Chughtai, Jia Lee, Asif Kabir, Rashid Abbasi, Muhammad Arshad Shehzad Hassan
{"title":"Ontology-Based Academic Article Recommendation","authors":"Gohar Rehman Chughtai, Jia Lee, Asif Kabir, Rashid Abbasi, Muhammad Arshad Shehzad Hassan","doi":"10.1109/ICCWAMTIP.2018.8632601","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632601","url":null,"abstract":"The qualitative analysis of scientific production in the tome of scientific literature is based on the article recommendation to peer reviewers by the venues (journal, conferences), which is usually done by editor of any venue. The better classification of an article depends upon the ontologies or concepts presented in it. It has been observed that venues provide a very abstract classification of the topic which can't be topic-specific classification. In this write-up, we have proposed ontology-based category classification of an article which is not only extracted through the particular article but also from the cited articles which can give us more insight into the topic-specific categorization and also give us the homogeneity of ontologies of the cited article with reference to any particular article. Simulation has been done over the data set from the web of science. For the better understanding and its implication, we narrow our data set to just computer science subject.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133739996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hyper-Spectral Remote Sensing Image De-Noising with Three Dimensional Wavelet Transform Utilizing Smooth Nonlinear Soft Thresholding Function 基于光滑非线性软阈值函数的三维小波变换高光谱遥感图像去噪
Noorbakhsh Amiri Golilarz, Hui Gao, Waqar Ali, Mohammad Shahid
{"title":"Hyper-Spectral Remote Sensing Image De-Noising with Three Dimensional Wavelet Transform Utilizing Smooth Nonlinear Soft Thresholding Function","authors":"Noorbakhsh Amiri Golilarz, Hui Gao, Waqar Ali, Mohammad Shahid","doi":"10.1109/ICCWAMTIP.2018.8632597","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632597","url":null,"abstract":"A hyper-spectral image can be subject to additive noise during the acquisition process. The main objective in noise removal is to enhance the visual quality of the corrupted image using de-noising techniques. Most of the techniques try to discard the noise in the pre-processing stage prior to further analysis. The main focus in this paper is removing the noise from hyper-spectral remote sensing images. A new method is proposed for image de-noising by applying a smooth nonlinear soft threshold on high frequency sub-bands of the images after applying 3D un-decimated wavelet transform (3D-UWT). This proposed threshold function is referred to as the improved soft (smooth nonlinear)thresholding function. The proposed method is compared with de-noising based on 3D-UWT using standard hard and soft thresholding techniques. Results show the superiority of the proposed method over the standard and alternative methods in the literature by means of visual quality and peak signal to noise ratio (PSNR).","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"59 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model 基于角色的访问控制与基于属性的访问控制模型的评价与比较分析
Muhammad Umar Aftab, Zhiguang Qin, Zakria, S. Ali, Pirah, Jalaluddin Khan
{"title":"The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model","authors":"Muhammad Umar Aftab, Zhiguang Qin, Zakria, S. Ali, Pirah, Jalaluddin Khan","doi":"10.1109/ICCWAMTIP.2018.8632578","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632578","url":null,"abstract":"Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top. This paper contains the evaluation, and comparison of RBAC and ABAC models. Authors explained the working criteria as well as the comparative analysis of these models. The comparison is done on more than ten different parameters. Authors also mentioned their strengths and weaknesses for a good understanding of models.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Outlier Detection Using Diverse Neighborhood Graphs 基于不同邻域图的离群点检测
Chao Wang, Hui Gao, Zhen Liu, Yan Fu
{"title":"Outlier Detection Using Diverse Neighborhood Graphs","authors":"Chao Wang, Hui Gao, Zhen Liu, Yan Fu","doi":"10.1109/ICCWAMTIP.2018.8632604","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632604","url":null,"abstract":"Owing to its wide applications in both industry and academia, a large number of new approaches are emerging every year in the field of outlier detection. Among which, neighborhood-based approaches are adopted by a great number of researchers and they still represent the mainstream in the field. However, how to determine appropriate local information from the definition of neighbors is an arduous problem which still has no widely accepted solution. In this study, we propose a new outlier detection model utilizing multiple neighborhood graphs, each of which is based on changed neighbors to capture various local information from different perspectives. An outlier score for each object is then deduced by performing random walk on the predefined graphs. Experiments on ten real-world datasets suggested that the proposed model could obtain promising results compared with four state-of-the-art algorithms by the measure of ROC AUC and precision at n.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"61 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sequence Labeling of Chinese Text Based on Bidirectional Gru-Cnn-Crf Model 基于Gru-Cnn-Crf双向模型的中文文本序列标注
Dil Iu, Xinyi Zou
{"title":"Sequence Labeling of Chinese Text Based on Bidirectional Gru-Cnn-Crf Model","authors":"Dil Iu, Xinyi Zou","doi":"10.1109/ICCWAMTIP.2018.8632570","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632570","url":null,"abstract":"Sequence labeling is the basis for many tasks in natural language processing (NLP). It plays an important role in tasks such as word segmentation, named entity recognition (NER), and part-of-speech (POS)tagging. The current mainstream method for sequence labeling is to combine neural network with conditional random field (CRF). The common model is usually a bidirectional RNN-CRF model, which can solve the problem that the labeling task with traditional method cannot be combined well with the context. This paper proposes a Chinese sequence labeling model based on bidirectional GRU-CNN-CRF, which can pay more attention to local features and context relationships, and has better performance in word segmentation and NER. This paper takes the corpus provided by Chinese Wikipedia as the training data set and preprocesses the text by word embedding. The data are then processed through a three-tier architecture of bidirectional Gated Recurrent Unit (GRU), Convolution Neural Network (CNN)and CRF, and finally complete the task of sequence annotation. Compared with the traditional Chinese word segmentation system, this method is more accurate. And it performs better than bidirectional GRU-CRF model on NER issues.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115092771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信