|
|
|
Jigang Wang, Liang Chen and Rui Wang
In the actual operation of the machine, due to a large number of operating conditions and a wide range of operating conditions, the data under many operating conditions cannot be obtained. However, the different data distributions between different opera...
ver más
|
|
|
|
|
|
|
Xinran Wang, Chenyong Wang, Hanlin Liu, Cunyou Zhang, Zhenqiang Fu, Lin Ding, Chenzhao Bai, Hongpeng Zhang and Yi Wei
In deep learning-based fault diagnosis of the wind turbine gearbox, a commonly faced challenge is the domain shift caused by differing operational conditions. Traditional domain adaptation methods aim to learn transferable features from the source domain...
ver más
|
|
|
|
|
|
|
Li He, Qian Zhang, Jianyong Duan and Hao Wang
Open-domain event extraction is a fundamental task that aims to extract non-predefined types of events from news clusters. Some researchers have noticed that its performance can be enhanced by improving dependency relationships. Recently, graphical convo...
ver más
|
|
|
|
|
|
|
Yingying Liang, Peng Zhao and Yimeng Wang
Deep learning has undergone significant progress for machinery fault diagnosis in the Industrial Internet of Things; however, it requires a substantial amount of labeled data. The lack of sufficient fault samples in practical applications remains a chall...
ver más
|
|
|
|
|
|
|
Zhigang Song, Daisong Li, Zhongyou Chen and Wenqin Yang
The unsupervised domain-adaptive vehicle re-identification approach aims to transfer knowledge from a labeled source domain to an unlabeled target domain; however, there are knowledge differences between the target domain and the source domain. To mitiga...
ver más
|
|
|
|
|
|
|
Zhenyu Yin, Feiqing Zhang, Guangyuan Xu, Guangjie Han and Yuanguo Bi
Confronting the challenge of identifying unknown fault types in rolling bearing fault diagnosis, this study introduces a multi-scale bearing fault diagnosis method based on transfer learning. Initially, a multi-scale feature extraction network, MBDCNet, ...
ver más
|
|
|
|
|
|
|
Catarina Palma, Artur Ferreira and Mário Figueiredo
The presence of malicious software (malware), for example, in Android applications (apps), has harmful or irreparable consequences to the user and/or the device. Despite the protections app stores provide to avoid malware, it keeps growing in sophisticat...
ver más
|
|
|
|
|
|
|
Jiqing Li, Zhendong Yin, Dasen Li and Yanlong Zhao
Crop disease classification constitutes a significant and longstanding challenge in the domain of agricultural and forestry sciences. Frequently, there is an insufficient number of samples to accurately discern the distribution of real-world instances. L...
ver más
|
|
|
|
|
|
|
Tarek Berghout, Mohamed-Djamel Mouss, Leïla-Hayet Mouss and Mohamed Benbouzid
Machine learning prognosis for condition monitoring of safety-critical systems, such as aircraft engines, continually faces challenges of data unavailability, complexity, and drift. Consequently, this paper overcomes these challenges by introducing adapt...
ver más
|
|
|
|
|
|
|
Yuansheng Dai, Yingyi Liu, Haoyu Song, Bing He, Haiwen Yuan and Boyang Zhang
Classification tasks are pivotal across diverse applications, yet the burgeoning amount of data, coupled with complicating factors such as noise, exacerbates the challenge of classifying complex data. For algorithms that require a large amount of data, t...
ver más
|
|
|
|
|
|
|
Rokaya Eltehewy, Ahmed Abouelfarag and Sherine Nagy Saleh
Rapid damage identification and classification in disastrous situations and natural disasters are crucial for efficiently directing aid and resources. With the development of deep learning techniques and the availability of imagery content on social medi...
ver más
|
|
|
|
|
|
|
Fengyun Xie, Linglan Wang, Haiyan Zhu and Sanmao Xie
Rolling bearings are the core component of rotating machinery. In order to solve the problem that the distribution of collected rolling bearing data is inconsistent during the operation of bearings under complex working conditions, which results in poor ...
ver más
|
|
|
|
|
|
|
Haoxuan Qiu, Yanhui Du and Tianliang Lu
To protect images from the tampering of deepfake, adversarial examples can be made to replace the original images by distorting the output of the deepfake model and disrupting its work. Current studies lack generalizability in that they simply focus on t...
ver más
|
|
|
|
|
|
|
Alessio Bottrighi, Marco Guazzone, Giorgio Leonardi, Stefania Montani, Manuel Striani and Paolo Terenziani
The traces of process executions are a strategic source of information, from which a model of the process can be mined. In our recent work, we have proposed SIM (semantic interactive miner), an innovative process mining tool to discover the process model...
ver más
|
|
|
|
|
|
|
Tong Zhang, Rui Guo, Haolin Zhang, Hongyu Zhou, Yeyu Cao, Maokun Li, Fan Yang and Shenheng Xu
The change of acoustic velocity in the human thorax reflects the functional status of the respiratory system. Imaging the thorax?s acoustic velocity distribution can be used to monitor the respiratory system. In this paper, the feasibility of imaging the...
ver más
|
|
|
|
|
|
|
Shiyu Zhang, Jianguo Kong, Chao Chen, Yabin Li and Haijun Liang
The rise of end-to-end (E2E) speech recognition technology in recent years has overturned the design pattern of cascading multiple subtasks in classical speech recognition and achieved direct mapping of speech input signals to text labels. In this study,...
ver más
|
|
|
|
|
|
|
Stephen A. Adubi, Olufunke O. Oladipupo and Oludayo O. Olugbara
Hyper-heuristics are widely used for solving numerous complex computational search problems because of their intrinsic capability to generalize across problem domains. The fair-share iterated local search is one of the most successful hyper-heuristics fo...
ver más
|
|
|
|
|
|
|
Chengyan Zhong, Guanqiu Qi, Neal Mazur, Sarbani Banerjee, Devanshi Malaviya and Gang Hu
Due to the variation in the image capturing process, the difference between source and target sets causes a challenge in unsupervised domain adaptation (UDA) on person re-identification (re-ID). Given a labeled source training set and an unlabeled target...
ver más
|
|
|
|
|
|
|
Franco Bagnoli, Emanuele Bellini, Emanuele Massaro and Raúl Rechtman
Percolation, in its most general interpretation, refers to the ?flow? of something (a physical agent, data or information) in a network, possibly accompanied by some nonlinear dynamical processes on the network nodes (sometimes denoted reaction?diffusion...
ver más
|
|
|
|
|
|
|
Ning Li, Tianrun Ye, Zhihua Zhou, Chunming Gao and Ping Zhang
In the domain of automatic visual inspection for miniature capacitor quality control, the task of accurately detecting defects presents a formidable challenge. This challenge stems primarily from the small size and limited sample availability of defectiv...
ver más
|
|
|
|